Enterprise IT Watch Blog


September 24, 2012  10:44 AM

IT Presentation of the Week: The future of cybersecurity



Posted by: Michael Tidmarsh
Cyber Security, IT Presentation, IT Security

With Homeland Security Secretary Janet Napolitano announcing a White House executive order on cyber security is “close to completion“, this presentation from TEC CYBER takes a look at what cyber security might look like in the year 2021. How do you see the future?

September 21, 2012  12:05 PM

Executive orders and social enterprise: This week in IT quotes



Posted by: Michael Tidmarsh
IT Quotes, Oracle, Salesforce

Smartphone industry image via Shutterstock

New products, orders, and ideas seem to be the main theme among this week’s best IT quotes. Which is your favorite?

“Our core mission is to help you, our customers, to connect to your customers in a whole new way.”
- Salesforce.com CEO Marc Benioff discussing how his company’s SaaS products will enable the ‘social enterprise‘ during his keynote address at Dreamforce 2012. While Benioff might believe his company was the first to create the cloud-mobile-social connection, Ron Miller doesn’t believe that’s the case.

“The smartphone market, and particularly the iPhone market, will slow next year after very strong shipments of the next iPhone through year end.”
- Kevin Smithen, analyst at Macquarie Securities, predicts the smartphone industry will slow down next year due to several factors including slower innovations and more expensive data plans.

“As much as we are doing, we must do even more.”
- Janet Napolitano, U.S Secretary of Homeland Security, speaks about cyber security during a Senate Committee on Homeland Security meeting. According to Napolitano, an executive order on cyber security is close to completion after the Senate’s bill continues to remain bogged down in Congress.

“We think the word is starting to spread that the products have improved since introduction last year.”
- Brian Schwartz, analyst at Oppenheimer, believes Oracle’s Fusion Applications product are starting to improve as many experts wonder if a Fusion App cycle is on the way.

 


September 20, 2012  11:35 AM

IT infographic: What is big data?



Posted by: Michael Tidmarsh
Big Data, Infographics

With big data becoming such a hot topic in the IT industry, this infographic from Eduardo Area Sacristan talks about a variety of topics featuring key questions and the future of big data.

Also, check out our data management section with several questions and answers on how to manage big data.

 


September 19, 2012  8:36 AM

YouTube IT video of the week: iPhone 5 prank



Posted by: Michael Tidmarsh
Apple, iPhone, IT Video of the week

With all the hoopla surrounding the iPhone 5 release, late night host Jimmy Kimmel decided to let people test out Apple’s new product. (SPOILER: It’s the iPhone 4!)

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


September 19, 2012  8:02 AM

Why to curate a codebase



Posted by: Ben Rubenstein
code, database, development

Image of car engine

Maintenance image via Shutterstock

By Steve Poling (@stevepoling)

“The code is a steaming pile and we’ve got to rewrite it.”

Perhaps you’ve heard this and felt inclined to agree. But before you roll up your sleeves to do a comprehensive rewrite, let’s pause for a moment to ask a question: “Why is the code in this suboptimal state?”

The reasons are many. The original implementers may have been incompetent. Or incompetent bosses did not invest the time to make it right the first time. It is tempting to identify one actor in the history of a software project and make him the scapegoat. But scapegoating can obscure your vision of where the true problem lies, because there may be no scapegoat.

Maybe the badness of the code is the natural result of fixing bugs in the original implementation. People of good faith and adequate skills can approach a codebase with a bug report in hand then make the code work while making the codebase just a little bit worse.

Most times an original design won’t consider the vagaries of reality that come along later as bug reports. The fix often does not fit into the original scheme of the codebase and it gets bolted on like some aftermarket car parts you’ll find in the J. C. Whitney catalog. And because it didn’t fit into the original scheme, it may introduce additional bugs causing additional fixes to get bolted onto the earlier ones. The end result can be a codebase that seems like something from a Mad Max movie.

Don’t make a scapegoat of the guy doing the maintenance. He’s just doing a bug fix with no desire to refactor the existing design. If he refactors the existing design he risks breaking something that’s working. Just get in, fix the bug, get out. If he’s smart, he writes unit test(s) that recreates the conditions of the bug report and verifies the fix did indeed hold.

This accumulation of cruft in a codebase exhibits debt-like behavior. Every bug fix takes longer because the programmer has to sort through extraneous code to get to the problem.  When this overhead gets too large, it’s easy to throw up one’s hands and demand a rewrite. I think this is wrong.

Why not continuously refactor the codebase? Probably because the codebase doesn’t have adequate unit test coverage. Or it has stupid codebase coverage. Stupid codebase coverage means writing unit tests that just exercise code without any real insight into the intent of the code being tested. This usually happens after the code has been written and someone demands 100% unit test coverage. It’s better than nothing I suppose.

Let’s suppose for sake of argument that a codebase has adequate unit test coverage (here I’ll conflate unit tests with functional tests, acceptance tests, and any other tests of anything else I care about). These tests allow the programmer to refactor without fear. His fix need not be encapsulated in its own island of sanity, but can fully integrate with the rest of the codebase that he can adjust to make that integration more graceful. If he sees cruft he can cut it out. If he cuts too deep there’s a unit test that has his back. The result is less technical debt and greater stability.

A codebase is a capital asset. It needs to be maintained like a building must be repainted or a vehicle’s oil changed. We often think of software maintenance as mere bug fixes and feature requests, but it extends to continuous refactoring and automated tests to instrument correctness.

Steve Poling was born, raised and lives in West Michigan with his wife and kids. He uses his training in Applied Mathematics and Computer Science as a C++/C# poet by day while writing Subversive Fiction by night. Steve has an abiding interest in philosophy and potato cannons. He writes SF, crime fiction, an occasional fractured fairy tale, and steampunk. His current writing project is a steampunk novel, Steamship to Kashmir provided he isn’t distracted by something new & shiny.


September 18, 2012  11:09 AM

This week in tech history: Steve Jobs resigns



Posted by: Michael Tidmarsh
Apple, Steve Jobs, This Week in Tech History

Steve Jobs image via Shutterstock

On September 16, 1985, Steve Jobs resigned from Apple after losing control of the company five months earlier in a battle with former CEO John Sculley. Jobs went on to found the computer company NeXT and also purchased Pixar before returning to Apple and, well, you know the rest.

Each Tuesday, the ITKE team will take you back in time, as we take a look at the events that have changed technology history. Have a tip for us? Email mtidmarsh@techtarget.com or find us on Twitter (@ITKE).

Disclaimer: All posts presented in the “This week in tech history” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


September 17, 2012  12:02 PM

IT Presentation of the Week: Developing SOA strategies



Posted by: Michael Tidmarsh
IT Presentation, SOA

As Salesforce.com’s Dreamforce 2012 conference opens this week, we wanted to take a look back at a presentation from Dreamforce’s past that focuses on how organizations can develop an effective SOA strategy. How has your company fared with SOA? What are you looking forward to this week’s show?

 


September 14, 2012  12:44 PM

GoDaddy outages and business travel: This week in IT quotes



Posted by: Michael Tidmarsh
Apple, Data Storage, IT Quotes, Samsung

Business travel image via Shutterstock

 It seems a negative light has surrounded this week’s best quotes from the IT industry. Can you put a positive spin on them?

“Throughout our history, we have provided 99.999% uptime in our DNS infrastructure. This is the level our customers expect from us and the level we expect of ourselves. We have let our customers down and we know it.”
- GoDaddy CEO Scott Wagner expressing his displeasure after 52 million websites were taken down on Monday. Confusion still remains over what caused the outage but it does cause trust issues between a user and their hosting provider.

“It’s going to radically change the way data is stored.”
- Brendan Collins, vice president of product marketing for HGST, taking about its new 3.5 inch, helium-based hard disk drive, which will be coming out in 2013.

“What we uncovered is this infringement on personal lives. That is what has underlined this dislike of business travel.”
- Tricia Heinrich, chief marketing offer of ON24, explaining why business travelers would rather stay at home instead of going on business trips. Over 85% of respondents felt work is a major infringement on personal time while 91% said spending too much time away from home because of work could lead to several consequences. Do you feel work travel infringes on your personal time? Share your thoughts on the Head in the Clouds blog.

“This is yet another clear reminder that otherwise smart people continue to create electronic documents that are both dangerous and discoverable.”
- Jeffrey Hartman of EDiscovery Labs explaining why electronic documents played a critical factor in Apple’s patent victory over Samsung. His take: Don’t create harmful documents in the first place.


September 14, 2012  9:13 AM

Five fun facts on how IT views business intelligence



Posted by: Ben Rubenstein
BI, Business Intelligence, Survey

Image of angry bird

Angry bird image via Shutterstock

LogiXML recently conducted a survey of 757 IT prosprofessionals (672 of which classify themselves as IT executives, managers, directors and “IT other”) spread across several industries, on how they view users of business intelligence, and the results are intriguing — and pretty entertaining, too. Among our favorites:

  • 7667 percent of respondents say users make BI needs known by “loudly insisting” (247 respondents, 33%), “screaming like banshees,” (52, 7%) or assuming IT had “telepathy” (203, 27%)
  • 20 percent (151 respondents) would give users direct access to data sources only “if my life depended on it”
  • 38 percent think users spend most of their time “checking Facebook comments on photos from recent Bahamas trip” (96 respondents, 13%) or “wish I knew” (193, 25%)
  • 43 percent (326) are “meh” on implementation of their BI projects
  • 5 percent (35)  think mobile BI is “more popular than Angry Birds”

Check out the full survey report here. What are your thoughts on business intelligence?


September 12, 2012  11:02 AM

YouTube IT video of the week: The History of Spam



Posted by: Michael Tidmarsh
IT Video of the week, Security, Spam

With a little help from Security Corner’s Ken Harthun, this week’s IT video takes a look at the history of every computer user’s worst nightmare: Spam.

Disclaimer: All videos presented in the “YouTube IT Video of the Week” series are subjectively selected by ITKnowledgeExchange.com community managers and staff for entertainment purposes only. They are not sponsored or influenced by outside sources.


Forgot Password

No problem! Submit your e-mail address below. We'll send you an e-mail containing your password.

Your password has been sent to: