Mobile security image via Shutterstock
Have organizations scratched the surface when it comes to mobile security? Find out in this week’s update.
1. New Pulse Secure CEO on what mobile security lacks – Jake O’Donnell (SearchConsumerization)
Mobile security has come a long way, but organizations still have to address many sizable gaps.
2. Cisco acquires OpenDNS to fight IoT threats – Antone Gonsalves (SearchNetworking)
Cisco plans to acquire OpenDNS and use its security-as-a-service products to reduce the number of IoT threats customers face.
3. Fobber: Drive-by financial malware returns with new tricks – Maxim Tamarov (SearchFinancialSecurity)
Drive-by financial malware Fobber is the evolution of the popular Tinba — with better encryption, a newer format and a focus on the Netherlands.
4. Data center spending continues climb, led by power, DCIM – Robert Gates (SearchDataCenter)
Purchases of racks, cabling, power equipment and data center infrastructure management software top the list for data center spending.
5. Service for Apps brings in-app support to Salesforce Service Cloud – Tim Ehrens (SearchCRM)
Service for Apps allows Salesforce Service Cloud users to embed live agent support and a knowledge base within their applications and other CRM news.
Oracle image via Shutterstock
Can Oracle take on AWS in the cloud market? Tune into this week’s roundup to find out.
1. Oracle’s cloud plans for world domination start with AWS – Trevor Jones (SearchCloudComputing)
Oracle’s cloud is now complete and in its typical bravado style, plans to take on Goliath AWS right out of the gate with IaaS, PaaS, cloud storage and more.
2. VMware containers go soup-to-nuts for cloud apps – Alex Barrett and Ed Scannell (SearchServerVirtualization)
VMware adds a few more pieces to its cloud-native apps and open source initiatives, this time with Docker container tools to reel in developers.
3. Stolen passwords to blame for OPM breach; director may take the fall – Michael Heller (SearchSecurity)
The OPM director told a Senate hearing that passwords stolen from a contractor led to the OPM breach. Now, her job is on the line and the number of breached records could be on the rise.
4. Juniper introduces peering router for content providers – Antone Gonsalves (SearchTelecom)
Juniper Networks has introduced a compact peering router aimed at service providers looking to speed up content delivery.
5. Big data Summit panelists: Petabyte data stores fuel data science – Dave Raffo (SearchStorage)
Data scientists who study topics such as disease and climate change require robust storage systems to hold petabytes of crucial research.
Big data image via Shutterstock
By James Kobielus (@jameskobielus)
Even as Apache Spark pushes more deeply into big-data environments, it won’t substantially change this trend. Yes, of course Spark is on the fast track to ubiquity in big-data analytics. This is especially true for the next generation of machine-learning applications that feed on growing in-memory pools and require low-latency distributed computations for streaming and graph analytics. But those use cases aren’t the sum total of big-data analytics and never will be.
As we all grow more infatuated with Spark, it’s important to continually remind ourselves of what it’s not suitable for. If, for example, one considers all the critical data management, integration, and preparation tasks that must be performed prior to modeling in Spark, it’s clear that these will not be executed in any of the Spark engines (Spark SQL, Spark Streaming, GraphX). Instead, they’ll be carried out in the data platforms and elastic clusters (HDFS, Cassandra, HBase, Mesos, cloud services, etc.) upon which those engines run. Likewise, you’d be hardpressed to find anyone who’s seriously considering Spark in isolation for data warehousing, data governance, master data management, or operational business intelligence.
Above all else, Spark is the new power tool for data scientists who are pushing boundaries in the emerging era of in-memory big data analytics in low-latency scenarios of all types. In a recent column, I commented on the likely sweet-spot deployment roles—fog, stream, and cloud–where Spark will prove its value as a development tool for the new generation of data scientists building the in-memory statistical models upon which it all will depend.
Let’s not fall into the delusion that everything is converging toward Spark, as if it were the ravenous maw that will devour every other big-data analytics tool and platform. Spark is just another approach that’s being fitted to and optimized for specific purposes.
And let’s resist the hype, such as in the headline of this recent article, that treats Spark as Hadoop’s “successor.” This implies that Hadoop and other big-data approaches are “legacy,” rather than what they are, which is foundational. For example, no one is seriously considering doing “data lakes,” “data reservoirs,” or “data refineries” on anything but Hadoop or NoSQL.
After all, you can’t spark an analytic combustion engine if there’s no data fuel in the tank.
Data center image via Shutterstock
What data center trends are leading the charge in 2015? Find out in this week’s roundup.
1. Ten data center trends driving change in 2015 – Stephen Bigelow (SearchDataCenter)
There’s technology hype and then there are true trends that affect data centers long-term. These 10 trends are sure to have an impact beyond 2015.
2. Enterprises struggle with SDN development, culture – Antone Gonsalves (SearchSDN)
Enterprises say retraining and cultural changes stemming from SDN development are more difficult to solve than technological challenges.
3. Apple, EMMs team up to deploy mobile apps for business – Jake O’Donnell (SearchConsumerization)
VMware’s AirWatch and MobileIron will work with iOS to deploy secured business apps in a different way than Apple’s IBM partnership.
4. Samsung vulnerability affects up to 600 million Android devices – Michael Heller (SearchSecurity)
A flaw in the default keyboard found on many Samsung Galaxy Android devices may leave as many as 600 million devices at risk for a man-in-the-middle attack.
5. C-level relationships, engagement key to CIO success – Sue Troy (SearchCIO)
CIOs spend 40% of their time engaged with the CEO, CMO, COO and other non-IT peers, according to MIT research. C-level execs explain why that time is so important.
HP image via Shutterstock
Do you think HP is making a wise decision splitting into two? Find out in this week’s roundup.
1. HP Enterprise to focus on agility, efficiency after split – Robert Gates (SearchDataCenter)
HP will soon be split into two, with an enterprise business that IT pros expect will deliver faster to catch up in the quickly changing IT market.
2. IBM and Cisco acquire OpenStack providers – Trevor Jones (SearchCloudComputing)
IBM and Cisco both made acquisitions this week to shore up their cloud portfolios and consolidate the private cloud and OpenStack market.
3. Dropbox for Business adds Active Directory integration – Jake O’Donnell (SearchConsumerization)
With an Active Directory connection, added admin features and shared folder APIs, Dropbox has designed its enterprise offering to be part of IT’s big picture.
4. Facebook, Google, Mozilla raise the bar with new user privacy controls – Sharon Shea (SearchSecurity)
News roundup: New settings and options to boost user privacy and security are emerging on major websites, but is it enough?
5. HP, Alcatel venture targets data center connections – Gina Narcisi (SearchNetworking)
HP and Alcatel-Lucent announced new cloud and data center offerings to help service providers and large enterprises connect their disparate environments.
Internet of Things image via Shutterstock
Will Google’s new IoT operating system make waves in the market? Find out in this week’s roundup.
1. New Google IoT OS to connect Android devices – Jake O’Donnell (SearchConsumerization)
Google Project Brillo is a scrubbed-down IoT OS that could entice enterprises thanks to its connections to existing Android and iOS devices.
2. IBM hopes to Power its way to the hybrid cloud – Ed Scannell (SearchDataCenter)
IBM tries the gumbo approach to creating a hybrid cloud: Some Power Systems with a dash of software reorg and a pinch of revamped software licensing.
3. IRS breach shows the importance of PII security – Maxim Tamarov (SearchSecurity)
A breach of the IRS’ Internet tax form service “Get Transcript” exposed the personal information and tax filings of thousands of people.
4. Toshiba joins list of Ethernet hard drive makers – Carol Sliwa (SearchStorage)
Toshiba joins drive makers testing new devices that combine storage, compute resources and Ethernet ports to scale object stores, big data analytics.
5. Salesforce ties Wave analytics tool to big data platforms – Ed Burns (SearchBusinessAnalytics)
Salesforce is getting more involved in big data analytics, with new partnerships that open up its cloud-based Wave analytics technology to Hadoop and other big data systems.
Government security image via Shutterstock
Will President Obama act on the issue of government backdoors? Find out in this week’s roundup.
1. Government backdoor security concerns prompt letter to President – Sharon Shea (SearchSecurity)
As privacy and security concerns rise, President Obama is urged to dismiss the call for government backdoors.
2. Alcatel-Lucent boosts capabilities of service provider SDN platform – Antone Gonsalves (SearchSDN)
Alcatel-Lucent introduces a service provider SDN platform designed to improve response times in making changes to corporate networks.
3. Cloud threatens traditional IT jobs, forces changes – Robert Gates (SearchDataCenter)
Cloud computing is making corporate-owned data centers less common, and companies continue to reduce IT staff.
4. OpenStack containers, PaaS tie-ins give users a leg up – Trevor Jones (SearchCloudComputing)
OpenStack containers can come in many forms as the Foundation has taken an agnostic approach to the emerging orchestration technologies around it.
5. IoT will force CIOs to enter the realm of operational technology – John Moore (SearchCIO)
IoT is mature enough for enterprise adoption, said a panel of experts at the 2015 MIT Sloan CIO Symposium, but successful deployments require CIOs to engage with operational technology.
VMware image via Shutterstock
What does VMware’s forecast look like after its first-quarter results? Find out in this week’s roundup.
1. VMware forecast: partly cloudy with chance of market gain – Ed Scannell and Tom Walat (SearchServerVirtualization)
VMware has made significant investments in network virtualization, end-user computing and the cloud. By the first-quarter results, those efforts are paying off.
2. Rackspace: Expect more of a leadership role in OpenStack community – Trevor Jones (SearchCloudComputing)
In this Q&A, Rackspace’s Private Cloud VP and GM discusses the state of the OpenStack community and the company’s plan to strengthen its role in it.
3. AMD roadmap redrawn for data center destination – Meredith Courtemanche (SearchDataCenter)
AMD expects to add some processor choice into the Wintel-dominated x86 server market as soon as next year.
4. Bugs, lack of support lead to Tor Cloud Project shutdown – Maxim Tamarov (SearchCloudSecurity)
Tor Project shuts down its AWS bridge effort, Tor Cloud, but encouraged developers to set up their own Tor bridges to promote anonymous cloud usage.
5. Security ethics survey shows honesty is a tricky business – Michael Heller (SearchSecurity)
A security ethics survey conducted at the 2015 RSA Conference indicates that infosec professionals may be wary of media attention in breach and vulnerability reporting.
Windows Update image via Shutterstock
Have we seen the end of Patch Tuesday? Check out the changes Microsoft announced at Ignite 2015 in this week’s roundup.
1. Microsoft debuts password-free Windows Hello, Patch Tuesday changes – Robert Richardson (SearchSecurity)
Microsoft Ignite 2015 showed that Microsoft may have rethought the Tuesday part of Patch Tuesday, but Windows Update is stronger than ever.
2. Outlook for iOS, Android gets MAM, fulfills IT wish list – Jake O’Donnell (SearchConsumerization)
IT has more controls than ever for Microsoft’s new Outlook mobile apps, yet only those with Intune can use its new MAM.
3. All-in-one systems simplify OpenStack private clouds – Robert Gates (SearchDataCenter)
OpenStack has been an option for advanced users for many years, but new combinations match server hardware with enterprise support.
4. Windows Server 2016 preview 2 hits without containers – Ed Scannell (SearchWindowsServer)
Microsoft has re-factored Windows Server around containers, but IT pros must wait a little longer before they can actually test them out.
5. Sapphire attendees take long view despite S/4HANA roadmap gaps – Jim O’Donnell (SearchSAP)
SAP Sapphire attendees expressed long-term confidence in the company’s S/4HANA platform, but also said the transition will not be simple to make.
Data Science image via Shutterstock
By James Kobielus (@jameskobielus)
What minimal qualifications do you actually need to call yourself a data scientist these days?
The cynical answer would be: whatever you can get away with. But the fuller answer would be: whatever the market can bear.
By the latter I’m referring to the core principle of a dynamic free-market economy: supply will emerge, by hook or crook, to satisfy demand.
A realist would admit that–even if you have no experience, qualifications, certification, track record, or any other objective evidence that you are on some level a competent data scientist—you can plausibly, without fraudulent intent, call yourself one if you feel that you’re up to the challenge. That’s called “marketing.” And if someone else accepts your self-definition and opts to engage you in an initiative in which you’re expected to deliver on your offer of data scientific services, you are doubly entitled to call yourself one. That’s called “sales.” And if you can indeed, in spite of all appearances, provide data scientific services that they find acceptable, and if you can collect monetary compensation in the process, you’re indeed a legitimate, professional data scientist.
Those are the minimal qualifications for calling yourself a professional in any line of work in a free economy. Of course, there may, in various lines of work and various jurisdictions, be plenty of formal degrees, certifications, union memberships, and other hoops you may need to jump through before you’re entitled to call yourself, say, a doctor, lawyer, certified public accountant, or air-traffic controller. There are few such hoops in the data-science profession so far.
Likewise, there are in various professions codes of conduct that are widely accepted and constrain the extent to which anybody can pass off shoddy work as the valid output of a competent professional. As I noted here, various individuals and groups in the data science profession have proposed such codes of conduct, though none is universally recognized. And none of the ones that have been proposed is being used in any concerted fashion to limit who may or may not market themselves as a data scientist.
To the extent that employers adopt hiring practices that incorporate minimal qualification criteria from these or other codes of conduct, you wouldn’t be able to market your so-called data science bonafides to any of them until such time as you conform to those. Clearly, the self-taught, self-appointed data scientists among us must face up to that challenge if they wish to make steady careers in the profession.
Given the persistent undersupply of qualified data scientists to meet growing demand, the autodidacts (who can actually deliver the goods) will be able to prosper in today’s big-data-besotted economy. Many of them will avail themselves of the ample free resources to boostrap themselves into this “sexy” profession on the cheap.
All power to them. Being an aspiring data scientist in this day and age is a bit like being an aspiring soldier in a wartime emergency. The fact that you’ve enlisted or been conscripted doesn’t make you up the challenge. The fact that somebody handed you a gun and a uniform doesn’t mean you can be trusted to defend your country. The fact that you can follow orders and march in a straight line doesn’t mean that you’re cut out for this line of work.
But the fact that somebody’s giving you orders and that they’re apparently satisfied enough with what you’re doing means you’re indeed a soldier now. You’re as much a soldier as the major general…or your drill sergeant.
And nobody can tell you you’re not.