SigmaWay Blog

SigmaWay Blog tries to aggregate original and third party content for the site users. It caters to articles on Process Improvement, Lean Six Sigma, Analytics, Market Intelligence, Training ,IT Services and industries which SigmaWay caters to

Cassandra 2.0: The next generation of big data

Facebook released Cassandra, its NoSQL, big data distributed data store to open source. It can power massive data sets quickly and reliably without compromising performance. Different new features and improvements are included in the latest version. To know more about Cassandra 2.0, follow Steven J. Vaughan-Nichols's, article link:

http://www.zdnet.com/cassandra-2-0-the-next-generation-of-big-data-7000020237/

  5591 Hits

Big data: Transforming travel industry

An article by Brian Honigman, Digital Marketing Executive at Marc Ecko Enterprises and a social media specialist, conveys that while big data is a challenge for many organizations, it is one of the key factors that drive the evolution of the travel industry. Travel companies can make better decisions based on the data aggregated from their customers to personalize services like travel booking for an easier navigation. Big data can help travel companies understand the ongoing requests of their customer base and identify patterns in consumer behavior to determine offerings they may want in future.

 

To know more visit http://www.forbes.com/sites/centurylink/2014/04/30/how-big-data-is-transforming-the-travel-industry/

 

 

  6849 Hits

Mobile future will force business into the cloud

An article by Aimee Chanthadavong, tech journalist with ZDNet, talks about how businesses have focused aggressively on virtualization and automating private clouds so that information can be shared. She also mentioned about the transition from the mainframe which happened over a decade and thus moving to the third platform of IT is going to take a while because there's so much invested in the existing infrastructure. Businesses redefine their infrastructures and look at ways to free up their existing budget to fund new projects, such as creating new apps; it's also an opportunity for IT to be innovative again.

 

To know more visit http://www.zdnet.com/mobile-future-will-force-business-into-the-cloud-emc-7000029095/

 

 

  6228 Hits

Insurance industry: adopting cloud technology

The concept of transferring an existing platform to the cloud appears to have many businesses stumped, including those in the insurance industry. Cloud service providers like Microsoft, Oracle and VMware are not going to wait for the insurance company to make up their mind about it. So by the time they do, they could be restricted to having their data still on old hardware systems. But if the insurance industries do not move soon in enough into the cloud - whether that's adopting a private, public or hybrid model, there could be repercussions in the future as everybody could be worse off and face higher costs and risks of running old systems, and being noncompetitive.

 

 

 To gather more information about this aspect, follow Aimee Chanthadavong, tech journalist with ZDNet's, article link http://www.zdnet.com/insurance-industry-under-pressure-to-plug-into-the-cloud-7000026920/

  6681 Hits

IT security: It's time to change the game

How can we rethink the ways we protect our changing IT world? We do IT differently these days, with users bringing their own devices into networks, with apps in the cloud and users are wirelessly connected - from anywhere at any time. But we still do security the same old ways, with firewalls the mediaeval fortresses guarding the gates around our walled city data centers. Detecting malware is complex. New malware that's never been analyzed won't be blocked by conventional tools. The risk may be small, but it's still a risk. Changing the way we think about protecting our networks from malware changes the game. It lets us focus on understanding the software engineering implications of malware. It's a new world out there and it's good to see that the security industry is thinking about how it needs to react, taking advantage of the same new tools and techniques we're using in private, hybrid, and public clouds. Now it's up to us to think about how we can prevent attacks on our infrastructure and keep that vital data right where it belongs.

 

 

To know more, read the article by Simon Bisson, Freelance technology journalist, follow http://www.zdnet.com/it-security-its-time-to-change-the-game-and-heres-how-7000029246/ 

  9564 Hits

Cloud computing: managing contractual risks

An article by Ryang Huang, Editor at ZDNet's Asia/Singapore, conveys that there will be both practical and commercial risks when choosing a cloud service which can be mitigated by focusing on the service contract. He also mentioned that the service contract must enable organizations to comply with their own obligations. Also, the service contract should include a plan detailing the steps to be taken on exit and how data will be extracted from the vendor. As cloud services may involve the use of software and other intellectual property rights under a license, organizations could be dragged into a legal dispute in the event of third party claims of infringement against the cloud service provider.

 

 

To gather better insights in this aspect follow http://www.zdnet.com/how-to-manage-contractual-risks-in-cloud-computing-7000027568/ 

  6390 Hits

Digital technology: a new paradigm to business

Digital technology has evolved largely over the last decade. It can change the future of a organization. For digitalizing businesses, companies should follow some necessary steps. To know more on the digitalization process of business, go through the article by Dion Hinchcliffe, an expert in IT and business strategy.

http://www.zdnet.com/businesses-have-digitized-but-not-transformed-7000027190/

  7380 Hits

Red Hat, Ubuntu, and Docker: container virtualization goes mainstream

Though Red Hat, Ubuntu and Linux are rivals, yet all of them agree in one point - Docker, a container technology. Docker is potential as well as disruptive in different aspects. Now the question is- can containers with Docker be the next great revolution in virtualization and the cloud? To know the answer of this question, go through the article written by Steven J. Vaughan-Nichols, writer of technology.

http://www.zdnet.com/red-hat-ubuntu-and-docker-container-virtualization-goes-mainstream-7000028610/

  7231 Hits

What happens when a software vendor decides not to follow the 'Silicon Valley path'

Enterprise portals provide semi-personalized access to important applications from a single screen. Liferay ( a Los Angeles-based company), provides portal technology to organizations, is observing a shift in its business as social, mobile, analytics and cloud is becoming the new foundation of enterprise computing. Building an open source community around its portal platform will deliver more long-term dividends than short-term profits. To know more on this topic, go through the article by Joe McKendrik, author, consultant and speaker specializing in trends and developments.

http://www.zdnet.com/what-happens-when-a-software-vendor-decides-not-to-follow-the-silicon-valley-path-7000028210/

  5221 Hits

Is OpenSSL secure in its dominance?

OpenSSL is a software library which is used in everyday for proper functioning of internet. It is not only used for SSL by websites, but also for all sort of software with cryptographic need use it. OpenSSL is dependent more on API more than its OpenSSL library. Including both of this in the system may cause a risk for the major developers like Red Hat. For more information, go through the article written by Larry Seltzer, an expert in technology.

http://www.zdnet.com/is-openssl-secure-in-its-dominance-7000028644/

  6633 Hits

OpenStack's top operating system: Ubuntu Linux

According to OpenStack user survey, Ubuntu Linux is the most popular OpenStack operating system. According to Mark Shuttleworth (founder of Canonical, Ubuntu's parent company), 55 percent of OpenStack operating systems are on Ubuntu. To know more about synchronization of Ubuntu and OpenStack, go through the article by Steven J. Vaughan-Nichols, writer about technology.

http://www.zdnet.com/openstacks-top-operating-system-ubuntu-linux-7000027360/

  7007 Hits

Law in the era of cloud

It is true that cloud computing is rapidly changing the nature of businesses. Now, it is spanning across various industries. Even, the legal industry has adopted the cloud technology in recent years.

Though, it is a fact that cloud has brought in numerous benefits, but security and privacy are main concerns. Particularly, these are very much important in legal issues as they deal with clients which are privileged information. But does that mean that lawyers will stop adopting cloud technology? Definitely not. They have to use the technology in such a way so that they can realize maximum benefits of using it.

At a panel discussion titled “Privacy and Your Practice: Data Sovereignty for Lawyers,” held at CUNY Law School, experts discussed how lawyers can cope with the technology maintaining privacy and security simultaneously. To know the discussions, read them at http://venturebeat.com/2014/05/06/practicing-law-in-the-age-of-cloud-computing/ .

  7386 Hits

Icehouse: new OpenStack cloud arrives

OpenStack, an extremely popular open source Infrastructure as a Service (IaaS) cloud program, has released its latest version: Icehouse. Approximately 350 new features and 2,902 bug fixes were added this time. The main focus was on testing, maturity, and stability. In addition, third-party continuous integration (CI) has resulted in 53 external systems testing OpenStack compatibility across broad sets of hardware and software configurations. Read more at:

http://www.zdnet.com/icehouse-new-openstack-cloud-arrives-7000028560/

  5882 Hits

Data security in the cloud

The rapid rate of cloud adoption has given rise to the natural necessity to have some data generated live on cloud-based platforms. One of the biggest mistakes a company can make is assuming that once you are managed by a hosting provider or other cloud-based platform company, the inbuilt security features will provide everything you need from a data safety perspective. Depending on the cloud service provider or managed service provider you use, you can expect scalability and flexibility to be built into the system so that you don't miss out on the cloud's ability to quickly respond to changes in demand. Having the technical skills in-house is just as important as finding the outsourced technical expertise that will enable a greater degree of secure infrastructure planning.

 

To know more visit the article at http://www.cloudcomputing-news.net/blog-hub/2013/nov/19/the-reality-of-data-security-in-the-cloud/

  7022 Hits

Protecting encryption keys is critical to keeping cloud data private

Implementing cloud data encryption and maintaining control over encryption keys is an important way for the enterprise to verify how information can be shared and unlocked. Cloud data encryption transforms data so that it is undecipherable without the key that can be used to change the data back to its original form. But several enterprises are now realizing that when they cede control of their encryption keys to their cloud providers, their sensitive data may not be as private as they had hoped. They need to look for peer reviewed security proofs and understand implications on end users of cloud applications if there are strong encryption techniques. Recommendation from Gartner and the security and compliance needs to control sensitive data and it becomes clear that having vast amounts of sensitive data dispersed to multiple cloud application providers and relying on those providers to keep the encryption keys safe creates a security paradox for the enterprise.

 

 

To gather more insights visit the article by Gerry Grealish, Chief Marketing Officer of PerspecSys, follow http://www.cloudcomputing-news.net/blog-hub/2014/mar/20/when-deploying-cloud-data-encryption-protecting-encryption-keys-is-critical-to-keeping-cloud-data-private/

  7117 Hits

Cloud computing: optimizing existing facilities

An article by Ryan Huang, editor at ZDNet's Asia/Singapore office, talks about recognizing vulnerabilities in existing facilities before embarking on a cloud computing deployment for potential adopters to fortify critical systems. The implementation of high-density configuration increases both the compute capacity and energy efficiency of an existing facility. When evaluating external cloud providers, the vendor's data center power infrastructure and availability strategy should also be examined and understood. To create an optimal cloud computing environment, data centers need to bridge the gap between the physical layer of the data center infrastructure and the IT infrastructure.

 

 

To know more visit http://www.zdnet.com/optimizing-existing-facilities-for-cloud-computing-7000028083/

  6140 Hits

Get the best from your call center performance management system

If you are a call center provider, then you must know that performance is an important parameter. Every day, large volume of management information is produced from different call center systems where each center is given a business target to achieve. This target is then fragmented into smaller ones to team levels where individuals have to work in order to meet it. Apart from this, you have to take into account different generic measures like volume of total calls answered, percentage of calls abandoned, and average call duration, turnover and percentage of absenteeism of your staff, etc. Together, this will tell you how efficiently your call center is operating.

To make your task easy, there are different performance management solutions that you can put to use to know various aspects – out of which you can make out areas of improvements. But for this, you have to know how to use your performance management solution. Read more at: http://www.callcentrehelper.com/trade-secrets-getting-the-best-from-your-performance-management-solution-60462.htm to know the secrets and increase your profit.

  33629 Hits

Comparing Google Sitelinks With Google Analytics Data

Google had maintained a complete secrecy about the algorithm it uses to generate site links. Google includes pages in the sitelinks that don't appear to be the healthiest pages in traffic acquisition, engagement, or any other supporting data point. Why is Google selecting these pages? Below are three possible explanations:

  • Something for Everyone.
  • Search Trends.
  • Testing.

Examining web analytics data on site content and to try and "save users’ time" are something organizations do on a daily basis. There is a common assumption that Google has a clever way of determining the popularity of site pages without knowing the website analytics.The method that Google utilizes to determine sitelinks is still somewhat of a mystery. But data shows that Google is anticipating the popularity and health of pages within a site and in many cases including one sitelink that is not typically very popular on the site.

Mark Ryan, Lead Analyst, Extractable writes on this aspect in detail. To read, visit the following link:

http://www.clickz.com/clickz/column/2342233/comparing-google-sitelinks-with-google-analytics-data

  14949 Hits

Google to replace Nexus line with Android Silver

According to a report by www.theinformation.com, Google plans to offer a premium Android experience with high end Android Silver line of products. The US market is the initial target. The number of non Google apps installation will be restricted in this product category. Android Silver products will also get prompt software updates and will have top-end features like advanced voice recognition and water resistance.Unlike Google Play Edition and Nexus products, Android Silver devices will be heavily promoted by the internet search giant. Unlike Google Play Edition devices, Android Silver devices are expected to carry Google's brand, not the manufacturers. The report also says that Google has already roped in LG and Motorola to produce the first Android Silver devices.This is not the first time that rumours about Google killing the Nexus line have surfaced in the news. It is needed to be seen that whether Google will annihilate their Nexus products to avoid any kind of cannibalization effect to its soon to be launched silver range or they will opt for a mutual existence strategy.

To read more, visit

http://timesofindia.indiatimes.com/tech/tech-news/Google-to-replace-Nexus-line-with-Android-Silver-Report/articleshow/34419033.cms

  14850 Hits

Start-ups omit in-house IT with Amazon Web Services

Economic uncertainty makes dynamic resource model of the cloud a tempting option for start-ups. With the elasticity of cloud computing, no capital goes unused and organizations don't have to guess how much capacity they require. AWS is attractive to small businesses because it is inexpensive to deploy and allows companies to pay only for the resources they use. Amazon Chief Technology Officer Werner Vogels said that “Cost of failure in the cloud world is close to zero". Application and deployment speed, in addition to ease of use, are key benefits of the cloud for enterprises. For large organizations, hardware savings also can be significant.Redistributing capacity to use capital in the most efficient way is another main reason to implement AWS.

To read more, visit

http://searchaws.techtarget.com/news/2240182220/Startups-omit-in-house-IT-with-Amazon-Web-Services

  12489 Hits