Last Build Date: Wed, 18 Jan 2017 05:42:13 ESTCopyright: Copyright 2017 Ulitzer.com
Tue, 17 Jan 2017 06:30:00 ESTThe best-practices for building IoT applications with Go Code that attendees can use to build their own IoT applications. In his session at @ThingsExpo, Indraneel Mitra, Senior Solutions Architect & Technology Evangelist at Cognizant, provided valuable information and resources for both novice and experienced developers on how to get started with IoT and Golang in a day. He also provided information on how to use Intel Arduino Kit, Go Robotics API and AWS IoT stack to build an application that gathers, analyzes, and acts on data generated by connected devices.
Tue, 17 Jan 2017 01:30:00 ESTAs 2016 approaches its end, the time to prepare for the year ahead is now! Following our own advice, we sat down with three XebiaLabs thought leaders–Andrew Phillips, Tim Buntel, and TJ Randall–and asked what they think the future has in store for the DevOps world. In 2017, we’ll see a new wave of “next gen platform” projects focused on container orchestration frameworks such as Kubernetes, and re-tooled PaaS platforms such as OpenShift or Cloud Foundry. Acceptance of the need for a cross-machine resource management and scheduling framework is growing, and the vendor ecosystem is rapidly throwing weight behind this movement. There will also be an increased shift away from defining containers directly, and more towards having containers generated automatically where necessary.
Mon, 16 Jan 2017 08:15:00 ESTBrand owners are caught in a digital crossfire. From one direction comes intense competitive pressure to innovate or to at least follow very, very quickly. From the precisely opposite direction comes the potentially existential threat of an app very publicly flopping or – even worse – being very publicly revealed to jeopardize the customer’s well-being. Either way, you lose brand value in a social marketplace where brand is your primary currency. What’s a brand owner to do?
Mon, 16 Jan 2017 04:00:00 ESTEnterprise networks are complex. Moreover, they were designed and deployed to meet a specific set of business requirements at a specific point in time. But, the adoption of cloud services, new business applications and intensifying security policies, among other factors, require IT organizations to continuously deploy configuration changes. Therefore, enterprises are looking for better ways to automate the management of their networks while still leveraging existing capabilities, optimizing performance and reducing operational risk through standardization and best-practice architectures.
Sun, 15 Jan 2017 22:30:00 EST"We got started as search consultants. On the services side of the business we have help organizations save time and save money when they hit issues that everyone more or less hits when their data grows," noted Otis Gospodnetić, Founder of Sematext, in this SYS-CON.tv interview at @DevOpsSummit, held June 9-11, 2015, at the Javits Center in New York City.
Sat, 14 Jan 2017 01:15:00 EST"Matrix is an ambitious open standard and implementation that's set up to break down the fragmentation problems that exist in IP messaging and VoIP communication," explained John Woolf, Technical Evangelist at Matrix, in this SYS-CON.tv interview at @ThingsExpo, held Nov 4–6, 2014, at the Santa Clara Convention Center in Santa Clara, CA.
Fri, 13 Jan 2017 09:00:00 ESTWe are reaching the end of the beginning with WebRTC, and real systems using this technology have begun to appear. One challenge that faces every WebRTC deployment (in some form or another) is identity management. For example, if you have an existing service – possibly built on a variety of different PaaS/SaaS offerings – and you want to add real-time communications you are faced with a challenge relating to user management, authentication, authorization, and validation. Service providers will want to use their existing identities, but these will have credentials already that are (hopefully) irreversibly encoded. In his session at @ThingsExpo, Peter Dunkley, Technical Director at Acision, looked at how this identity problem can be solved and discussed ways to use existing web identities for real-time communication.
Thu, 12 Jan 2017 13:45:00 ESTData is the fuel that drives the machine learning algorithmic engines and ultimately provides the business value. In his session at Cloud Expo, Ed Featherston, a director and senior enterprise architect at Collaborative Consulting, discussed the key considerations around quality, volume, timeliness, and pedigree that must be dealt with in order to properly fuel that engine.
Thu, 12 Jan 2017 02:00:00 ESTIoT generates lots of temporal data. But how do you unlock its value? You need to discover patterns that are repeatable in vast quantities of data, understand their meaning, and implement scalable monitoring across multiple data streams in order to monetize the discoveries and insights. Motif discovery and deep learning platforms are emerging to visualize sensor data, to search for patterns and to build application that can monitor real time streams efficiently. In his session at @ThingsExpo, Dave Watson, CTO and Co-Founder of Trendalyze, discussed real world IoT projects from UK environmental monitoring using Mosquitto, Node-RED, Kafka, Spark, MLlib and R.
Tue, 10 Jan 2017 10:00:00 ESTIn today's enterprise, digital transformation represents organizational change even more so than technology change, as customer preferences and behavior drive end-to-end transformation across lines of business as well as IT. To capitalize on the ubiquitous disruption driving this transformation, companies must be able to innovate at an increasingly rapid pace. Traditional approaches for driving innovation are now woefully inadequate for keeping up with the breadth of disruption and change facing today's increasingly digital enterprise. It's time to rethink how we innovate, leveraging the very turbulence that drives the business to change. In his Opening Keynote at 17th Cloud Expo, Jason Bloomberg, leading expert on architecting agility for the enterprise and president of Intellyx, provided a thought-provoking look at how modern digital practices, including self-organization and DevOps, can provide a template for rethinking how innovation processes can continue to drive strategic value.
Sun, 08 Jan 2017 13:00:00 ESTAs the internet’s renowned programming language, Java has had a profound impact on how people navigate the digital world. Much of what users expect in terms of performance from their devices that access the internet has been set by Java functionality. You don’t have to be a developer, however, to recognize its influence. The story of Java goes back more than two decades and has evolved along with the digital transformation of the world. As consumer and business demands on scalability increases, Java is forced to grow and adapt in order to stay relevant. Stakeholders are approaching their work armed with a primer on Java’s history, current use, and future direction.
Sat, 31 Dec 2016 21:00:00 ESTIn recent years, at least 40% of companies using cloud applications have experienced data loss. One of the best prevention against cloud data loss is backing up your cloud data. In his General Session at 17th Cloud Expo, Sam McIntyre, Partner Enablement Specialist at eFolder, presented how organizations can use eFolder Cloudfinder to automate backups of cloud application data. He also demonstrated how easy it is to search and restore cloud application data using Cloudfinder.
Sat, 31 Dec 2016 07:30:00 ESTWelcome back to our series on building out our own IoT projects and discovering the underlying tech and principals that make up the industrial internet and IoT. I wanted to add a couple of things I learned after recording, that didn't make it into this video but should have. After you get your Raspberry Pi running, the first thing you should do is open the terminal window, and execute the following commands:
Mon, 20 Jun 2016 16:42:00 EDTSoftware components that were once good can sour instantly when new vulnerabilities are discovered within them. When that happens, the bears are coming, and you have to respond quickly. Two men are walking through a forest. Suddenly, they see a bear off in the distance, running toward them. Adrenaline pumping, they start running away. But then one of them stops, takes some running shoes from his bag and starts putting them on. “Frank, what are you doing?” says the other man. “Do you think you will run faster than the bear with those?” “I don’t need to run faster than the bear,” Frank replies. “I just have to run faster than you.” This scenario repeats itself every time a new security vulnerability is discovered in a widely used open source component. Imagine the bear as your adversary. Rushing to attack when easy prey is present. Your response time is critical.
Tue, 31 May 2016 22:00:00 EDTSYS-CON Events announced today Object Management Group® has been named “Media Sponsor” of SYS-CON's 18th International Cloud Expo, which will take place on June 7–9, 2016, at the Javits Center in New York City, NY, and the 19th International Cloud Expo, which will take place on November 1–3, 2016, at the Santa Clara Convention Center in Santa Clara, CA.
Tue, 03 May 2016 09:35:00 EDTThe purpose of this document describes how to generate a report for all the certificates using in the Java environment by using a simple shell script. The script checks all certificates that are stored in Keystores. The script generates a report in the form of CSV file and the report contains the hostname, Keystore Name, Certificate Alias, Issues to (common name), Issued by, Expire in number of Days and Expiration Date.
Tue, 03 May 2016 08:04:00 EDTBMC has announced MainView for Java Environments. This integrated systems management solution provides complete insight into how Java is consuming resources and affecting application performance on the modern mainframe. In the race to thrive as a digital business and to gain a competitive advantage, organizations are increasingly looking to Java for z/OS® to quickly develop applications. With the demand for instant service, always-available, high-performing applications, it is not surprising that 93 percent of mainframe organizations in a BMC survey said Java usage is growing or steady, and Java is the language of choice for writing new or rewriting existing mainframe applications. However, Java workloads can affect performance and availability on the mainframe, as they consume system resources without regard for the needs of other applications or services. An integrated management approach allows IT Operations a holistic view of the environment to quickly and easily discover Java Virtual Machines (JVMs) and to manage the effect of their resource consumption on application performance.
Mon, 02 May 2016 12:01:00 EDTThe retail industry is transforming in today’s digital age. Consumer behavior keeps evolving and online spending is skyrocketing. In addition, retail customers are looking for a blended online and in-store experience and expecting brick-and-mortar stores and online channels to be integrated through an omni-channel strategy. This requires retailers to become customer obsessed and strive to deliver personalized, convenient and seamless shopping experiences online and in the stores.
Wed, 30 Mar 2016 09:00:00 EDTIn any component-based framework you’ll need to implement component communications. The main principle is that components should be loosely coupled hence reusable hence testable. The mediator design pattern allows you to arrange component communications via “the man in the middle” so a component A never communicates with the component B directly. If a component needs data, someone will provide the data via bindings to the component’s input properties. Who’s this someone?Ain’t no business of the component. If a component needs to provide some data to the external world, it’ll emit events (with the data payload). Emits to whom? Ain’t no business of the component. Let whoever needs the data listen to the events from this component.
Fri, 29 Jan 2016 17:00:00 ESTIn the previous blog I did a high-level overview of Angular 2 router and wrote a basic routing application that demonstrated displaying different components in a predefined area of the window. We often need not only display a component, but also pass some data to it. For example, if we navigate from the Home to the Product Detail route we need to pass the product ID to the destination route. Angular offers a directive RouteParams so a route can receive data from the parent component. There is also a RouteData directive that can be used to pass additional data to a route from the @RouteConfig section. I’ll illustrate the use of both directives by modifying the app from the previous blog.
Thu, 28 Jan 2016 11:20:00 ESTAzul Systems has announced the general availability of Zing runtime for Java release 16.01. This new release of Zing® is a highly scalable Java Virtual Machine (JVM) designed for enterprise applications and systems that require any combination of consistent low latency, high transaction rates, high scalability or large in-memory data structures.
Sun, 20 Dec 2015 12:30:00 ESTU.S. companies are desperately trying to recruit and hire skilled software engineers and developers, but there is simply not enough quality talent to go around. Tiempo Development is a nearshore software development company. Our headquarters are in AZ, but we are a pioneer and leader in outsourcing to Mexico, based on our three software development centers there. We have a proven process and we are experts at providing our customers with powerful solutions. We transform ideas into reality.
Fri, 11 Dec 2015 14:00:00 ESTBoost your productivity for all types of Ruby projects and cutting-edge technologies with RubyMine, a powerful IDE with smart coding assistance and advanced testing and debugging features. JetBrains RubyMine IDE includes a comprehensive Ruby code editor aware of dynamic language specifics. It provides smart coding assistance, intelligent code refactoring, and deep code analysis capabilities. With easy project configuration, automatic Ruby Gems management, Rake support, and built-in consoles, it has everything a Ruby developer needs in a development environment.
Fri, 20 Nov 2015 11:00:00 ESTNetBeans 6.0 Beta 2 is now available for download. Beta 2 comes bundled with MySQL and PostgreSQL drivers, and improvements to Ruby code completion and Woodstock 4.1 Build 14. The focus of NetBeans 6.0 is superior developer productivity with a smarter, faster editor, and the integration of all NetBeans products into one IDE.
Fri, 20 Nov 2015 11:00:00 ESTNetBeans 6.0 Beta 2 is now available for download. Beta 2 comes bundled with MySQL and PostgreSQL drivers, and improvements to Ruby code completion and Woodstock 4.1 Build 14. The focus of NetBeans 6.0 is superior developer productivity with a smarter, faster editor, and the integration of all NetBeans products into one IDE.
Thu, 01 Oct 2015 06:00:00 EDTSYS-CON Media announced that Splunk, a provider of the leading software platform for real-time Operational Intelligence, has launched an ad campaign on Big Data Journal. Splunk software and cloud services enable organizations to search, monitor, analyze and visualize machine-generated big data coming from websites, applications, servers, networks, sensors and mobile devices. The ads focus on delivering ROI - how improved uptime delivered $6M in annual ROI, improving customer operations by mining large volumes of unstructured data, and how data tracking delivers uptime when it matters most.
Wed, 30 Sep 2015 10:00:00 EDTFor VMware customers shops under pressure from users to improve their app and desktop experience, gain greater infrastructure flexibility and simplify end user computing management, Citrix has announced a free service to migrate VMware Horizon View virtual app and desktop deployments to XenApp and XenDesktop. Powered by the new Citrix Lifecycle Management Service - now available from Citrix Workspace Cloud - the new service enables administrators to do an in-place migration in less than 15 minutes by easily exporting application and desktop settings from Horizon View into the Citrix app and desktop delivery solution. The creation of the migration service addresses numerous requests Citrix has received to salvage failed, stalled and small VMware VDI deployments.
Thu, 27 Aug 2015 11:00:00 EDTI was experimenting with Java HashSet, which is a pretty expensive collection to create, but it has a benefit of the O(1) performance on the retrieval of elements from this collection. Based on my experiments performance of HashSet is improved over the last year. I’ve written a small benchmark comparing the performance of the one year old JRE 1.8.0_05 with the latest 1.8.0_51. In my tests I’m creating a HashSet containing 100000 objects.
Sat, 15 Aug 2015 16:30:00 EDTOf the many additions to Java 8 such as the Stream API and lambdas, I noticed one of the lesser talked about ones was CompletableFutures. So I decided to have a play around with them on the last Java component I wrote. My use case in a nutshell was piping large volumes of data from a distributed file system, compressing it and uploading to individual destinations on Amazon S3.
Thu, 06 Aug 2015 17:00:00 EDTCloud computing is emerging to solve numerous enterprise IT problems at organizations of all sizes, and Cloud Foundry has emerged as a leading Platform-as-a-Service (PaaS) to develop and launch applications in their private enterprise clouds. Cloud Foundry is open-source software, and available in “plain vanilla” code from the Cloud Foundry Foundation. It is also available in proprietary versions from a few vendors. However, it's important to understand that Cloud Foundry is not owned by a single, proprietary provider, and its availability is not limited to the small number of proprietary vendors. [section label="Common themes"] Common themes A few common themes have emerged from organizations who are working with Cloud Foundry as part of their overall cloud computing strategy: Governance, risk and compliance management Information privacy and security Flexibility, speed, and the ability to scale quickly Short deployment time Balancing agility, cost and control With those goals in mind, Cloud Foundry is being used across many industries. Brief summaries are provided below, and a series of use cases across industries can be found in this section of CF Live. Do you have a compelling use case to add to the mix? If so, please let us know! [section label="Logistics and supply chains"] Logistics & supply chains Logistics and supply chains represent an intense competitive space today. One Cloud Foundry user describes it as “a race” to develop supply chains in the cloud. This pace makes it impractical to deploy and manage new and updated applications in local data centers. There is a need for an enterprise-ready platform such as Cloud Foundry that allows for a quick expansion to meet new customer demand. A fully integrated cloud platform and infrastructure also allows Cloud Foundry clients to address major tasks such as database management and performance tuning, monitoring, security testing, patching and updating, reconfiguring servers, and testing updated environments. [section label="Real estate reality"] Real estate reality The highly competitive real estate sector is another that has benefited from the use of Cloud Foundry in an overall cloud environment. Virtual tours, work progress photos and community websites for home builders are examples of solutions that have been created. One image database, for example, has more than 10 million files, accessed by millions of visitors. Real estate firms have found that it's better for them to focus on their core competencies rather than maintaining and deploying the software and hardware requirements of their customer-facing portals. One application in this sector encompasses 25 separate servers that serve more than 50,000 agents, with increasing annual visitor traffic and new features being rolled out continuously. The development and deployment team manages source code, addresses the various hardware compatibility issues, with the ability to spin up environments as needed. The company can thus conduct constant development in an agile, flexible environment. [section label="Big manufacturing"] Big manufacturing Sometimes it's the technology manufacturers themselves who face the most daunting problems. One of them e[...]
Tue, 04 Aug 2015 17:00:00 EDTKnowledge management, in business terms, refers to saving, developing, sharing, and effectively using knowledge for the benefit of organization. It refers to a multi-disciplined approach of achieving organizational objectives by making the best use of knowledge. Scientia potentia est (Latin proverb meaning "knowledge is power") attributed to 16th century philosopher Sir Francis Bacon is nowadays more valid than ever. Knowledge is power and knowledge management is the key to success. Knowledge management, in business terms, refers to saving, developing, sharing, and effectively using knowledge for the benefit of organization. It refers to a multi-disciplined approach of achieving organizational objectives by making the best use of knowledge.
Tue, 12 May 2015 11:00:00 EDTSYS-CON Events announced today that MangoApps will exhibit at SYS-CON's 16th International Cloud Expo®, which will take place on June 9-11, 2015, at the Javits Center in New York City, NY., and the 17th International Cloud Expo®, which will take place on November 3–5, 2015, at the Santa Clara Convention Center in Santa Clara, CA. MangoApps provides private all-in-one social intranets allowing workers to securely collaborate from anywhere in the world and from any device. Social, mobile, and easy to use. MangoApps has been named a "Market Leader" by Ovum Research and a "Cool Vendor" by Gartner. 20,000+ business customers worldwide.
Tue, 05 May 2015 15:12:00 EDTWe’re proud to announce availability of the first complete end-to-end queue support in an APM product. We’ve been working hard on this and are excited to share the results of our work with you. A couple months ago we announced support for JMS and Rabbit MQ messaging services. Once you update your Ruxit Agent (version 1.69) you can see which queues each service sends messages to and pulls messages from. For now, this works for all Java-based services. We’ll be extending this functionality to other technologies in the future.
Tue, 05 May 2015 11:25:25 EDTThis is one of the best laid out programming books I have read in a while. The way it starts out providing summaries of Swift features found in other programming languages, Swift features that eliminate common programming errors, the list of Cocoa and Cocoa Touch frameworks, new key features in Xcode 6, special characters, numeric and boolean types, operators, conditional and loop statements, compound assignment operators, Classes, access modifiers, properties, initializers, methods, value and reference types, and making use of built in frameworks is perfect for developers from any other language.
Tue, 28 Apr 2015 12:00:00 EDTThe last couple articles presented an introduction to Application Performance Management (APM) and identified the challenges in effectively implementing an APM strategy. This article builds on these topics by reviewing five of the top performance metrics to capture to assess the health of your enterprise Java application.
Tue, 21 Apr 2015 06:02:00 EDTSince Time is a natural concept, in an ideal world, dealing with it should be simple, but unfortunately it is not the case and we humans made it more complex by introducing different time zones and day light saving. As a programmer, we want that programming languages immune us from these complexity and being a Java programmer, we have similar expectations from Java. Java tried to overcome these complexities in its first two editions of Date and Time API, but failed measurably. A simple google will give you numerous posts criticizing Java for this. Few years back, I was introduced to Joda-Time library that provide APIs that help you to work with Time with ease. In its latest edition (Java 8), in its third attempt, finally Java brought this change that we all were looking for long. With its new APIs, it is no more require to use either third party APIs or create several utility classes/methods to deal with date and time. This new API is heavily inspired by Joda-Time library.
Tue, 07 Apr 2015 19:00:00 EDTAre we just looking, or looking to see what we can improve? It's surprising that programmers are happy to quarrel about performance without trying to improve the programs. As programmers we know that small changes in the way an algorithm is implemented can make a difference, and this is one more opportunity to show our skill.
Thu, 02 Apr 2015 01:00:00 EDTManufacturing comprises 17 to 18% of the global economy, and is set to rack up about $13.5 trillion in revenues this year. China assumed leadership in the sector a few years ago and will account for about $2.5 trillion this year; manufacturing revenues in the US will approach $2 trillion. The developed world and China continue to dominate the sector. Things are less good among developing nations. As an example, the Philippines (where I have family and an office) produces about 1% of US revenue in manufacturing, with about 33% of the US population. There are slightly more than 1 million manufacturing jobs in the Philippines, compared to perhaps 14 million in the US. So the US, which has notoriously seen its manufacturing sector gutted since the year 2000, has roughly 14 times the number of manufacturing jobs with only three times the population of the Philippines. This provides a good illustration of the yawning economic gap that remains between a highly developed nation and a classic developing nation. Will It Be Fashionable Again? It's been fashionable for a couple of decades to dismiss manufacturing, instead repeating the common wisdom that we've moved into a services-oriented economy. Everybody wants to build the Knowledge Society today. I agree with the truism that old-style 1950s labor-intensive manufacturing will neither be returning to the US nor will elevate others into the modern age. Even China is now experiencing dramatically lower economic growth, and is finally starting to grapple with the enormous pollution problems the last two decades of growth have created. Meanwhile, But, we still have to make stuff. Even as automated processes, robots, and emerging IoT feedback loops bring about productivity increases, there remains a need by so many of us pesky humans to have a job that can feed us and our families. Not everyone will be a Java programmer or PHP jockey. Not everyone will complete four years of college. Meanwhile, recent studies by Circle Research and Vodafone indicate that 20% of manufacturing companies have taken up M2M. On a related note, Gartner has estimated there are already about 370 “things” in use in the global automotive business alone, with an anticipated rise to 3.5 billion by the year 2020. Reality Bites But the actual, physical challenge in developing a global manufacturing sector for the 21st century is amazingly daunting, in my view. When I'm in Silicon Valley, safely ensconced in my office or at an event, I hear and see the fantastical visions being created there for the future. But when I'm driving around the now-barren streets of west Rockford, IL (a former small manufacturing hub located close to one of my US offices) or walking the streets of Metro Manila (where my research institute is headquartered), I see the challenge up close. There is nothing virtual or abstracted about it. There are constitutional and structural barriers impeding the growth of a healthy economy[...]
Wed, 25 Mar 2015 04:02:00 EDTAzul has launched Zulu Embedded, a new offering for developers and manufacturers in the embedded, mobile and Internet of Things (IoT) markets requiring 100% open source, customizable, reduced-footprint, and standards compliant Java SE runtimes and development solutions.
Fri, 06 Mar 2015 08:46:00 ESTThis morning I got the following email from a Java developer: “It seems you are doing less Java and more web development every year.” This got me thinking, and I decided to write this blog. Am I still a Java developer after 17 years of using this language? I certainly am. But in today’s world using just one programming language is almost impossible unless you’re willing to limit yourself to the server-side development. I’m not saying this is bad – it’s a huge field for never ending self-education and research. Even from the career perspective becoming an expert in a specific Java field can put bread and butter on your table for years to come. For example, Java experts specializing in performance tuning can charge several times more than a typical Java developer. Some people become experts in security or concurrent programming, which allows them to eat an omelet with truffles for breakfast daily.
Mon, 09 Feb 2015 09:00:00 ESTNodeSource, an enterprise-focused software company created to build a robust product ecosystem around Node, has announced a $3M in first round seed funding from Crosslink Capital and Resolute Ventures. This funding exemplifies the pent-up demand for Node solutions as enterprises abandon their monolithic applications in favor of modern, scalable service oriented architectures. NodeSource's portfolio of clients includes Uber, PayPal, Fitbit, and Netflix. The company delivers powerful Node tooling to enterprise customers. The company will use funding to continue expansion with the release of upcoming products and partnerships with Fortune 500 companies. Early on, NodeSource recognized the massive opportunity for Node to transform IT organizations worldwide. With current funding, a new generation of products from NodeSource will roll out to better build, monitor, tune, and deploy Node applications effectively.
Fri, 06 Feb 2015 10:00:00 ESTIn my blog from September 2014, I wrote “encryption and access controls are your front-line defenses for defending data-at-rest. Given today’s threat environment, encrypt everything possible, everywhere possible.” While lots of things change in 6 months – the projected World Series Champion, the Super Bowl front-runner, Taylor Swift going from tweeting about dating to tweeting about hacking – this recommendation remains constant. Data-at-rest is susceptible to many forces, not least of which are malicious and non-malicious insiders. As we noted in our recent 2015 Insider Threat Report, the insider threat landscape is becoming more difficult to deal with as the range of miscreant’s moves beyond employees and privileged IT staff. It now includes outsiders who have stolen valid user credentials; business partners, suppliers, and contractors with inappropriate access rights; and third-party service providers with excessive admin privileges. Unless properly controlled, all of these groups have the opportunity to reach inside corporate networks and steal unprotected data.
Mon, 26 Jan 2015 16:00:00 ESTThe Bill and Melinda Gates Foundation recently identified four keys areas in which to focus for the next 15 years: Health, Farming, Banking, and Education. Bill himself holds forth on a regular basis about the challenges facing many billions of people in the world, particularly in Africa, as well as the opportunities to save lives and change lives. He does not seem naïve about the enormity of the challenges, and does not offer technology as a simple panacea to what ails the world. He also seems committed to respecting national sovereignty in implementing programs, difficult as that may be sometimes. And he seems to understand very clearly that even the vast wealth of his and his wife's foundation and its allies cannot hope to achieve signficant results on its own. I would add Energy, Transportation, and Government to Bill's and Melinda's list–aware that the Foundation supports these areas and many others as well. In our efforts at the Tau Institute, we then focus on how the Internet of Things will play a role in these areas as well as societal improvement and transformation overall. We've also chosen a 25-year timeframe, an thus use the term IoT 2040 to describe our activities. Our program includes research, events, consulting, and technical education. We have four overriding goals: 1. To spur beneficial economic development in all corners of the world 2. To reduce poverty & disease 3. To curtail violence as a way of settling disputes 4. To produce political and societal leaders who will maintain progress We think a good way to measure progress is through the research we've been conducting for the past few years, which creates relative,"pound-for-pound" rankings that show how well nations are doing with respect to their available resources. Our rankings reflect a lot of time spent, by me and by our associates and advisors, living in the various corners of the world. We integrate several technology and social factors into our algorithms -- on the one hand including average bandwidth, access to broadband, number of dataservers, on the other hand including income disparity, perception of corruption, human development, and the local cost of living. The most dynamic countries should correlate well over time with those most quickly growing their economies in an equitable way.
Sun, 25 Jan 2015 00:00:00 ESTThere's something extraordinary going on in Vietnam, and I'm not sure everyone sees it. The country blazes from the dry pages of our research printouts, its incandescence obscuring its neighbors and making our office fire alarms nervous. Among the 105 nations we now survey, Vietnam will finish in or near the Top 20 in the world in our overall ranking, when we announce our latest results next month. It will be near the top in Asia. Our overall ranking integrates several socio-economic and technological factors. Additionally, Vietnam will rank near the top of the world in our pure tecnology development ranking. In contrast, Vietnam continues to lag in the traditional economic development rankings that I've read. The United Nations' Human Development Index places it 121st among 187 nations, tied with Guyana and trailing even Syria and Iraq. It fares a little better in the World Economic Forum's Global Competitive Index, finishing in a tepid tie for 65th among 144 nations, in the neighborhood of Peru, Colombia, Slovenia, and India. Another ranking, the Asia Cloud Computing Association's Cloud Readiness Index, places Vietnam dead last among 14 nations surveyed. Damned Lies & Statistics The country's mediocre to poor rankings in these surveys and others is no doubt strongly tied to less than $2,000 in per-person income, ranking around the bottom quartile of world incomes. Compare this amount to about $2,800 in the neighboring Philippines, $5,600 in Thailand, and $7,000 in China. Yet this statistic, as with all single statistics, doesn't tell the whole story. Our research takes the view that relative developmnt is the key; that is, how well is a country doing given its current economic resources. How strong are its underlying IT infrastructure and overarching societal development with respect to its overall wealth? And how dynamic is its environment? How quickly is its pace of change increasing? By these measures, Vietnam is a star. Its global buzz has diminished recently, as years of rapid development following enactment of doi moi (renovation or innovation) reform policies in 1986 led to uneven development and societal stress. Indeed, our research also shows Vietnam running “too hot” in our Goldilocks Index of pure technology development. How long can it sustain its current pace? (More later...)
Thu, 01 Jan 2015 09:00:00 ESTAnother year comes to a close. What did we see as significant technology events? In the disruption category, we saw Uber getting valued at $41B even with all its issues in the news. When you disrupt an entrenched business such as taxi service, it is only natural that resistance will happen. But consumers like me love the value-added service from Uber. This is unstoppable as evident from the investor’s confidence in providing $1.2B funding. In the disruption category, companies like Snapchat, Instagram, Airbnb, Instacart, and others made good progress. Re-imagination is the catchword here. See my blog on that topic.