Saturday 27 August 2011

Ness For Restaurants Is a Mobile Search App Based on Your Preferences

Ness is a mobile search application based on your preferences for restaurants

Hungry, but do not know where? Ness of Social Communication, restaurant ratings, popularity and friend means restaurant that offers personalized recommendations based on the application using the restaurant search.

The final results for the implementation and we welcome the results that are most familiar with the area before the rate of at least twenty or thirty immersed in restaurants. Facebook Connect and Publications 1-5 star background helps to refine the recommendations.

Applications Software Developer Ness like shopping, music, and plans to launch in other categories. The ratings of similarity that combines personal and social media have spent many years developing its own engines. Ness restaurant is the first application.

Ness restaurant for free download from the iTunes Store.

Android Parental Control Contains Kid Access to Your Smartphone

Android Parental Control Contains Kid Access to Your Smartphone

Android: I often phone my son and we have to play angry birds at least twice managed to delete a contact or e-mail. Children can use only approved applications, parental control, so that allows users to lock Android phones, a limited application for an administrator password is required to access them all. In addition, the application as soon as you start your Smartphone for children can be configured to restart the phone can not be overcome constraints.

In addition, children can access applications approved and the display to show the "sandbox" permit. It's a little frustrated when you can open the applications you want to test is perfect for explorers. Applications are selected as never seen before.

The application works well and is free. These children access to inappropriate application or obtain information without having to worry about them, or let us have the ability to videos on your phone if you want a look at the atmalısınız.Uygulama was not an updated since last December, but developers often seem to use the Facebook application page.

Parental Control is a free application on Android Market, Android.

Android Parental Control | Android Market

Wednesday 10 August 2011

Data Storage Strategies for data on the expansion of the great powers "of new ideas

Too much information and too little ability to process and understand: the first is a human problem. Computer technology is, of course, automation systems, editing and analysis tools by providing assistance and information has increased in size. But now this kind of websites, mobile devices such as sensors and produce an overwhelming flood of data processing systems and other data sources - or ignore - build strategies for data storage and past frames.

There is talk in circles, or "big data" - a new challenge for computer equipment and data storage, how to deal with this tsunami of information with new tools and techniques to optimize their existing investments in technology for data management.

At least, Forrester Research Inc. analyst Brian Hopkins, a fairly large volume of data requires a rethinking of traditional data warehouses and institutions. For example, Hopkins and the integration of certain types of large volumes of data in a central data warehouse, data marts separate hub and spoke connections will be a challenge, he said. Data warehouses primarily focused on structured data, he said. But what are classified as very large volumes of unstructured or semi-structured.

"In a sense, is to head down the assumptions major data storage," said Hopkins. The traditional answer specific questions focused on data warehousing and business users, business intelligence environments, data is cleaned and to extract, transform and load process, and eventually became Reports and ready for analysis. According to Hopkins an organization's data is generally less than 5% ", sometimes much less" is used.

A new twist on strategies for data storage

Instead, the data focuses on key strategies are often a lot of information. In addition, the version "full reality of the 360-degree compatible with the concept of a large database of heaven evaporates completely," said Hopkins. Directed by the so-called virtual data warehouses and analytical added complexity of managing storage hardware and data and may require heavy processing power, large data environments are common.

"The large data models with the most interesting and anomalies, there must be," Wayne Eckerson, business applications, TechTarget Inc. Director’s research and the media, said the architectural group. "But I have a lot of him because he is much more difficult to analyze large volumes of data we have. Expensive in this area." Many organizations are beyond traditional data storage and is in the open source Hadoop MapReduce so that this type of account, as emerging high-tech evidence, Eckerson said.

Richard Winter, president of Winter Corp., a consulting firm in Cambridge, Mass., data storage, focusing on the data before analysis to obtain a business opportunity would be difficult to identify different offers. It was developed for the treatment of asthma, a new "intelligent" sample showed an inhaler, an inhaler is used, and the wireless technology is a function of the patient's identity and sends the time and location of the base.

"It is, for example, are downloaded to a load of potentially allergenic soy products, soy powder, put in the air may be possible to combine this information with information," said Winter. These correlations can help medical researchers better understand the characteristics of asthma, he said.

Grand Challenges Data: Volume

However, there are potential problems of data management: the devices became widespread in the winter, millions of people worldwide to a substantial improvement, and begins to use the "generation of stored data needs to be said for a long time and is ready for analysis.”

Professionals and storage of data, important information you need to understand not only the volume, Philip Russo, the Data Warehousing Institute (TDWI), the managing director of research data says. "Other features are very important," he said - for example, large volumes of data, including Web browsing, can be very different, in fact, point of sales data and Call Detail Records, text messages, social networks and various types of information.

Large data installations face the challenges of managing, headlights like a deer famous Russo, many organizations, he said: They understand the potential value of knowledge, but over the data was abandoned with the challenges of managing a very traditional process of storing data is not particularly practical.

For example, customer behavior - - to prevent this type of stroke, Russo, investment advice, an area of ​​high returns in an attempt to maintain a strong emphasis on the data to find ways to reduce and then apply knowledge of traditional and new tools to help you take control. "Select a topic to get something useful," he said. "Do not think that the need to keep track of all the questions."

"Great knowledge" Analysis of Major Challenges to Traditional Approaches

Terabytes or petabytes, quickly became a reference point for data warehousing business, many companies are obsessed with the volume and diversity of "large volumes of data." However, usually the storage of large volumes of structured and unstructured materials, analysis of the problem is ignored - that goes with it is usable, real-time business intelligence (BI) to convert the raw data, smarter decisions.

Traditional relational data warehouse and business intelligence initiatives, and many planned to add some data available on a regular basis and supply of mature products to benefit from a well-defined applications. His intention is that companies users can slice and dice data and general information about what is happening and to allow you to create reports to answer questions that the. For example, "What is the revenue for a specific region for a given time?"

Open the door for companies to explore the information models, many of these contracts to shake the established idea of ​​applying data analysis, might not have thought otherwise; ask questions, and finally the creation of strategies to provide a competitive advantage.

"Over the last 20 to 25 years, companies can take up to 5%, perhaps focused on the information presented to them," Brian Hopkins, of Cambridge, Massachusetts, principal analyst at Forrester Research Inc. "All we said, did not know what to do with the fall on the floor and fell into space. better able to compete for companies seeking to penetrate 95% of other data is swimming around them; they can do better than anyone."

Struggling to keep up with the traditional RDBMS

Aggregates, unlike the traditional relational database (RDBMS) with the efforts of structural data processing, large data warehouses with data feeds from various sources, including hard flooded social networking sites like Facebook and Twitter, blogs, daily activity, information from Global Positioning System location bar code readers and RFID readers to talk about traffic and the machine creates the data produced by the sensors.

Stamford, Conn. Gartner Inc, a growing information estimated the overall annual volume of 59% and the volume of data and to cope with the diversity around the block when there are difficulties in the speed or how fast data can be processed in connection with large companies to offer certain advantages.

Data management of this concept, both economically and to manage the volume and speed requirements are not appropriate for the so-called traditional practices of large data storage systems, and there is excessive pressure on data BI in terms of performance.

"To achieve a more precise analysis of the new rates, or how to use the detailed analysis of the data have a paradigm shift in terms of" David Menninger, Ventana Research, Inc., San vice president and research director specializing in the management data strategies Ramon, Calif., consulting firm.

Large-scale data analysis, more data processing

Key paradigm for the analysis of volume, variety and speed of data on a massive range of new technologies designed to meet the challenges. At the heart of the new movement of massive parallel processing (MMP) will automatically get an important commodity to collect more than one server, and parallel to the workload of database technology divides the database performance, while working with very large data sets.

This basic architecture, while accelerating the speed of a user can ask questions, rather than the line used to reduce the amount of storage space in the columns are the columns of data and results database to store data. Database analysis, designed for large workloads and analysis of BI, companies to respond to requests faster and more efficient and economically gain access to large amounts of data are evaluated for a technology another. The same with real devices for data storage and server technology, storage and data management practices for the needs of large databases in a series of integrated packaging.

These skills tend to play outside of the Core RDBMS technology, however, for a significant amount of attention when it comes to the analysis of large data are relatively new. Community Hadoop open-source platform, especially as data, text, video, social media publications and manage large volumes of unstructured data streams is one of the most widely reported new measures. Distributed clusters with Hadoop file system based computers, data warehouse and data on the treatment of primary progressive Cassandra large data sets, including the MapReduce framework, which develops new technologies, is the beginning of the shell and other projects.

Draws the attention of large volumes of data used in Hadoop

More than 163 participants (54%) more than half are still large volumes of data-based initiatives as part of Hadoop to use or evaluation of the "Management Hadoop and information," according to a new report from the data Ventana Research benchmark from a large number of previously could not have done more desire to analyze data and analysis. However, this first wave of enthusiasm, despite the tools relatively immature and real-time analytics Hadoop only a handful of packages designed to protect users from the complexity of the source technology is available today to open it.

New technologies for data storage professionals is a challenge, however, the analysis of large data move to a real problem for companies that want to do more important for the ability to move or risk losing the business high volume.

"Skin that has been around for a long time, but rather much more," he Yvonne Genovese, vice president and analyst at Gartner, said. Information and knowledge to turn data into action and the directors of data storage can really make his mark, he said.

School Data Security Leak to ignore the Password Policy

A case manager Hampshire student school system submitted to a complete and thousands of staff was forced to apologize after the seizure.

Bay House School in Gosport in the March attack, the Information Commissioner Office (ICO) and the school will be reported immediately to implement their own policies better now initiate a public security company.

The statement, the ICO some 20,000 people, including approximately 7600 students, personal information was compromised in an attack on the website of the school, he said. The files that are under threat, as well as information on medical students, parents and teachers to include information on.

A staff member of the school using the same password to access the Internet and data management systems, because according to the ICO, the attack is made easy. The staff, after the discovery of the password, time away from piracy Web site was hosted by the school administration of the student was able to access their systems. Avoid using passwords that repetition of the school said the staff recommendation, but the policy does not apply.

Ian Potter, head of school, "students of the school, including at least one of the hackers," saying he is responsible, considered a violation, and issued a statement on the website of the ICO.

Potter and the "sensitive and confidential information, a separate code and information data management treatment based on the identity and contact information, the system" and pledged that it will be the necessary training of staff must be aware and Password Policy. The school is also an annual penetration test.

David Emm, Kaspersky Lab researcher added security, the situation is more properly applied to the need for Security Policy Password and highlights the need to prevent the same password for different systems, he says, but it is difficult to accept that users of this complex and mixed letters lowercase letters, numbers and special characters, especially the many I remember the password. "But I have a solution," he said. "An administrator password of the application, for example, sheltered behind a single password to create and remember passwords and stores. On the other hand, people in all basic, easy to remember and use the password for each account to some of the rules. "

Peter Wood, director of the Computer has agreed to Brighton in the First Floor Council. "Password again become a big problem," he said. "Database Password LulzSec anonymous friends and took some great hacks on the back of this issue has been published to understand."

Easier for users to remember passwords with three or four words to protect the defenders of the use of a program manager password, but more difficult to break.

Penetration testing of wood, vulnerability is a weakness of common passwords, he said. "We have very large customer of a small six-digit password. So what will happen to change the effect of the length of time and do not know what services were used because they did not dare change a system that had, "he said. Another common source of where the security services account deficit, for example, the password 'backup' backup service will be added.

Nexsan NAS own line, E5000 Platform Weaves

Nexsan Corporation, Network Attached Storage (NAS) is given on another occasion. Today and spread the supplier to improve performance of software caching, a file with the IP provider and solid state drives (SSD) has launched a range of uses Nexsan NAS E5000 platform.

Nexsan NAS went on the road with its partners in the past. In 2008, the Windows Unified Data Storage Server (WUDSS), a manufacturer of storage devices connected to a NAS gateway (called Edge) published. The channel package for low-end NAS head and ONStor storage Nexsan joined the meeting.

This time, Nexsan NAS E5000 M-series to set up their own Assureon CAS (Content Addressable Storage) technology-based and block Using Series arrays.

"This is the first NAS product for control of the stack. We must rely on the vision of someone in the roadmap," Gary Watson, Nexsan founder and Chief Technology Officer said. "This is the beginning of the family. I have a roadmap in front of us."

The roadmap includes a unified storage, Nexsan NAS E5110 E5310 and models, but there are now. Both use the SSD cache FASTI Nexsan D / S applications, improves the performance of workloads.

FASTtier SSD cache, such as reading and DRAM PCI card, single-level cell (SLC) and the company multi-level cell (eMLC) flashes. Write support multi-technology

E5000 systems support for CIFS and NFS. Nexsan except to say that the elements of Unix administrators, there was more information on the file system. "We Assureon Series E and technology base for us to create products that people say, but we want the freedom to make the cover of" Don Chouinard, Nexsan, director of product marketing.

3U or 6U configuration E5110 8 TB 62 TB capacity with 100 GB SSD option comes with a couple of checks and balances. This controller by two Gigabit Ethernet (GbE) and two optional 10-GbE controller with up to 31 discs on a platform for expansion there.

3U dual controller model 5310 with a capacity of 9 TB 720 TB cache scales up to 1.5 TB FASTI. 18 to 240 discs. Device, E18, and SATA, 7200 rpm SAS 15,000 RPM SAS supports the E60 NL-block can be extended with Nexsan storage arrays. 5310 four GbE ports per controller, and includes two optional 10 GbE.

E5310's price band to $ 82,000 $ 183,000 depending on the combination of E18 and E60 expansion rack while the E5110 price is listed as $ 15 000.

E5000 preparation for the functions of the software online, pictures, less the amount of replication and includes the Active Directory and LDAP integration.

Watson FASTI virtualized server environments, I / O is optimized to handle applications, he said. "FAST media helps a lot faster," he VMware and Hyper-V applications, and the effect of being a random mixture of the cache in a blender, the workload of the SSD has a faster”, he said. "

E5000 model, operating system, hard to read-only memory (ROM) because it is the Terri McClure, senior analyst at Enterprise Strategy Group, as the memory controller in the operating system. This speeds up the opening, and other system functions and performance, reliability and help to implement caching for the SSD sense.

McClure, E-Management Center graphical user interface, compared to Apple. Swimming, photography, volume management, asynchronous replication and high availability using clustering wizards help you create a graphical user interface.

"I grew up with this Apple product will appeal to a new generation of storage administrators," he said. "At the same time, a storage manager is not necessarily good for small businesses and medium enterprises ".

Microsoft Patch Tuesday: Internet Explorer critical updates to Windows DNS

Microsoft Internet Explorer and Windows DNS server, including the fundamental changes affecting two to 13 security bulletins, patching 22 vulnerabilities published throughout the product line.

Fewer updates during the very busy month for system administrators as Microsoft is still marked in August released this month. Adobe Systems Inc. publishes a monthly cycle sets, with seven players Shockwave Flash Player with more than a dozen holes and repair defects in a bug in Flash, on Tuesday night released a security update critical for Media Server.

Two zero-day vulnerabilities in Microsoft Internet Explorer flaws, including seven in the vehicle. MS11-057, according to Microsoft, an attacker who successfully exploited these vulnerabilities, it can have the same rights as the local user. Microsoft, Internet Explorer uses a specially crafted Web page showing the most severe vulnerabilities could allow remote code execution he said.

IE flaws affect all versions of Internet Explorer, including nine as well. Updated IE handles JavaScript handles objects in memory and drivers resolves the errors. For most organizations, the IE update will be applied automatically.

Jason Miller, director of research and development, Shavlik Technologies, VMware, IE and Windows DNS error failures allows cyber criminals to attack a remote system, he said. In the case of a deficit, "the wild, it is important to know as soon as possible," said Miller.

Patch Managers must also address the vulnerabilities on the server side. MS11-058, Windows DNS server resolves two security vulnerabilities. Defects affect a customer request to a DNS server instead of server-side. The relay of the company's DNS server DNS cache is enabled, the system is at risk. Otherwise, the DNS feature is not enabled; users are not at risk, but to be on the safe side not to distribute the said Miller.

Vulnerability in Remote Desktop Protocol from another bulletin MS11-065 stands. The security bulletin was considered important to users of Windows Server 2003; Microsoft said Miller had seen the attacks on the nature of the failure. An attacker can crash the computer system of the victim sends a connection request to a Remote Desktop Protocol malicious fault may become a target.

All security bulletins summarizing the details are available on the Microsoft Security Response Center blog.

Repair defects update Adobe Shockwave Player

Adobe Systems Inc., and the affected system to gain access to sensitive data can be used by an attacker to run malicious code on the Shockwave Player, a critical update released Tuesday, Sept. security vulnerabilities identified.

Adobe also released an update to Flash Player and Flash Media Server. Upgrade Flash Player error than a dozen have been identified. Update, Windows, Macintosh, Linux and Solaris, Android and Flash Player 2.7 and Windows, and Macintosh versions of Adobe AIR for Android affects users of Flash Player.

In the meantime, users of Flash Media Server can cause a denial of service on an affected system to fix a critical vulnerability in Flash Media Server 4.0.3 or 3.5.7 are encouraged to upgrade.

Cloud BI and Analytics: Should the cloud be in your BI forecast?

The cost of this technology and the complexity of business intelligence (BI) and analysis programs that have the potential to reduce both the proponents of cloud computing. Grants Pass, Oregon, at the end of July, the Pacific Northwest BI Summit in 2011, with the participation of experts in business intelligence managers, and providers of cloud computing, cloud the debate focused on organizations users, taking advantage of technology - and it seemed to respond.

Some companies may help analysts quickly with limited IT support that can perform a technology service (SaaS) business intelligence and analysis, using the software. Some stores data analysis virtual analysts, project, or to search for Hadoop MapReduce and experience to offer cloud services and cloud data. And some companies, security fears, the hidden cost and complexity have hindered side to be cautious. The words of one participant, the participants of the summit, agreed that the cloud and SaaS BI vendors, "-. There is a kind of rebound along the fast-growing, but is out of business”

This video series Q & A, Bi and IT professionals, BI cloud of potential investments, weight, other entities and their business intelligence and analysis programs as part of experts on how to use cloud technologies will have an overview of potential problems and take into account the initial BI and cloud patterns, as well as recommendations for the idea.

Optimization practices to improve the delivery of Web content rewrites the HTML

Optimized web applications and technical data centers usually have a protocol layer packet compression in which the use of game controller application delivery, SSL offloading and load balancing, caching. However, for best performance of a new class of merchants to optimize the HTML itself reached an even higher stack.

The self-proclaimed experts to optimize Web content, Web pages so that the new company's browser will automatically be charged on the more efficient algorithm is developed to write HTML.

Strangeloop new businesses in this area and AcceloWeb Aptimize include, but are interested in large companies. Google on its services Web content optimization, launched Page Speed ​​Service. Riverbed WAN optimization technology provider and content distribution network Aptimize bought last month (CDN) provider Limelight Networks AcceloWeb bought last spring. Strangeloop has developed an alliance with a CDN provider Akamai.

HTML coders are not network engineers

Programmers and HTML web designers, network engineers do not think like. This is a functional and navigable browser available; I'm trying to create web pages, but every time I do not think the network efficiency. A Web page with 20 images, each image to download a user is a real resource drain may have to travel 20 laps.

"Incredibly bad programming practice, because many Web applications, browser-based application, use the program using low-performance vehicles," Joe Skorupa, research vice president at Gartner.

"People respond to demand a great influence on how to build an HTML page that does not understand. If you use a style sheet or style sheets, five years. Whether it is a cache load of all jobs, the JavaScript code. Now to lose a server browser, or leave at any time. When you download the JavaScript in your browser, the browser stops. "

Web content providers to optimize and rearrange the controls on the front of a scanner and a Web site hard-coded to provide the most appropriate way to restructure, Skorupa said.

Network Manager Mark Currence PrintingForLess.com (PFL), Livingston, Montana-based commercial printing is a cloud on the Web Strangeloop last year began using the services of web content optimization. Service, the website automatically optimize the efforts of the company are.

First, the PFL, web content optimization, "This is definitely a certain section of the site is slow, the difference was a single type of thing," said Currence. "We gave permission for the optimization of all levels of Strangeloop. Our developers and optimized for this particular situation is gone. And when we change the code, you can update the system and optimized. This does not mean not that we stop the optimization of business here, but we have a problem, even I know that I know will help us forward. "

Currence Strangeloop optimize Web content is the primary means to optimize application delivery today. In addition, Microsoft uses the load balancer. The company also wants to move with the growth of the full ADC.

"Geographical load balancing or SSL acceleration? I certainly did. When applied, some of our components require the re-architecture. So in the future. Strangeloop an easy first step. This guy is it also a business side of our business because we can see a direct benefit to get traction is an easy way. We are more likely to invest more to make them see the performance of investment dollars. "

Cousins’ application delivery controller, to marry soon?

Optimizing web content is not yet on the radar of every major news in the Gartner Magic Quadrant is a visionary in his two and Strangeloop Aptimize when adding technology profile, there is a great impetus to the end of the Last year, praised the deployment of the pilot application (CDA). Optimization of the ADC, which produces Web content providers, though not, Gartner said that the products are often distributed with the other.

In fact, over time, the ADC is a highly functional features of Web content optimization can become another. CAD-based software provider Zeus Technology provider, recently purchased by Aptimize WAN optimization technology, Riverbed. Riverbed aims to integrate the two products purchased.

"We believe that the appropriate product of Zeus Aptimize ADC," Paul Farrell, vice president of corporate development and strategy, said at Riverbed. "Now Aptimize sold as a Web server plug-in. In the future, product development and will be integrated with Zeus. "

Joshua Bixby, Strangeloop, president and founder, a person selling their products directly to the product as a service on the hardware platform should be preferred, he said.

"Today, you can sell OEM'ed Dell servers, but since I'm not much today with Akamai, the distribution of content associated with a F5 or Juniper box, or would be," Has he said. "We're not a hardware company. At the end of the day, instead of the customer relationship with Juniper or F5 or whatever [Hardware] was. "

Contract negotiations with the evolution of agile development: Q & A with Angela Druckman

The organizations recognized as an agile process, the application process of negotiating business contracts Agile to see if the equivalent. Angela Druckman Agile2011 co-presenting the stakeholders in an agile, practical issues to consider when developing partnerships with Jimi Fosdick. To get the scoop of your presentation to the following interview SearchSoftwareQuality.com Druckman.

Q: We "contract" what are you talking about? SLA? Contracts with suppliers while working? This document is legal?

Druckman: It is an organization for the promotion and such advice, recruitment agency or by mutual written agreement between an external entity, talking about the legal agreement. But both sides and we found a very agile, to carry out the work as a software development project where the emergence of a combine. These agreements should be changed to support the process of defining and writing the road again.

Q: The "Agile" to talk about contracts, agile development practices (for example, allow changes) talks, or negotiating contracts for agile practices (eg, cooperation, etc.) related to the use of speaking?

Druckman: Agile practices, and the process of negotiating the contract itself and the preparation of almost all aspects of these agreements, and will affect the key. But clearly the fact that both sides of management roles and responsibilities, artifacts, and called for job creation describes how to work together to change the approval process is "done."

Q: Who do you think of this preparation of agreements; review and approval should be included?

Druckman: It should be a shared process between the two sides of construction contracts. Should include a variety of stakeholders. This list, end users, management tool, as groups and partners may include third party. Current team members are based in this product also participate actively. Plan, a framework to use the Scrum agile project structure, the Product Owner and ScrumMaster also part of this process. Finally, people actually write the contract - ScrumMaster, product owner, or someone else entirely - will also attend.

Q: The summary presentation of the standard frequency models for contracts, the companies say not compatible with the Agile process. Could you give some examples?

Druckman: Closed style, models of cascade product development to identify the most standard contracts. For example, a contract of this type of finish, signed a Requirements Document (BRD) may need before starting to develop the actual product. But in the final product by BRD their accumulation, are the Scrum agile methods, such as requirements, not only appropriate, at first, but continues throughout the project. In other words, any contract language that describes this narrow focus now should be reviewed to support a more interactive approach.

Similarly, the requirements of the contract provides a part of change management describes the process of making changes to the list. Additions and subtractions to these terms of speed and with the potential of each, to be developed systematically for a fact that the contract language should reflect this flexibility.

Q: The use of contracts to define the roles and responsibilities in a conversation about agile. Roles and responsibilities for everyone, or only for the uninitiated?

Druckman: At a minimum, the contract must explain the details of these three documents. First, it is important to consider the prioritization and approval. Scrum, the responsibility of the owner of this product. Which party has the proper role of the contract clearly stated? Second, the agreement must also team commitments to undertake and the team delivered the final word on the number of each iteration of the process that will clearly explain that. Finally, the contract should be the party to give a major role in Scrum. Without taking these measures will help prevent job progresses, confusion and misunderstanding.

Q: The negotiation of the contract negotiations of any contract negotiated for the current agile? Models will be available?

Druckman: We are working quickly to deal with a business model that defines the responsibilities and expectations of a specific language be added to the model contract. However, many companies fully support the implementation of agile and Scrum, project management, while others are deleted, added to the parties, the contract type can be a major operation. For a large-scale change, it is recommended that organizations seeking an agile coach. An experienced coach, not only contracts but other project artifacts, and a desk, can help organizations address the needs of the business documents and design documents. In addition, the rapid change in a car to meet their needs in this period, business groups and work closely with legal compliance audits.

Q: If a big lead in this session, participants will be what do you think?

Druckman: Customers and consultants to work with an agile decision must realize that can produce a radical change in relations. Contract agreements and is more about mutual benefits, I am trying to gain an advantage under. Both parties are working together to transform the way we do business this way to eliminate inefficient processes in the spirit of cooperation and commitment can approach the negotiation process.

Report of government spending may lead to the adoption of virtualization

A critical report on government spending in the public sector in the UK may encourage the adoption of virtualization and cloud computing.

Choose the European Parliament Committee on Public Administration (PASC), the general report "obscene amounts of public money" and accused the government spending for development and implementation of new computer systems are described in the depths of his "appalling." The report's findings in the cloud computing environment, and virtualization experts have identified opportunities for cost savings has to offer. They are a more powerful way to reduce spending, the government urged to explore these possibilities.

"Government IT projects are certainly losing money on systems running the application to stop the need for a more intelligent approach," Hamish Macarthur, founder of Macarthur Stroud International is a consulting firm and research said. "Virtualization is one of the options."

Pay-as-a-to-use business model, cloud computing can also help reduce government spending, Andy Burton, clouds, cloud computing advocates best practices for the Forum of Industry, said the president.

"Rather than the traditional [operating expenses] payment model, [capital expenditures] to pay to use the model, the government will benefit not only to pay for services," he said. "Departments have reduced the cost of the advance."

A low cost of ownership of infrastructure re-investment and ensure that government departments do more with less. Cloud computing, as well as to promote the use of technical personnel more effectively and efficiently.

"Labour costs, it represents 70% of the computer operating alone," said Burton. "Standalone application that cloud computing is the traditional IT resources and eliminates the time required to ensure the effectiveness of spending."

Virtualization is already important to note that the government made to specific areas of IT infrastructure. A number of ministries - Transport for London, Ministry of Labour and the Environment, Food and Rural Affairs and the National Police Improvement, including retirement - according to a report, a server and / or desktop virtualization, Citrix uses the Parliament earlier this year.

Learn the private sector

Government IT professionals with virtualization and cloud computing, if you're concerned about, how they reduce the efficiency gains in physical infrastructure and private sector organizations have used these technologies to search.

"They can learn a large private sector companies have consolidated its IT infrastructure," Galen Schreck, an expert in virtualization, Forrester said. "Large companies are using virtualization to reduce silos. This also contributes to a holistic view of IT infrastructure. "

Improve the government Agility

The report recommends that government IT departments PASC agile and easier to adapt to changes in programs that enable the methods used for iterative development.

"What he has done before, often with current computer systems developed by the government," committee member of Parliament in the report.

Thanks to virtualization as a core infrastructure to increase agility and infrastructure flexibility can be sure that the government, said MacArthur. The excessive dependence on a few large suppliers to the government: the inflexibility of this problem, the report refers to another topic.

"Vendors and service providers are not very flexible," said MacArthur. "Accordingly, the government teams are trying to start the deployment of new technologies. Small and medium enterprises, technology vendors, easier to implement further savings of flexibility."

Government to reduce the size of their contracts to expand the supplier base and a way to speed up the procurement process, said. The agility of IT projects, in turn, reduce the risk of major projects linked to the general, said Burton. In the long run, it is usually the "bad faith" restrictive contracts and systems sold in this way, "excess" of whistle blowing to the inefficiency of public spending, he said.

Sometimes The Best Option is a Small Application Partners SAP

Large and well established provider of SAP services have advantages over smaller, less known in terms of reputation and a large number of resources, "Level 2" SAP applications can benefit from the equivalent of "a-li ".

In fact, many people Liz Herbert, Cambridge, Massachusetts, senior analyst for the hands is easier than the strings, may sell the project to find comfort, go with a well-known product-based Forrester Research Inc.

But the road does not mean that all the time, Herbert said. Small businesses can offer great things can not be providers. For example, small businesses can often be cheaper than the average of 10%. This can be more flexible in terms of pricing. Level 2 lose at least 2,000 SAP experts SAP service providers and service revenues of 200 million Euros, is defined as the SAP said.

"The important thing is to be open-minded on this issue may be beyond the suppliers [companies], large corporations, multinational companies, where 15 or 20," said Herbert.

"Attention more, better pricing, more flexibility to our customers receive only the level-2 and I want to work alone, sometimes," said Herbert. "But in other cases, the best source of niche, specific industry often capacity."

Taking into account four main areas

In general, market report new title: Service providers of level two, SAP, SAP Herbert describe the basic areas into account when assessing small suppliers:

  • Industry Experience: relevant sector expertise only begins with customers to find, but in many cases, such as market prices in the retail market Vendavo SAP industry-specific requirements of the accessory. Customers should look for suppliers with extensive experience in the industry. 
  • Understanding of local needs: Many SAP customers, including corporate tax and legal requirements, process consultants who need to understand the needs of local markets. But also according to Herbert, an understanding of the business can usually be done. For example, a company with local expertise in SAP CRM is a provider of applications, such as sales door to door in this country, a special application of these rules could help some companies. 
  • Online service expertise: such as Accenture, CSC, IBM and Tata Consultancy Services, multinational partners, such as process consulting, technology services, including implementation, including SAP offers life and support the level 2 suppliers are generally smaller than Forrester, focuses on one or two. These small businesses need help in finding a partner specializing in the field must choose one. 
  • Sufficient information: most of the major service providers to provide detailed information on the SAP modules, despite the small vendors, including Hana and analysis of these new areas such as CRM, can provide more difficult to find assistance, mobility, and Sybase, and environmental health and safety (EHS).

Banner Pharmacaps Inc., High Point, North Carolina-based private pharmaceutical company, is a provider of specialist consultancy service, cause Clarkston medium enterprises.

Production Planning and banner materials management and warehouse management for funding, including a number of modules of SAP ERP deployment, instead of looking at four different ERP systems. Automation of warehouse management to help the mixture was added to a radio frequency module.

Banner serious Bill Bissinger, the parent company according to the information agent, never considered one of the largest providers of services. Large companies when running is that I want to create a new set of core business processes, he said. However, Banner wanted to go with a company that specializes in the pharmaceutical industry and can help prevent re-create the wheel to go with the established practices of the industry best medicine.

Banners can be in the system, and one company are looking for a good fit culturally and running as soon as possible using accelerators and distribution methods. Company to keep things moving throughout the project to avoid the scope creep and believe that tangled.

"I wanted to have a methodology for world-class project," said Bissinger.

Live up to the time of planning the project took a year and a half. Clarkston short-term success and long-term employees, and took an interest in the project Bissinger merged together into two parts as scheduled.

"The team that attempted to examine the end to lose," he said....

Experts debate benefits iPad native application vs. virtual EHR

Between doctors and nurses, consumers iPad adoption is growing at a much faster rate than the general population - and I want to run their own systems for electronic medical records, the third annual summit of the leadership of Congress, said a mHealth panel of speakers. This leaves IT managers with a dilemma in hospital EHR implementation of the iPad: iPhone native application or run a virtual office?

There are advantages and disadvantages. Offers unprecedented security in virtualized environments - and by extension, HIPAA compliance - the speed and capacity at the expense of IPAD and the IOS operating system adapted to contact with the screen.

On the other hand, local systems of iPhone EHRs, increase productivity, this fans swear IPAD scrolling, page flipping, and other features, design IPAD allows a better fit. The iPhone is lost or stolen; however, these practices also create a risk, and require additional safety precautions. Development of internal resources to local programs, many hospitals can not afford or require customization.

If you can get employee buy-in for the implementation of EHRs in general iPad, Dale Potter, The Ottawa Hospital, which is relatively inexpensive, said senior vice president and CIO. "These devices are $ 600," said Potter. "These doctors, some medical equipment for the move - [as] a stethoscope -. It can cost much more"

Indiana EHR implementation of virtualization

"Either native virtualization" First, decide, Deaconess Health System CIO to buy or an employee of a hospital iPads provide personal devices for use in the network, or Todd Richardson said. O West Kentucky, southern Indiana and southeastern Illinois, serving the system, took the second approach for the six hospitals.

Everyone has one really wants - your organization such as mobile phones, tablets, has accepted the idea that a personal investment. Capital expenditures and business to continue throughout the iPads to eliminate the need not only that this kind of thinking. But at the same time, personal data and communications applications such as monitoring devices, personnel records, and music. Updated or not - in addition, the political market iPads faster, higher capacity of medical staff to lobby for updates "arms race" prevents.

"I pinch me, of course, makes you sleep better at night knowing that CIOs have to deal with, like," said Richardson. "And they take care of better."

As a result, no one right and a wrong way to implement EHR is the IPAD, hospital virtualization EHR systems existing Epic Inc Citrix Systems, Inc., Richardson decided to use , he said. "Unlike health care systems and cultures have different ways of doing things. Clearly work at a place in Waterloo, Iowa, Evansville, and Santa Fe, which does not work. "

With the implementation of all patient data stored in virtualized iPads DSE. This facilitates the administration of large HIPAA. Richardson, making your system work harder to challenge the position of doctors leaves the network access points that require creativity, including lead-covered buildings, said that establishing a wireless connection in its own facilities. This was particularly difficult in difficult areas such as stairs. Then came the security issues of wireless network and provides the bandwidth priority for physicians.

The transition was not perfect for the medical interests of the IPAD Richardson will face the learning curve is so great, he said.

"I check the orders and things for iPhone Owensboro [Kentucky] could not connect to the call and cry because I had an experience of a brain surgeon," he said sheepishly. "If you have a brain surgeon with a loud voice that [he] won the battle [his] iPad, -. Now the war is how to connect is not connected"

Canadians to put their own EHR iPad

Potter, Canada's largest academic medical center, CIO, the operating system iPad Touch screen has decided to offer very efficient - and traditionally like big savings compared to PCs - it's literally bought it. So far, applications to write thousands of medical devices and software developers to buy 124 of them work for Oasis iPad Healthware move their EHR system.

This computerized physician entry (CPOE), it seemed like a bad practice came to this decision after seeing a few providers shows. What you see as a successful application in the management of its board of directors does not supervise the filming, he said.

Meeting coincided with the first version of the iPad. At that time the clinical leaders in the current draft, after four test launches, and this work iPads convinced - and sank after the sources, the first two weeks of tests to ensure a better functioning of the candidate IPAD virtualized.

"The doctors came back and said:" It's really a game that will change a change, the struggle of doctors with the virtualized interface and see the "bitter", he said, adding that at Potter "medical images, graphics and laboratories using delighted to see the iPhone to show how.

The Ottawa Hospital - bedspreads and four hospitals in 1300 - the size of next month in January, was launched in early 1000 iPads and three people have lots of money for a project. However, the increase in productivity and profitability of the hardware iPad Potter and the mere fact that capital expenditures for internal development and acquisitions worth it to convince the Ministry of Finance. This and the development team to deploy faster and better workflow in hospitals have the appropriate work.

So far, the workflow of the hospital around an understanding of ergonomics, and then met with the doctors with the help of a consultant, staff, software development has made a dozen special requests on this iPad iPhone page and users are accustomed to road travel.

We can not reach those who are waiting for the iPhone EHRs

DSI IPAD and applications for the hospital, the first important decision to make tablets, Potter acknowledged that property. I bought them at the hospital for the mother if the iPad EHR was easy to standardize the development and application security and IT staff for Android and BlackBerry operating systems, application development, felt not need to worry. (Facility allows employees to wear iPads employees work, but for safety reasons for the iPad, a personal check if an IOS device MobileIron Inc. has agreed to use software that allows you to be.)

Certainly, none has been lost or stolen iPads again. Users, more devices than others, "caution" to Potter, he left behind the house from the beginning of the iPad, a change in the caller said, adding that the doctor does not value lost time going back and forth fight with another device.

After that, the next important decision is deciding how fast to move. Apply and work your way around the hospital that offers a suitable - depending on whether trust can be the supplier for two reasons. Potter was released in early 2010 after the device IPAD-18 and its EHR provider will probably not be ready for 24 months, he said.

It was not fast enough for the Ottawa Hospital. "My instinct was to go faster .... I told the president and CEO, "If you're serious, you need to go faster," Potter said. Ottawa Hospital, which is one of the goals of patient safety and quality in America North, a top-10 accepted as a university hospital, and Potter said, the board as a special iPhone application was a way to get faster.

"If the business of a hospital [of mobile application development]? You say, probably not. But I want to stay in the middle of the table and want to advance the concept of mobility, may have been another option, "but said that without the EHR vendor.