More on EA and asset-types [3]

What are the different types of assets that we need to deal with in an enterprise-architecture? What implications arise across the architecture from the differences between these types? In the first post in this series, we looked at the concept of four distinct asset-dimensions: physical: physical ‘thing’ – independent, tangible, transferrable, alienable virtual: data, information, idea – […]

Link Collection — November 6, 2011

  • A final thought from The Wisdom of Clouds | The Wisdom of Clouds – CNET News

    I completely agree with James. Echoes why I retired from the Top 3 Stories Podcast, and ground to a halt on Elemental Cloud Computing:

    “For one, cloud computing itself is no longer an innovative new field, but a growing marketplace of hundreds or even thousands of technology and service options. Covering cloud overall has become a journalist’s job, and I see myself more as an analyst and essayist.”

    tags: cloud computing

  • Kaggle Solves Big Data Problems With Contests — And Now Has Big Funders and $11M on Board – Liz Gannes – News – AllThingsD

    “What if the Netflix Prize model of solving hard problems about big data sets using contests could be applied to all sorts of other things? In fact, a remarkable start-up called Kaggle is doing exactly that — and already seems to be making it work.

    Kaggle has facilitated breakthroughs in NASA’s analysis of dark matter, improved Allstate’s actuarial methods, predicted many of the top finishers of the Eurovision Song Contest, and is currently hosting a $3 million prize to device ways to reduce unnecessary hospitalizations.”

    tags: bigdata kaggle

  • Systems thinking conference highlights practical applications in healthcare, education, product development – MIT News Office

    “A system is a set of interrelated entities that perform a function,” said Crawley, the Ford Professor of Engineering in the Department of Aeronautics and Astronautics. The function that emerges, he said, is greater than what could come from any single entity — and the overall system’s “emergent properties” are what produce value.

    Crawley then explained that systems thinking is a way of looking at problems in context, in order to more successfully predict what will emerge to ensure value. “This is the real art and the real goal of systems thinking — training yourself in the domain in which you work to look at an unprecedented system, predict outcomes and add value,” Crawley said. In essence, using systems thinking helps make complex challenges less complicated.”

    tags: systems thinking mit

  • Introducing the 5-watt server that runs on cell phone chips — Cloud Computing News

    “Can ARM wrestle its way into the server market? Calxeda and Hewlett-Packard think so. On Tuesday Calxeda launched its EnergyCore ARM server-on-a-chip (SoC), which it says consumes as little as 1.5 watts (and idles at half a watt). And HP, the world’s largest server maker, committed to building EnergyCore-based servers that will consume as little as 5 watts when running all out. Compare that to the lowest-power x86 server chips from Intel, which consume about 20 watts but deliver higher performance.

    Calxeda, backed in part by ARM Holdings, is banking that the success that ARM chips found in smartphones and mobile devices will carry over into data centers serving large, scale-out workloads. In that arena, it is facing off squarely against chip giant Intel and its x86-based architecture, which dominates the market for chips running in commodity servers.”

    tags: cloud computing chips

  • Giving the F.B.I. What It Wants – NYTimes.com

    “Hasan M. Elahi is an associate professor and an interdisciplinary artist at the University of Maryland. This article is adapted from a forthcoming TED Talk.”

    “In an era in which everything is archived and tracked, the best way to maintain privacy may be to give it up. Information agencies operate in an industry that values data. Restricted access to information is what makes it valuable. If I cut out the middleman and flood the market with my information, the intelligence the F.B.I. has on me will be of no value. Making my private information public devalues the currency of the information the intelligence gatherers have collected.

    My activities may be more symbolic than not, but if 300 million people started sending private information to federal agents, the government would need to hire as many as another 300 million people, possibly more, to keep up with the information and we’d have to redesign our entire intelligence system.”

    tags: privacy

Posted from Diigo. The rest of my favorite links are here.

Related posts:

  1. Link Collection – August 13, 2011
  2. Link Collection – September 11, 2011
  3. Link Collection – July 31, 2011

Cynefin Framework

 

The Cynefin framework has five domains. The first four domains are:

Simple, in which the relationship between cause and effect is obvious to all, the approach is to Sense – Categorise – Respond and we can apply best practice.
Comp…

Categories Uncategorized

More on EA and asset-types [2]

What are the different types of assets that we need to deal with in an enterprise-architecture? What implications arise across the architecture from the differences between these types? In the previous post in this series, we looked at the concept of four distinct asset-dimensions: Physical, Virtual, Relational and Aspirational. The same dimensions carry right the […]

Cloud Decisions

Belmont-clouds_9

Evolution rather than replacement.

The private cloud can evolve from existing virtualized infrastructure, enabling the transition to cloud computing without a complete and disruptive infrastructure overhaul.

Security and compliance.

With a private cloud, data is retained within the enterprise, behind the corporate firewall, where IT can exercise full control over security, privacy, and regulatory compliance. With public clouds, enterprise data is housed in external data centers—and may move from location to location, without IT’s knowledge or consent. The dynamic movement of data in a public cloud may also present compliance challenges with local regulations.

Service level agreements (SLAs).

Keeping applications in-house can help IT continue to meet SLAs deining performance, availability, and other critical business requirements. Some external providers may not be able to furnish the same level of service.

Cost.

A large enterprise private cloud can provide economies of scale, resulting in total cost of ownership (TCO) that is competitive with or lower than public clouds. Intel IT, for example, found that services can be hosted internally at equal or lower TCO than hosting them externally.

Building expertise.

Architecting a private cloud enables IT organizations to develop a knowledge base that can be applied to public clouds in the future. When creating the private cloud, IT will need to develop detailed application and data inventories, and gain key skills such as managing cloud SLAs. This experience will help build effective relationships with public cloud providers, enabling IT organizations to assess whether they meet enterprise requirements

(excerpt from http://www.readwriteweb.com/cloud/cio-agenda-paper-vmware.pdf)

connect with me
Jeffrey Blake

Posted via email from Jeffrey Blake – The Enterprise Architect | Comment »

Enhanced by Zemanta

Social Network Users’ Bill of Rights

1.Honesty: We will honor our privacy policy and terms of service.
2. Clarity: We will make sure that our policies, terms of service, and settings are easy to find and understand.
3. Freedom of speech: We will not delete or modify user data without a cl…

Social Network Users’ Bill of Rights

1.Honesty: We will honor our privacy policy and terms of service.

2. Clarity: We will make sure that our policies, terms of service, and settings are easy to find and understand.

3. Freedom of speech: We will not delete or modify user data without a clear policy and justification.

4. Empowerment : We will support assistive technologies and universal accessibility.

5. Self-protection: We will support privacy-enhancing technologies.

6. Data minimization: We will minimize the information users are required to provide and share with others.

7. Control: We will work toward enabling users to own and control their data and won’t facilitate sharing their data unless they agree first.

8. Predictability: We will obtain the prior consent of users before significantly changing who can see their data.

9. Data portability: We will make it easy for users to obtain a copy of their data.

10. Protection: We will treat user data as securely as our own confidential data unless they choose to share these data, and notify them if these data are compromised.

11. Right to know: We will show users how we are using their data and allow them to see who and what has access to their data.

12. Right to self-define: We will allow users to create more than one identity and use pseudonyms. We will not link them without their permission.

13. Right to appeal: We will allow users to appeal punitive actions.

14. Right to withdraw: We will allow users to delete their accounts and remove their data.

via blog.diasporafoundation.org

connect with me
Jeffrey Blake

Posted via email from Jeffrey Blake – The Enterprise Architect | Comment »

Categories Uncategorized