Chor-Ching Fan of Jackbe tells us how to build good mash-ups, the reasons for their adoption, and the kinds of solutions that are good fits for mash-ups. Plus, some quick research news (the Agile adoption doc is published!), and a great article on the value of failure. (c) 2010 Tom Grant
I wanted to announce that the reports based on our annual Security Survey of nearly 2,000 organizations are live as of Monday, January 25th. These are among our most widely read security reports, with insight into IT security priorities, challenges, state of compliance efforts, and of course adoption of security technologies and services.
I wanted to announce that the reports based on our annual Security Survey of nearly 2,000 organizations are live as of Monday, January 25. These are among our most widely-read security reports, with insight into IT security priorities, challenges, state of compliance efforts, and of course adoption of security technologies and services.
I just returned from Lotusphere, where I was once again able to compare and contrast the thinking of IBM labs personnel, product teams, and customers in close proximity. IBM is setting their collaboration agenda around business verticals and processes where real business value can be delivered. In discussion with Rick McGee, VP Market Segment Management, I heard more about IBM’s collaboration agenda and their focus on selling their solutions to three key constituents at customer:
In a recent blog post and press kit on Building Confidence in Cloud Computing, Microsoft's General Counsel, Brad Smith, calls for government action to "ensure that a robust privacy and security legal framework exists to protect and provide user rights and benefits in the cloud." Microsoft's statement rightly suggests that in order for the promise of "cloud computing" -- be it applications, software infrastructure for developers or physical computing capacity -- to be realized issues of data protection must be better addressed. The statement appeals to the US government to to update, modernize and strengthen two existing pieces of legislation -- the Electronic Communications Privacy Act (ECPA) and the Computer Fraud and Abuse Act (CFAA). The statement also promotes greater transparency regarding security provided by cloud services providers as well as global collaboration around rules governing access to data for law enforcement purposes.
Brian Lawley of the 280 Group tells us how the PM profession has changed, and what it takes to be an exceptional PM. Plus, advice for taking your application to a social networking platform like Facebook. (c) 2010 Tom Grant