Tuesday, August 26, 2014

Cloud BI: Going where the data lives

As more companies store data in the cloud, they're increasingly crunching the numbers there, too.

Even though cloud-based business intelligence has been around for nearly a decade, a recent trend is driving renewed interest: Companies are generating and storing more data in the cloud.

"What I think will happen is people will move the analytics app closer to the data," says Joao Tapadinhas, a Gartner analyst. "As more data sources move to the cloud, it makes more sense to also adopt cloud BI solutions because that's where the data is. It's easier to connect to cloud data using a cloud solution."
" In each of the last four years, around 30% of respondents to a Gartner survey said they'd run their mission-critical BI in the cloud. This year, however, nearly half -- 45% -- said they would adopt cloud BI. "

Researchers at Gartner say that 2014 may be the tipping point for cloud BI. In each of the last four years, around 30% of respondents to a Gartner survey said they'd run their mission-critical BI in the cloud. This year, however, nearly half -- 45% -- said they would adopt cloud BI.

Historically, cloud BI products have been most appealing to smaller businesses, in part because those are less likely to have an IT department that can manage an on-premises product. However, analysts are starting to see larger companies adopting cloud BI, typically starting with individual groups or departments.

Shifting data analytics to the cloud doesn't come without its challenges, though. For example, it's unlikely that all corporate data will move to the cloud, particularly in larger enterprises. That means many businesses will have to map data from both cloud and on-premises sources to the BI software, whether that software itself is on-premises or in the cloud. Also, bandwidth constraints may slow down data transfers and can lead to increased costs, if a business must upgrade its connectivity to improve data transfer.

Nevertheless, some businesses have already adopted cloud BI services, analysts report anecdotally, though specific figures aren't available. Many companies that have made the move say that the benefits -- including fast time to market, no need to maintain on-premises software and simplicity of use -- outweigh any downsides.

Mixing up data sources

Take Millennial Media, which sells a mobile advertising platform. It needed to pull together data from disparate sources, both on site and in the cloud.

Around two and a half years ago, Bob Hammond, CTO for Millennial, began looking into BI as a way to marry data from Salesforce with transactional and financial information from in-house systems and then let decision makers at the company visualize it.

"No human I know of can . . . make business decisions based on data that hasn't been brought together into a single source," he says. The company needed BI, he says, because "we weren't able to take data from multiple systems and connect that data logically and view that data in a UI so that we could understand what was going on."

He also wanted to let more people in the organization, like data analysts, assemble reports, rather than limiting report-making to technologists who know how to code and interact with back-end databases. Plus, he needed a system that was flexible so the software would be easy to maintain and it would be easy to create new use cases.

Hammond eliminated on-premises BI software options in part because he didn't want to incur the costs associated with managing and maintaining it. Time to market was also important.

Millennial ended up choosing Good Data's cloud BI offering and had its initial project in place in about three months. Subsequent projects have taken closer to a month to get up and running, Hammond says.

Sending on-premises data to Good didn't turn out to be much of a problem for Millennial. Each day the company generates around 10TB of raw data but transfers only around 18MB of compressed data to Good. "We do all the transformation of raw data into only the specific data we want in our systems before we transfer it into the cloud," he says.

Not all businesses do such a great job of managing that data transfer, though. "What we tend to see is it's rather difficult to keep the amount of data moving between the database and the analytics tool small," says Gartner's Tapadinhas. In other words, keeping data transfers small is important in cloud BI to manage both costs and upload/download bandwidth issues.

At Millennial, engineers handle the job of extracting data from the various sources and uploading it to Good Data. In addition, two data analysts have now created 500 reports. Around 40 additional people at Millennial have access to those reports and can combine them, drill down into them and create portfolios of reports to share.

Building tiers of users, each with different permissions, allows more people in the organization to work with the data -- but safely, Hammond says. That means business executives, who aren't necessarily trained to be data scientists, have some latitude to combine and rework reports but are less likely to make mistakes because they don't have the permission to, for instance, pull in new data from a back-end database, he says.

Speed and flexibility drive cloud adoption

Athenahealth, a provider of Web-based software and services to medical practices, had most of the data it wanted to analyze in one place internally. About a year ago, the company set out to find a better way to track the hundreds of customer implementations it might be working on at any given time, says Adam Weinstein, director of core analytics at Athenahealth.
" Because we have a cloud-based platform, we have real-time access to see what's going on. " Adam Weinstein, director of core analytics, Athenahealth

"Because we have a cloud-based platform, we have real-time access to see what's going on," he says. The biggest challenge: "Taking the data we have about what our clients are doing and how they're progressing in the implementation process and turning that into what we call a nerve center, or a way we can actively monitor exceptions to the process."

Athenahealth wanted a system that would collect information about every point in the implementation life cycle in order to easily find problem areas. For instance, clients route their fax machines to the Athenahealth system. If no faxes are coming in for a given customer, it could mean the customer hasn't yet rerouted the fax number. Or, for a long-time customer, if the percentage of fax information coming in increases relative to electronic information, that could mean someone mistakenly changed a setting.

When Athenahealth started looking for a BI product that could meet its needs, it had a few additional requirements. The vendor "had to be able to move quickly because we had a fairly strict timeline, in the two- to three-month time frame, to deliver on this project," Weinstein says.

Also, the company wanted a product that would meet analytics needs going forward, too. "We wanted to invest in more of a platform, not just a one-time solution," he says.

Weinstein quickly found that some of the large, traditional BI vendors were not going to be able to roll out Athenahealth's initial project quickly enough. In addition, some were too complicated to use, potentially limiting future projects. Athenahealth considered products from both IBM and Oracle, and then moved on to the cloud BI offerings, ultimately choosing Birst.

Athenahealth didn't run into problems with having most of its data stored on-premises and not in a cloud environment. The company has over 50,000 provider clients and tracks more than 100 metrics about each one every day, Weinstein says. That data is pulled from an internal data center into a separate internal data warehouse. From there, the relevant data is uploaded to Birst.

The data uploads happen automatically, several times each day, as part of a process that the company built using tools and scripts, some of which were provided by Birst, he says. "It doesn't keep me up at night," Weinstein says of the process. He has to intervene only if there's an error. "But that is part of our standard monitoring and would be expected as part of a complex data warehouse environment."

Possible pitfalls

Millennial Media, Athenahealth and DMA (see "Early adopter") all say that using a cloud BI service meets their needs. But there are a few roadblocks that companies should look out for when considering cloud BI.

One is "cloud washing." Some vendors say they offer a cloud BI product but in fact may still require software that runs on users' computers or may offer only cloud storage, says Gartner's Tapadinhas. In that case, users may not get all the benefits of a true cloud offering, like offloading software maintenance.

A cloud BI service might also not be as flexible as an on-premises offering. "Although they are quick to deploy, in some cases cloud BI solutions don't offer enough customizations or at least not as much as we have now on-premises," Tapadinhas says.

On-premises products might also offer more possibilities for integration with third party-products, he says. Good Data, for one, has made some strides to allow third-party tools to access data repositories stored with Good, but even its openness is limited, he says.

Plus, traditional BI tools typically have a broader feature set and may make a better option depending on what a company is trying to achieve, says Carsten Bange, founder and CEO of Business Application Research Center, an analyst firm that specializes in enterprise software.

There's also the chance that, like any cloud offering, a particular cloud BI service might be slow. "There are other issues, like performance and latency of cloud solutions," Tapadinhas says.

The transfer speed of data could be slow too. That could impact the reliability of the data analytics if users end up making decisions based on old data because the latest data hasn't made it to the cloud BI tool. "This could be a real bottleneck," Bange says. "Upload speeds are often not really good."

One common reason that companies give for passing up cloud BI -- concern over privacy and security, given that BI products tend to analyze a company's most important data -- actually isn't worth worrying about, some experts say. "Most cloud vendors tend to have more strict security processes and follow security certificates that are more advanced than most companies have internally," Tapadinhas says.

Whether a business goes with cloud BI or an on-premises product, Athenahealth's Weinstein offers valuable advice. Once Athenahealth implemented Birst and workers were able to quickly access useful information, they were spotting a lot more issues than they used to. The company had to figure out how to respond to the increased number of problems that it found. "Net net it's a good thing," Weinstein says. "Just be prepared for what the transparency is going to bring."




Thursday, August 21, 2014

10 SharePoint success stories

Historically, Microsoft SharePoint has been associated with intranets and content management. But customers are now using it for everything from communications to business intelligence, enterprise search, even process integration and workflow automation.

10 innovative examples of Microsoft SharePoint in action
Since its launch in 2001, Microsoft SharePoint has grown to become a leading enterprise platform for intranets and content management. However, customers are increasingly using it to enable a much broader range of capabilities.

They're building intranet portals, but they're also leveraging SharePoint's system integration, process integration and workflow automation capabilities for knowledge sharing, business intelligence, social collaboration, document and file management, communications and more. Here are 10 success stories built on Microsoft SharePoint.

Aker Solutions
Aker Solutions is a Norwegian provider of oilfield products, systems and services to oil and gas industry customers worldwide. It employs 28,000 people in more than 30 countries. In 2010, management set a goal of doubling its revenues of NOK44 billion ($7.7 billion) by 2015.

To meet those goals, the company hired 13,000 employees in four years. Faced with assimilating many employees in a short period, the company deployed a knowledge-sharing platform based on SharePoint Server 2013.

The platform, dubbed Knowledge Arena, combines personal profiles, employee pages with summaries of current responsibilities, areas of expertise, past experience, blog posts, key documents, newsfeeds and more. Within four months, 56.4 percent of employees had created profiles.

Arkansas Department of Corrections
Contraband is a source of criminal activity within prisons: drugs, money, mobile phones, weapons. Stopping it has fallen to 4,000 statewide guards.

The Arkansas Department of Corrections opted to turn to BI and predictive analytics to identify trends.With Microsoft's help, it built a Fusion Core Solution based on SharePoint that allows the department to analyze previously siloed databases ranging from population tracking and visitation tracking to banking and telephone records.

"We had access to this data before, but we could not visualize it to see the patterns and trends," says Daniel Potter, assistant IT administrator. "Our analysts are able to clearly see developments. Over the last two weeks, we have been able to execute 11 confiscations and interdictions on incidents."

iGATE
iGATE is a global provider of IT services and consulting with more than 300 active global clients, many of them Fortune 1000 companies. It also has 28,500 employees, with an average age of 25.

It needed an internal social collaboration tool that allowed them to share process updates and knowledge more efficiently and effectively. With the help of Microsoft Consulting Services (MCS), it deployed SharePoint 2010 for its iSocialize platform, with SQL 2008 as the database management system.

Leveraging an existing license, iGATE was able to connect its global workforce at minimum cost. The company says about 15 percent of employees log in to iSocialize daily and it expects traffic to increase as the content and management improve.

MWH
MWH Global is a "wet infrastructure" firm that provides engineering, construction and management services for some of the world's largest water-related projects: public water distribution, hydropower, environmental reclamation and more. It has 8,000 employees and believes it must foster innovation by helping them share their talent and experience.

It has an integrated working strategy that calls for keeping collaborative processes and tools simple and universally available. It uses a combination of Lync Server 2013, Yammer, Microsoft Exchange Online and SharePoint Server 2010 as part of its comprehensive collaboration solution.

The company says it is now able to foster creativity within and across organizational boundaries. Federation and external SharePoint team sites are allowing it to extend those benefits beyond corporate borders.

Dutch Public Prosecution Service (DPPS)
With 20 offices in the Netherlands, DPSS investigates crimes and decides whether to bring cases to court, prosecutes offenders and supervises sentences. Its 800 prosecutors spend time out of the office, at crime scenes, meeting colleagues and presenting cases.

DPSS needed a better mobility experience, with easily managed endpoints that met data security and confidentiality requirements. DPSS turned to Windows 8 tablets with applications that connect to data stored on its SharePoint-based intranet and an Oracle database.

The 24/7 Quick Reference Application gives them access to legal protocols and procedures stored on a SharePoint site. The People Guide application connects them to colleagues and their expertise, while the Case File Viewer functions like an offline client for a case management system.

Dutch Public Prosecution Service (DPPS)
With 20 offices in the Netherlands, DPSS investigates crimes and decides whether to bring cases to court, prosecutes offenders and supervises sentences. Its 800 prosecutors spend time out of the office, at crime scenes, meeting colleagues and presenting cases.

DPSS needed a better mobility experience, with easily managed endpoints that met data security and confidentiality requirements. DPSS turned to Windows 8 tablets with applications that connect to data stored on its SharePoint-based intranet and an Oracle database.

The 24/7 Quick Reference Application gives them access to legal protocols and procedures stored on a SharePoint site. The People Guide application connects them to colleagues and their expertise, while the Case File Viewer functions like an offline client for a case management system.

ASB Bank
Based in Auckland, New Zealand and founded in 1847, ASB Bank has 4,500 employees and provides personal and business banking services for 25 percent of New Zealanders. Aiming to give its employments maximum mobility, it needed a comprehensive workflow and social collaboration environment for collaboration tools that work with tablets, smartphones and other mobile devices. It also wanted to reduce its dependence on paper by moving most documents online.

It deployed SharePoint 2013 Team Sites to give departments the ability to manage document scanning, storage, archiving and security. It also provided employees with the ability to share information through personal sites, team sites, newsfeeds, wiki sites, forums and blogs.

Toyota Motor Corporation
With 2012 revenue of $181.3 billion, Toyota is the world's largest automaker by sales volume. Its GAZOO.com website has 1.7 million registered users and delivers car owners and Toyota employees and dealers with vehicle information, social networking, news and entertainment.

Aiming to enhance site content, increase scalability and reduce the cost of ownership, Toyota wanted to leverage the cloud. It turned to Windows Azure for its cloud development environment, with SharePoint 2013 for content management and blogs.

"Toyota has 300,000 pages of content, and the SharePoint 2013 search capability lets us quickly retrieve information," says Hidehiko Sasaki of the e-TOYOTA division. "We are also using blogs—and, in future releases, other social features like yammer.

Aegon
Aegon is one of the world's largest insurance and pension groups, with 24,000 employees working in more than 20 international markets. Aiming to build a global intranet that made it easy to search for people and information across businesses, while also facilitating social collaboration and real-time sharing of data, Aegon used SharePoint Server with integrated social networking features from NewsGator Social Sites.

Aegon says it has given its employees easier, more specific access to subject matter experts, and that it allows employees to share experiences and best practices more effectively on their PCs and mobile devices. It also lets the company recognize and reward top contributors to the network while maintaining effective control for governance and regulatory purposes.

Kindred Healthcare
Kindred Healthcare has 76,000 employees and is one of the largest diversified providers of post-acute care services in the U.S. After acquiring RehabCare Group in 2011, the company gained 22,000 mobile employees who used Gmail and needed a solution to integrate them into its communication infrastructure.

Kindred already had an on-premises deployment of Exchange Server 2013 for its existing 54,000 employees. The company opted for Office 365, including SharePoint Online, to meet its needs while also fulfilling security requirements and regulatory and legal compliance.

All of Kindred's therapists now receive corporate communications directly via a SharePoint portal instead of through their managers. The system allows everyone to send messages more quickly, accurately and consistently.

JSC "Dobeles dzirnavenieks"
JSC is one of the leading cereal products in Latvia, Estonia and Lithuania. In 2008, it partnered with an international food company, requiring rapidly growing output. Many of its functions are managed electronically, like management of production processes, monitoring, accounting and customer relations.

The company has about 75 computer users, and the growing output meant upgrading and improving its IT infrastructure and eliminating previous infrastructure errors. JSC leveraged SharePoint Online, together with Office 365, Lync Online and Exchange Online to dramatically improve communication between employees.

Employees now use the SharePoint document sharing options, which provide them with reminders when files are updated or republished, while also providing the ability to share files over their mobile devices.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com




Saturday, August 9, 2014

Five unanswered questions about massive Russian hacker database

There’s still much that’s unclear about Tuesday’s revelation that a small group of hackers in Russia have amassed a database of 1.2 billion stolen user IDs and passwords. The company that disclosed the incident, Hold Security, didn’t offer any fresh information Wednesday, but here are five questions we’d like to see answered (and a bonus one that we already know the answer to).

Where did the credentials come from?
Hold Security said the hacking group started out buying stolen credentials on the black market, then used those credentials to launch other attacks. But it’s unclear how many credentials they bought and how many of the 1.2 billion they culled themselves. Without that information, it’s hard to know how fresh—and hence how valuable—the stolen data is.

What websites are they for?
If the hackers managed to recently penetrate major websites, like financial or email services, then it’s time to change your password. But if the data comes from mainly smaller sites, the value of the credentials is likely lower—unless people reused the same password they use for sensitive accounts. You do have unique passwords for important accounts, don’t you?

What are the hackers going to do with them?
The answer to this depends partly on the previous two questions. If they are fresh credentials for important services like online banking, they are ripe to be used to siphon money from online accounts. If they are older or from little-used services, they might be used to send spam by email or post it in online forums.

Were the passwords hashed, and how?
Even most small websites don’t store passwords as plain text these days, but the scrambling system used to protect passwords called “hashing” offers varying degrees of protection. An older one called “MD5” can be attacked with brute force and broken in a few minutes—faster if the password is something common like “password123”—but a more modern and secure method takes longer to break and so is more costly.

Was I affected?
This is the big question for every Internet user. Hold Security says you can sign up for a forthcoming service that will notify you if your details were included. Website operators are being offered a US$120-a-year service that will notify them if their user accounts appear in this or other hacker databases.

Passwords aren’t that secure, are they?

Nope, especially as most people implement them today. That’s why major websites including Gmail, Facebook and Twitter offer two-factor authentication that requires a password and an ever-changing code produced by a smartphone app, or offer to send a login token via SMS when users connect from a new computer. Security companies are working on new methods for authentication, but it’s an ever-continuing cat-and-mouse game with hackers.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com

Thursday, August 7, 2014

Google lowers search ranking of websites that don't use encryption

The move is intended to promote better security practices across the Web

Websites that aren't encrypting connections with their visitors may get a lower ranking on Google's search engine, a step the company said it is taking to promote better online security practices.

The move is designed to spur developers to implement TLS (Transport Layer Security), which uses a digital certificate to encrypt traffic, signified by a padlock in most browsers and "https" at the beginning of a URL.

As Google scans Web pages, it takes into account certain attributes, such as whether a Web page has unique content, to determine where it will appear in search rankings. It has added the use of https into those signals, although it will be a "lightweight" one and applies to about 1 percent of search queries now, wrote Zineb Ait BahajjiA andA Gary Illyes, both Google webmaster trends analysts, in a blog post.

All reputable websites use encryption when a person submits their login credentials, but some websites downgrade the connection to an unencrypted one. That means content is susceptible to a so-called man-in-the-middle attack. Content that is not encrypted could be read.

Rolling out https is fairly straightforward for small websites but can be complex for large organizations that run lots of servers, with challenges such as increased latency, support issues with content delivery networks and scaling issues.

LinkedIn said in June it was still upgrading its entire network to https after Zimperium, a security company, found it was possible in some cases to hijack a person's account. People using LinkedIn in some regions are flipped to an unencrypted connection after they log in, making it possible for a hacker to collect their authentication credentials.

Facebook's Instagram was found to have the same problem last month. Instagram's API (application programming interface) makes unencrypted requests to some parts of its network, which could allow a hacker on the same Wi-Fi network to steal a "session cookie," a data file that reminds Instagram a person has logged in but which grants access to an account.

Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com


Friday, August 1, 2014

Using a smartphone as a hotel room key: What could possibly go wrong?

If you stay at one of 11 brands of hotels in Hilton's portfolio, you can choose your room online now; by 2015 you can bypass the front desk and use a smartphone to unlock the door to your hotel room.

If you have an Apple or Android smartphone and stay at one of 11 brands of hotels in Hilton’s portfolio, then your smartphone will soon double as your hotel room key. Imagine using a smartphone as room key for more than 650,000 hotel rooms, at over 4,000 hotels in 80 different countries…what could possibly go wrong?

Hilton Worldwide has upgraded its technology to the tune of $550 million and announced that by the end of 2014 guests will be able to use their phone to select their exact room from digital floor plans “for over 650,000 rooms at more than 4,000 hotels across Hilton’s portfolio of 11 brands.” Guests can also “customize their stay by purchasing upgrades and making special requests for items to be delivered to their room, on their mobile devices, tablets and computers.”

The ability to bypass the front desk and use a smartphone as a room key will roll out in 2015; “all U.S. hotels across four of its brands will have this capability by the end of that year. By the end of 2016, the majority of its rooms system-wide will be equipped with this functionality.”

Is it secure or will this feature become the next hotel hacking case? Would it stand up to the likes of Jesus Molina, who will present Learn How to Control Every Room at a Luxury Hotel Remotely at Black Hat? Molina exploited vulnerabilities in the KNX communications protocol that St. Regis ShenZhen hotel in China used so guests can control the features in their room with the supplied iPad and digital butler application.

“Using protocols like KNX for home automation makes no sense for wireless,” Molina told Wired. “This guerrilla war we’re playing with the Internet of Things can get dangerous. This is not something I say lightly.” He claimed that an arbitrary attacker could control virtually every appliance in the hotel remotely. “The KNX/IP protocol provides no security, so any hotel or public space that have deployed it on an insecure network will make it easy to exploit.”

A spokesman for the KNX Association said “the most recent version of the standard did feature authentication and encryption and that it was ‘essential that separate Wi-Fi networks are used’ for the purposes of guest internet access and automation.”

St. Regis Shenzhen said Molina's claim that he took control of the automation system was "unsubstantiated," but it had "temporarily suspended the control system of the in-room iPad remote controls for system upgrading." Since this allegedly includes taking down the whole system and rewiring everything for every hotel room, the ability to exploit the fatal flaws hardly seem “unsubstantiated.”

The Starwood chain, which owns St. Regis, as well as the Marriott and InterContinental Hotel groups, are in a mobile services race along with Hilton. The Wall Street Journal reported that Starwood is already testing mobile phone room keys; Marriott allows guest to use mobile check-in and check-out, and InterContinental sends out push notifications to guests, such as two-for-one drink specials at the bar.

Hilton launched Conrad Concierge in 2012, allowing guests to use the hospitality software app to check-in through their mobile device. “Going forward, Hilton anticipates delivering further digital advancements to guests every six to eight weeks.”

Regarding room selection, Hilton said that by the end of summer, Hilton HHonors members can check-in and choose their room “via the Apple and Android HHonors apps across the following U.S. brands: Waldorf Astoria Hotels & Resorts, Conrad Hotels & Resorts, Hilton Hotels & Resorts, Hilton Garden Inn, Homewood Suites and Home2 Suites.”

At 6 a.m. the day before a booked stay, Hilton HHonors members can sign into their account via their mobile device, tablet or computer to check-in and choose their preferred room through floor plan maps or lists populated from the hotel’s available inventory. Photos of rooms are also available to help with their selection. Hilton’s digital lobby function is updated in real-time, so guests no longer have to wait until they are physically in the hotel lobby to be assigned a room.

Next year, Hilton guests can skip the lines at the front desk and use their smartphones to unlock the doors to their rooms. If Hilton currently uses NFC for the door locks, with an NFC tag embedded in the keycards that can unlock the door, then it might be reasonable to assume the hotel’s app would tap into NFC-enabled phone capabilities. It remains to be seen if some curious hacker will find a way to exploit potential flaws in these new features.

It was two years ago when we learned 4 million hotel rooms were insecure due to Onity programmable keycard locks. With under $50 in off-the-shelf hardware, Cody Brocious opened a Onity lock in only 200 milliseconds. Inspired by Brocious, hackers then cut costs to about $30 and created a pen-sized device that looked like a dry erase marker. When the “James Bond” pen was pushed into a DC port on the underside of a hotel keycard lock, it instantly popped the lock open.

Time and technology marched on, creating new ways to hack hotel features, as will be highlighted by Molina next week at Black Hat. Let's hope that Hilton's implementation will be secure or hacking it to open other guests' doors might end up as a presentation in Black Hat 2015.



Best Microsoft MCTS Certification, Microsoft MCITP Training at certkingdom.com