Arguing Facts and Fiction

I’ve been following the discussion on the new In-Memory option in the Oracle 12.1.0.2.0 database. As far as I can see, it’s very easy for a developer to start using this feature, which will cost your company $23,000 per CPU at the next Oracle license audit.

But the most interesting part is actually not the cost – it’s the discussion. Oracle expert Kevin Closson stated that there was a problem (more...)

Being Right and Proving It

One of the great things about working in IT is that you can often win an argument simply by being right. Not because of who you are or because you are more eloquent than others, but because the facts support your position. Almost every IT person I have ever met respects facts.

In order to win arguments this way, you of course need some facts to work with. And that’s where too many people fail. (more...)

Take Self-Absorption to New Lengths

Observing tourists around me, I’ve noticed that the regular selfie doesn’t cut it anymore. The essential travel accessory for the modern self-absorbed traveller is a selfie stick:

Of course, the whole selfie concept is the opposite of a traditional tourist snapshot: Not “see what I saw,” but “see me”. But while you are at it, why not make yourself a spectacle while you take the picture. Hence, the selfie stick.

The picture is pretty much (more...)

OK Watch, What’s the Time?

While we’re waiting for the mythical iWatch, Google has already released Android Wear, and the first two Android Wear watches are here.  And they’re ugly.

If I’m going to wear something like that on my wrist, I need a really compelling usecase. I’m not sure that getting even more notifications and reacting 0.8 seconds faster is what I’m looking for.

When my latest Nike FuelBand eventually dies (they seem to last about (more...)

Debugging Faulty Assumptions

I wanted to install Oracle JDevelper 12.1.3 – a version that I had been eagerly awaiting. Since my primary machine is a MacBook, I wanted to install it on OS X 10.9.3.

I downloaded the generic installer and found that the install didn’t run. Since OS X had disappeared from the documentation, I assumed that I would have to fiddle around until I found a combination of JDK and OS (more...)

Incompetence or Malice?

We’ve just had a leak of 900,000 national identifier numbers here in Denmark. That’s about 16% of the total population, so it’s pretty big. These numbers are unique identifiers for a person (similar to Social Security Numbers) and are a good starting point for identity theft.

Never ascribe to malice that which can adequately be explained by incompetence.

Napoleon Bonaparte

 

So how did these numbers leak? Through plain incompetence and lack of procedures. It (more...)

They Took Away My Cloud

On Monday, a U.S. judge gave Microsoft control of 22 domains owned by domain hosting service No-IP.com. Microsoft intended to filter out some domains used by malware, but promptly screwed up. The result was that millions of legitimate users could not access their servers.

This will happen again and again as infrastructure moves to centralized cloud providers. What do you think will happen if the server just above yours in the server rack (more...)

Development Platform Disconnect

Each year at the annual Oracle ACE Director briefing, I look around at the laptops my fellow ACE Directors are carrying. More and more of them are MacBooks – I think we were up to around 50% last year.

That makes it all the more puzzling that the installation guide for the latest version of Oracle JDeveloper (12.1.3) does not mention OS X installs at all. The 12.1.2 version had sections (more...)

Citizen + Open Data = $55,000 savings

Big Data is not necessarily about crunching massive amounts of data – it’s about finding unrealized value in a data set. This might be done on huge sets of billions of records, using Map/Reduce running on thousands of servers. But it might also be done at a smaller scale by a concerned citizen.

More and more data is being made available by municipalities and countries. These are typical “big data” collections: Just a bunch of (more...)

Poor Usability Puts Dangerous Criminals on the Street

Good usability is often seen as optional – something we can include in a system if we have the time and the resources for it. But sometimes, bad usability can cause economic damage. A couple of years ago, here in Denmark, a large, well-respected organization had to write manual checks for months to avoid having their phones cut off. The reason: Their new ERP system was so hard to use that invoices were not getting (more...)

Late to the game: SAP

Having working with Oracle Fusion Applications, I know what a modern, cutting-edge user experience for enterprise software looks like. Something like this:

fusion-applications-screenshots-3I’ve also sometimes been subjected to SAP. Suffice to say, it does not look like this.

But maybe they’re upping their game – according to job hunting site Glassdoor.com, SAP is looking for 58 User Experience engineers. A bit late to the game, given than Oracle is already shipping stuff like the (more...)

Cool or Safe? Volvo Chooses Cool

Safe driving has two components: Safe cars and safe drivers.

A Volvo car is built like a tank and is equipped with all kinds of safety features – it’s a very safe car. Unfortunately, Volvo has unthinkingly undone all the advances they have made on the car side of the equation by making the driver much more likely to cause an accident. How did they do that? With touchscreens, of course.

A driver in a (more...)

Keeping the Programmers Out

When an implementation project for a standard system like SAP or Oracle E-Business Suite runs completely off the rails, it’s because the programmers have been allowed into the project.

Programmers are very accommodating people and they don’t like to say no. And true enough, given enough time and money, they  can build anything.

The problem is that the business case for a standard system rests on the word “standard”. Not “almost-standard-with-a-little-bit-of-code”. By all means use (more...)

Why you’re not getting hired

If you’re applying for permanent positions and not getting hired even though you have the skills the organizations asks for, consider whether you are proving your ability to learn new things.

I’m often talking to people who believe their 20 years of experience with technology X or Y should make them shoo-ins for a job. However, they are not getting hired.

The reason is that a modern organization can’t depend on the same skill being (more...)

Cool or useful?

This is the dashboard of a Tesla S:

tesla dashboard

With a large touchscreen and very few physical buttons. A lot of design time went into building this. Very cool-looking.

This is the steering wheel of a Formula One racecar (which is incidentially the whole user interface of the car):

formula1 steering wheel

A small screen and a lot of physical buttons. A lot of usability engineering went into building this. Very useful.

If you are going to be handling (more...)

Quis custodiet ipsos custodes?

The above phase means “who will guard the guards themselves?” and is relevant in many security contexts.

Here in Denmark, we are currently having our own “News of the World” affair. In our case, a contractor at the payment processor handling almost all Danish credit cards was able to automatically send a tip to a journalist whenever a celebrity used his or her credit card. That makes it hard to take an incognito honeymoon (more...)

Can you keep up? Nike couldn’t

Nike have been producing the Nike FuelBand for a couple of years, but have recently thrown in the towel. I own a Nike FuelBand and have enjoyed the fact that it’s pretty unobtrusive (just a matte black rubber wristband until you press the button).

fuelband

I’ve found that the gamification aspect – you are this close to your daily goal, shown with little colored lights – worked well for me. There is a sync feature with (more...)

Hacker-proof key

At my hotel in London this week, I received a physical key, not a key card. In a time where millions of hotel door locks can be opened by any half-competent hacker with an Arduino microprocessor, it was reassuring to receive a security service that is actually hard to break.

Are you using appropriate technology? Remember that your fancy computer systems are sometimes much more vulnerable than the systems they replace.

DIY Disasters

When people take on home renovation “Do-It-Yourself” projects beyond their skills, disaster ensues. Apparently, this is so common that you can base a whole TV series on this theme – where professionals rescue the disastrous DIY project for the grateful and clueless amateur handyman.

I’ve seen the same thing happen in many IT projects. The people in the organization overestimate their own skills and are unable or unwilling to pay the cost of professional external (more...)

Unfocused Learning

The manager was proudly showing off his new IT classroom.

“Where is the projector?” I asked.

“Oh, we don’t need a projector. The instructor can just take over everybody’s screens.”

I have been teaching in environments like this, and it does not work well. When I have a piece of information or a computer screen projected in large format in front of everybody, the class has a common focus on the task. If (more...)