Securing Big Data Part 6 – Classifying risk

So now your Information Governance groups consider Information Security to be important you have to then think about how they should be classifying the risk.  Now there are docs out there on some of these which talk about frameworks.  British Columbia's government has one for instance that talks about High, Medium and Low risk, but for me that really misses the point and over simplifies the

How to create a pub/sub application with MongoDB ? Introduction

In this article we will see how to create a pub/sub application (messaging, chat, notification), and this fully based on MongoDB (without any message broker like RabbitMQ, JMS, ... ). So, what needs to be done to achieve such thing: an application "publish" a message. In our case, we simply save a document into MongoDB another application, or thread, subscribe to these events and will received

Securing Big Data Part 5 – your Big Data Security team

What does your security team look like today? Or the IT equivalent, "the folks that say no".  The point is that in most companies information security isn't actually something that is considered important.  How do I know this?  Well because basically most IT Security teams are the equivalent of the nightclub bouncers, they aren't the people who own the club, they aren't as important as the

Securing Big Data – Part 4 – Not crying Wolf.

In the first three parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data, then how maths and machine learning helps to identify what is reasonable and was is anomalous. The Target Credit Card hack highlights this problem.  Alerts were made, lights did flash.  The problem was that so many lights flashed and

Response to Campaign for Clear Licensing Open Letter to Oracle


I, on behalf of UKOUG have read the Open Letter to Oracle from The Campaign for Clear Licensing (CCL) and actually applaud the 7 steps as best practice, although do not necessarily see them as direct indictments against Oracle.

When CCL published their survey quoted in the open letter, UKOUG responded through the press pointing out that Martin Thompson of CCL had attended, and in fact addressed the audience at our Licensing event last year, (more...)

Securing Big Data – Part 3 – Security through Maths

In the first two parts of this I talked about how Securing Big Data is about layers, and then about how you need to use the power of Big Data to secure Big Data.  The next part is "what do you do with all that data?".   This is where Machine Learning and Mathematics comes in, in other words its about how you use Big Data analytics to secure Big Data. What you want (more...)

Securing Big Data – Part 2 – understanding the data required to secure it

In the first part of Securing Big Data I talked about the two different types of security.  The traditional IT and ACL security that needs to be done to match traditional solutions with an RDBMS but that is pretty much where those systems stop in terms of security which means they don't address the real threats out there, which are to do with cyber attacks and social engineering.  An ACL is only

Test locally first, then deploy to the cloud.

As recommended by Cheuk Chau on Medium, I read 'How to Develop a Daily Writing Habit’ - I’ll try to put it in practice here with my second advise - should have been my #1 advise:

Run a local copy of your application first, before to test it on your cloud instance.

While it’s simple to run directly on the Cloud, and we have a lot of samples available to get started, working (more...)

Sometimes development is just work

Sometimes development is just work

No matter how cool your job is, no matter how many people are looking at you or your company for best practises, sometimes developing software is just work ;-) On this blog I’ve shared examples of companies that people nowadays see as successful, like Netflix, Twitter, Spotify, or the online retailer bol.com.

To prove my point I’ve checked the release notes of Netflix and Spotify apps. Here (more...)

Securing Big Data – Part 1

As Big Data and its technologies such as Hadoop head deeper into the enterprise so questions around compliance and security rear their heads. The first interesting point in this is that it shows the approach to security that many of the Silicon Valley companies that use Hadoop at scale have taken, namely pretty little really.  It isn't that protecting information has been seen as a massively

My Remote Working Setup

Much the same as you all, I’ve seen the studies regarding how bad sitting at a desk for long periods is for your health – both physical and mental – such as:

For those who’ve followed my blogs for a while, you may recall that I’ve (more...)

Learning about the Oracle Cloud and the new Alta skin.

I had a conversation with +David Haimes on twitter the other day about blogging, and realized I have not been blogging for a long long time.

While I can find information about almost everything with Google or Stack Overflow, I realized that it's sometime hard to find the one piece of information which is relevant for you, in your current context.

It usually ends up being a compilation of multiple blog posts or answers; it's (more...)

Book – The Phoenix Project

Book – The Phoenix Project

Book The Phoenix ProjectThe Phoenix Project: A Novel About IT, DevOps, and Helping Your Business Win is written the by Gene Kim in the tradition of The Goal (1984, by Dr. Eliyahu M. Goldratt). The Goal is a management novel explaining the Theory of Constraints. This book, The Phoenix Project shows how the theory in The Goal works in an IT environment.

The Goal – Theory of Constraints

In simple terms the Theory (more...)

#FISMA Ready @Ubuntu LTS @18F

Ubuntu is a very popular operating system (OS) in the cloud space but the Federal government has been reluctant to adopt Ubuntu, preferring to stick with Redhat as their Linux flavor of choice.  As the Government moves toward the cloud it makes sense to me that Ubuntu would start to see some more play time.  One of the big hurdles to this is the need to ensure that Ubuntu meets the Federal Information Security Management Act (more...)

OTech Magazine – Winter 2014

OTech Magazine – Winter 2014

OTech Magazine winter 2014The winter edition of OTech Magazine, the independent magazine for Oracle professionals, is available. In OTech Magazine – Winter 2014 subjects include:

  • Time Series Forecasting in SQL
  • Flashback – Empowering Power Users
  • Starting WebLogic
  • DevOps and Continuous Delivery for Oracle
  • The Rapid Reaction Force – real time business monitoring

Download OTech Magazine Winter 2014 here.

deltalounge

2014 UKOUG – ACES and a tale of just how Technical I AM NOT


UKOUG Tech and Apps 14 events were co-located in Liverpool earlier this month. In the run up to the events I blogged about the amazing ACE talent that would be on hand.

I was organising the ACE dinner, something I have done for a few years now, but it was thanks to an idea from Mark Rittman that this happens in the UK. Normally we get about 40 people to the dinner, actually the exact (more...)

Ever Felt Simply Overwhelmed By How Big Oracle Is?


When I started working with Oracle technology in 1996 (don't even like typing that), they were a database company with some new apps. I had worked in IT for about 10 years and for the last few years on an ERP system based on Ingres. But I still felt lost.

I attended an Oracle Overview Course, and it was OK but didn't really set the scene for me which is what I needed. I was (more...)

2014 – UKOUG Conference and Exhibitions – Made me think


Liverpool seems a long time ago but actually just a few weeks. Moving the date just one week later is playing havoc with my Christmas preparations, traditionally I do my Christmas Cards the morning before conference starts and then once it is over, I have a week to catch up and then I can start Christmas itself. Failed on that plan.

It is too late to simply write a series of posts about what happened (more...)

Installing ORDS 3.0 (Early adopter) in Weblogic.

Now the Oracle REST Data Services 3.0 Early Adopter is available, let us have a look how it’s to be installed in Weblogic 12c!

I’ve ommitted the installation or upgrade of Apex here as there is plenty of documentation on that topic, and the ORDS can be applied for other uses than being an Apex Listener since v2.0.4.

Installing ORDS

Download the Application Express and ORDS 3.0 installer from the Oracle (more...)

“Innovation in Managing the Chaos of Everyday Project Management” is now on YouTube

If you missed Fishbowl’s recent webinar on our new Enterprise Information Portal for Project Management, you can now view a recording of it on YouTube.

 

Innovation in Managing the Chaos of Everyday Project Management discusses our strategy for leveraging the content management and collaboration features of Oracle WebCenter to enable project-centric organizations to build and deploy a project management portal. This solution was designed especially for groups like E & C firms and (more...)