Não dá mais tempo de ficar no pensamento estratégico de longo prazo
June 7, 2016 8:47
Os líderes das empesas tradicionais pensam que seu objetivo fim é vender mais produtos e serviços aos seus clientes, e consequentemente gerar maior valor para seus acionistas. As empresas em rede enxergam o valor na co-criação, compartilhamento e influência de seus clientes. A maioria das empresas tradicionais diz explicitamente “o cliente em primeiro lugar”, mas na prática sua prioridade é satisfazer seus acionistas pela valorização de suas ações. Jack Welch, que foi CEO da GE, disse que o famoso SVM (Shareholder Value Maximization) foi uma das ideias mais idiotas que os gestores de negócios tiveram. Recomendo enfaticamente ler o texto “The World’s Dumbest Idea”, que mostra através de análises bem fundamentadas que SVM não representa realmente um maior retorno para os acionistas.
A diferença fundamental é que os líderes das empresas tradicionais foram criados em um mundo de escassez de informações enquanto vivemos hoje um mundo de abundância de informações. Os líderes das empresas tradicionais pensam em um cenário de capacidade plena e, portanto, têm que vender mais do que produzem. As empresas em rede enxergam de forma diferente e veem o mundo cheio de potencialidades: tem mais gente querendo alugar seus imóveis e quartos que a capacidade da indústria hoteleira em construir novos hotéis. As empresas em rede captaram esta diferença.
Um estudo bem instigante é “Digital Predator Or Digital Prey?”, feito pela Forrester Research, que deixa exposto o dilema: como você quer se posicionar em cinco, dez anos à frente? Portanto, para as empresas tradicionais, a questão não é se será necessário se transformar, mas quando e em que amplitude e velocidade.
A dificuldade é que a maioria das empresas tradicionais e seus líderes podem até ter a consciência do tsunami que está chegando, mas não sabem como começar a transformação dos negócios baseado na transformação digital e em qual direção seguir. Fazer uma transformação parcial ou reboot, reinicializando do zero? Mudar parte ou toda a empresa? Que talentos serão necessários? Quais os que estão hoje na organização que poderão levar a empresa a ser um “predador digital”, se for essa a estratégia a ser adotada?
Não entender o fenômeno das empresas em rede pode sim, significar o fim do seu negócio e de todo o setor. O Wikipedia destruiu o valor da Encyclopedia Britannica, sem se preocupar com os seus 250 anos de história. O Linkedin já fez com que muitas empresas de recrutamento perdessem relevância.
Não dá mais tempo de ficar no pensamento estratégico de longo prazo. “Alocaremos budget para transformação digital daqui a dois ou três anos”. Em dois a três anos talvez não seja mais necessário tal budget, pois a empresa se transformou em uma “digital prey”…Comece nesta segunda-feira mesmo!
O primeiro passo é repensar seus valores e paradigmas. O modelo de empresas baseadas em ativos, fruto da mentalidade da sociedade industrial, já não é adequado ao cenário de negócios em mundo digital. Quando o Facebook comprou o WhatsApp por US$ 19 bilhões, o WhatsApp tinha apenas 55 funcionários e nenhum ativo físico! Mas já crescia a um milhão de novos usuários por dia! Sim, a cada dia!! Este é o valor que foi comprado.
Examine quão ameaçado está seu modelo de negócio, mas não olhe para os seus concorrentes. Olhe para fora do setor. Entenda as diferenças do pensamento em rede versus o pensamento tradicional. Plante as sementes da transformação, direcione seus esforços e estratégia na direção da mudança. Não será uma transição fácil. Ninguém muda modelos de negócio sem atritos, sacrifícios e crises. É necessário mudar a maneira de pensar no que sua empresa faz, como ela faz, e quem ganha com isso.
Lembre-se da frase de Kevin Kelly, fundador da revista Wired: “In the network economy, success is self-reinforcing: it obeys the law of increasing returns”.
*Cezar Taurion é CEO da Litteris Consulting, autor de seis livros sobre Open Source, Inovação, Cloud Computing e Big Data
Fonte
Analista de Negócio
June 7, 2016 6:21
Analista de Negócio
– Postado por temonteiro
| 7 jun 2016
Rua Benedito Macêdo – Cais do Porto, Fortaleza – CE, Brasil
Emprego
Descrição da Vaga
Relacionado
Como aplicar
Enviar o currículo para: louiseannelima@jmacedo.com.br
Relacionado
Job Categories: Free.
Job Types: Emprego.
Job Salaries: Não informado.
Vaga expira em 5 days
Você deve fazer login ou criar uma conta, a fim de enviar uma vaga
Fonte
Gordon Hayward, o novo garoto da HyperX
June 7, 2016 6:09
Jogador profissional de basquete e grande fã de games, Gordon Hayward é o novo integrante da lista de atletas campeões da HyperX. Desde o dia 2 de junho, o ala do Utah Jazz já está convocado a usar os headsets da marca e a atuar em campanhas de marketing, além de participar regularmente de sessões de jogos, distribuir brindes e fazer aparições em eventos pela divisão de produtos de alta performance da Kingston.
“Os videogames sempre foram uma válvula de escape para mim. Antes de qualquer coisa, representam um jeito muito divertido de me conectar com outras pessoas e de despertar meu lado competitivo”, disse Gordon Hayward. “Como um fã dos jogos eletrônicos e ao mesmo tempo um atleta profissional de basquete, sei da importância de competir com os melhores equipamentos e estou muito animado com essa parceria com a HyperX.”
A HyperX patrocina centenas de jogadores profissionais de e-Sports que fazem parte de mais de 30 equipes espalhadas pelo mundo. Entretanto, Gordon é o primeiro atleta de esportes olímpicos a representar a marca.
Algumas curiosidades sobre Gordon
Antes de se tornar uma estrela do basquete norte-americano, Gordon, que sempre foi um grande entusiasta dos games, chegou a competir em torneios de esportes eletrônicos. Além de milhares de fãs que acompanham seu trabalho dentro das quadras, o novo garoto-propaganda da HyperX acumula seguidores entre os gamers, que costumam encontrá-lo jogando on-line partidas de Halo, Starcraft II e League of Legends.
VEJA TAMBÉM:
Source link
SSD and eMMC Forensics 2016 – Part 3
June 7, 2016 6:07
Tuesday, June 07, 2016 (08:38:37)
SSD and eMMC Forensics 2016 – Part 3
What Has Changed in 2016 in the Way SSD Drives Self-Destruct Evidence: Demystifying eMMC, M.2, NVMe, and PCI-E.
by Yuri Gubanov & Oleg Afonin
© Belkasoft Research 2016
In the previous part of the article, we talked about eMMC storages and external SSDs. We also mentioned TRIM when talking about trimming behavior of eMMC. We will talk a bit more about TRIM this time and then move on to some real-life cases.
More about TRIM: Checking TRIM Support
There are several levels of TRIM support, all of which are worth checking.
– TRIM support by the SSD drive itself.
– Whether TRIM is enabled and active on a given system/configuration.
– Whether TRIM is correctly implemented by the SSD controller.
– Whether the SSD supports and implements DRAT and DZAT.
– Checking whether a particular SSD drive advertises TRIM support is as easy as reviewing its S.M.A.R.T. output, using the manufacturer’s bundled tool (e.g. SSD Toolbox, Samsung Magician and similar) or using a third-party tool such as CrystalDiskInfo.
Source link
IBM ingressa em consórcio para impulsionar a linguagem R
June 7, 2016 4:46
A IBM ingressou no R Consortium, iniciativa que tem por objetivo impulsionar a linguagem de programação open source orientada a esforços de Big Data. De acordo com a companhia, a tecnologia teria sido utilizada na construção do Watson.
O R é uma plataforma desenhada para computação estatística e tarefas de análise de dados. A ferramenta ganhou popularidade recentemente, impulsionada pelo desejo das empresas em extraírem valor de grandes volumes de dados.
“Investimos profundamente em softwares open source para aplicações computacionais para ciência de dados”, comentou Dinesh Nirmal, vice-presidente de desenvolvimento de soluções de Big Data e de plataformas analíticas de última geração na IBM. O executivo passa a fazer parte do conselho diretivo do R Consortium.
A IBM se junta a Microsoft e RStudio como membro “Platinum” na organização sem fins lucrativos. Para fazer parte dessa categoria de associados, é preciso investir, pelo menos US$ 100 mil. Google, Oracle e HPE também integram o grupo.
Fonte
Técnico de Suporte
June 6, 2016 14:18
Técnico de Suporte
Não Divulgado
– Postado por galvaojdk
| 6 jun 2016
R. Félix Gomes da Silva, 1205 – Novo Pabussu, Caucaia – CE, Brasil
Emprego
Descrição da Vaga
Pré-requisitos:
· Ensino médio completo;
· Curso Técnico em Informática;
· Experiência mínima de 6 meses na área.
Atividades:
· Atuar na administração da rede de computadores;
· Assegurar suporte aos usuários da rede;
· Realizar manutenção e conservação geral dos hardwares;
· Instalar softwares;
Remuneração:
· Salário: 1.1o0,00
· Benefícios: Tíquete-refeição, Vale-transporte
Local de Trabalho: Caucaia-ce
Relacionado
Como aplicar
Os candidatos que estão dentro do perfil, devem enviar currículo até sexta-feira (10/06/16), com o título da vaga no assunto, para galvaojdk@gmail.com
Relacionado
Job Categories: Free.
Job Types: Emprego.
Job Salaries: Não informado.
Vaga expira em 5 days
Você deve fazer login ou criar uma conta, a fim de enviar uma vaga
Fonte
More Information Points To Destiny: Rise Of Iron Expansion
June 6, 2016 14:03
With a live stream planned for Thursday, Bungie is getting close to revealing details about the next Destiny expansion. An earlier image leak revealed the add-on’s likely name. Today, more details point to it being called Rise of Iron.
The first detail is a Bungie trademark filing with the United States Patent and Trademark Office (USPTO). The trademark for “Rise of Iron” was filed on Monday, May 31.
Click to enlarge.
Additionally, YouTube personality Gothalion snapped the following image of a Google ad for Rise of Iron that touts “new story, raid, gear and weapons.” We’ve reached to Bungie for information and to find out if the company published the ad or if it was a prankster. We’ll update should we receive a response.
Bungies website already leaking details pic.twitter.com/DEcVwWZnfK
— Gothalion (@Gothalion) June 6, 2016
Thanks to reader Alexander for the news tip.
[Source: USPTO, Gothalion on Twitter]
Our Take
It’s looking like this is what Bungie has up its sleeve, but a title is only the barest minimum of information. Hopefully the actual game content lives up to the mounting excitement in the Destiny community.
Source link
Hacker Lexicon: What Is the Digital Millennium Copyright Act?
June 6, 2016 14:02
The call for copyright reform in America has grown so loud that Congress has finally heard it. Lawmakers have ordered a slate of studies to look into how to fix what has become a broken system, and activists are cautiously optimistic that this could be the first step toward reform. The source of the fracture? The Digital Millennium Copyright Act.
The DMCA was passed in 1998 as an anti-piracy statute effectively making it illegal to circumvent copy protections designed to prevent pirates from duplicating digital copyrighted works and selling or freely distributing them. It also makes it illegal to manufacture or distribute tools or techniques for circumventing copy controls.
But in reality the controversial law’s effects have been much broader by allowing game developers, music and film companies and others to keep a tight control on how consumers use their copyrighted works, preventing them in some cases from making copies of their purchased products for their own use or from jailbreaking smartphones and other devices to use them in ways the manufacturers dislike.
The DMCA has two problematic sections: section 1201, which deals with the circumvention of copy-protections, and section 512, which allows a copyright holder to send a so-called takedown notice to web sites and others believed to be infringing a copyright. Both have been abused by companies for purposes unrelated to copyright protection, which has led civil liberties groups and others to call for reform of the law to clarify its scope. For example, companies have used it to thwart competitors and to stifle free speech and security research.
How It’s Been Used to Hurt You
Lexmark, the maker of laser printers, used the DMCA in 2002 to prevent third-party companies from selling refilled toner cartridges for its printers. Lexmark cartridges use authentication so that non-authenticated cartridges won’t work with its printers. But a company named Static Control Components figured out how the verification worked and produced chips to approve refilled cartridges sold by third-party companies. Lexmark sued but lost.
Apple used the DMCA in 2009 to stifle the speech of members of the online forum BluWiki. When forum members engaged in a speculative discussion about ways they might unlock their iPods to sync music playlists between iPods and iPhones without having to use iTunes, Apple used the DMCA to strong-arm BluWiki into taking down the discussion. But the site pushed back, and Apple eventually backed down.
A study released this year by researchers at UC Berkeley and Columbia University found that about a third of DMCA takedown notices are on shaky legal ground, based on a sampling of some 108 million takedown notices issued over a six-month period. Bogus takedown notices fall into many categories, but one example involves a San Francisco news station that once used the DMCA to try to erase a reporting blunder. When one of its broadcasters was duped by a trickster into reading fake names of pilots allegedly involved in an air collision, the station sent YouTube DMCA takedown notices to remove videos of the blunder.
But bogus takedown notices aren’t the only problem. Companies have also tried to use the DMCA as an anti-hacking law to sue for unauthorized computer access. In 2007, for example, Ticketmaster sued RMG Technologies under the DMCA for creating scripts that bypassed CAPTCHAS and ticket limits to rapidly purchase event tickets in bulk from Ticketmaster’s site and re-sell them. Ticketmaster used the DMCA instead of the Computer Fraud and Abuse Act because the latter required the company to show that the computer access resulted in $5,000 or more in system damages to Ticketmaster.
Companies have also used the DMCA to keep vehicle owners beholden to authorized dealers for service and repairs. The John Deere company, for example, has refused to unlock its proprietary tractor software to let farm owners repair their own vehicles, leaving tractor owners in fear of DMCA lawsuits if they try to crack the software protections themselves.
DMCA restrictions like this, however, don’t just make customers beholden to companies, they can also help hide wrongdoing. Last year, university researchers uncovered something fishy going on with Volkswagen emissions but couldn’t determine what exactly was causing it. Eventually, regulators learned that Volkswagen had embedded secret code in its software to help its vehicles cheat emissions tests. Critics pointed out that had these researchers or others had the freedom to explore Volkswagen’s software without the threat of a DMCA violation, the chat code might have been uncovered sooner.
How It Hurts Legitimate Research
The issue with Volkswagen points to a core problem with the DMCA and its stifling of legitimate research. The security community and the software industry has long been at odds over companies threatening legal action under the DMCA to prevent researchers from publicly disclosing software vulnerabilities found in their programs, particularly when those flaws are in the copy-protection mechanisms the companies craft.
One of the first controversial uses of the DMCA occurred in 2001 when the FBI arrested Russian programmer Dmitry Sklyarov at the Def Con hacker conference in Las Vegas after he gave a presentation about bypassing the encryption code Adobe used for electronic books produced with Adobe Acrobat. The encryption prevented customers from making copies of their books to read on multiple systems, so Sklyarov produced a tool that bypassed this restriction and handed out a trial version at the conference with information about how to purchase the full tool. Adobe urged the FBI to act but had to withdraw its complaint after the security community rose up in protest.
That same year the Secure Digital Music Initiative (SDMI), a consortium of recording companies, consumer electronics firms and others, went after a group of researchers who discovered flaws in a digital watermarking technology the consortium developed to thwart piracy. The SDMI had actually invited hackers and researchers to try to defeat its technology, and a group of researchers led by Princeton University computer science professor Ed Felten succeeded in uncovering flaws. But when they sought to present their findings at a conference, the SDMIT threatened them with legal action under the DMCA. The researchers were eventually able to present some of their findings publicly but not until they filed a lawsuit asserting their First Amendment rights.
Something similar to Sklyarov’s case occurred in 2010 when George Hotz, aka Geohot, devised and disclosed a hack that allowed him to play homemade games on his Sony PlayStation 3. The hack, unfortunately, also allowed anyone to play pirated games on the system, so Sony issued a forced firmware update to eliminate the flaw Hotz exploited. Hotz responded by releasing his own firmware for the system and disclosing the system’s root keys, allowing others to subvert PlayStation 3 systems in the ways he had hacked his own. Sony sued him under the DMCA and Computer Fraud and Abuse Act, though it eventually backed down after Hotz agreed not to hack any Sony products in the future or publicly discuss ways to do so.
DMCA threats have also been made against researchers who discovered more serious security flaws in software.
In 2002, Hewlett-Packard went after researchers with SnoSoft who found 22 vulnerabilities in Tru64, its Unix operating system. HP initially accused the researchers of violating the DMCA when exploit code for one of the vulnerabilities they discovered appeared online. But the company backed down after HP employees and others warned then-CEO Carly Fiorina that the company’s aggressive stance would curb future vulnerability research that could help HP create more secure software.
Exemptions to the Law
It’s because of cases like this one—any many others targeting researchers—that the security community has long sought exemptions to the DMCA that would allow them to reverse-engineer software and disclose vulnerabilities found in systems, without facing legal threats. This is a particularly critical issue with regard to devices and systems with life-threatening and public safety implications, such as the software used in vehicles and medical devices. Car owners and patients have been fighting for the right to get access to the proprietary software embedded in their vehicles and devices, as well as the data these devices collect about them, in order to gauge the security of the systems, without having to fear a DMCA threat in the process.
The Librarian of Congress, along with the Copyright Office, is responsible for approving exemptions and over the years have done exactly this for various purposes. But the process of submitting exemptions is long and arduous and requires that those submitting requests provide extensive evidence of a need. And even when exemptions are granted, they are generally very narrow in scope and only last for three years, after which they have to be renewed or they expire. In 2006, for example, the Librarian approved a long-sought exemption to allow smartphone owners to jailbreak their devices in order to switch carriers. That exemption got expanded in 2009 to include jailbreaking for any purpose. But in 2013, the jailbreaking exemption for smartphones expired and wasn’t renewed.
Last year, in the wake of several disclosures about security problems in vehicle software, the Library of Congress approved an exemption for hacking car software for the purpose of doing good-faith security research, and another exemption for the authorized owners of vehicles to bypass protections on vehicle software for diagnosis, repair or lawful modification purposes. Similarly, a new exemption for medical devices approved last year also allows patients to access data generated by an implanted device they own. But without reform of the DMCA, these and other exemptions will remain narrowly focused and have to go through the renewal process in three years.
Luckily, researchers now have three years to uncover serious problems with these systems in order to gather evidence that such exemptions are needed and should be renewed.
Source link
Social Media Tools and Platforms in Learning Environments
June 6, 2016 13:57Online social media have transformed the face of human interaction in the 21st century. Wikis, blogs, online groups and forums, podcasts, virtual worlds, and social tagging are but a few of the applications enabling innovative behaviors that support acquisition, access, manipulation, retrieval, and visualization of information. It is, therefore, no surprise that educational practitioners and theorists have begun to explore how social media can be harnessed to describe and implement new paradigms for communication, learning, and education.
The editors’ goal in publishing this book was to identify original research on the application of online social media and related technologies in education as well as emerging applications in Web technologies that could provide and shape future educational platforms. The selected contributions deal with questions such as how social media can truly enrich and enhance learning and teaching experiences in ways not otherwise possible; how learning can be integrated in a distributed and ubiquitous social computing environment; or what theories, paradigms, and models are applicable for the support of social computing in education.
Researchers in education or educational software will find interesting and sometimes provocative chapters on paradigms and methodologies, virtual and mobile learning spaces, and assessment and social factors. Practitioners in these fields will benefit from an additional section devoted to case studies and first experience reports.