Do You Know The Meaning of "Cloud Bursting"?

TechTarget network has many e-newsletters and I subscribe to several of them.  One of the e-newsletters is called “” and it endeavors to define a term in one of its features called Word of the Day.  And so let me ask the question again.  Do you know what Cloud Bursting means?  The term is from an Essential Guide developed by the editors of TechTarget who selected from many articles, videos, and other content to give a comprehensive view of the Hybrid Cloud Model entitled GUIDING THE ENTERPRISE INTO A HYBRID CLOUD MODEL.

Cloud Bursting in part is a feature of a certain Hybrid Cloud deployment.  Initially the application will run in the Private Cloud (i.e. application runs behind the firewall in the enterprise’s data center) and if there is a spike in demand the application will BURST into the public cloud.  Costs are kept low since the enterprise pays only for the extra capacity when needed.

Such a deployment is recommended for “non-critical” apps dealing with “non-sensitive” data.  Enterprises can take advantage of such a deployment if they have regular peak demand periods or they have applications without complex infrastructure or integration requirements with their internal data center.  Of course security and regulatory compliance must still be considered.  Peak demands during holiday season might be attractive for some, but specifically large retailers must always be aware of placing non-public personal information into the Public Cloud.

How To Choose The Right "PUBLIC" Cloud Provider


Webopedia defines a PRIVATE Cloud as one where the enterprise’s computing platform is under the control of the IT department and implemented within the corporate firewall. It is designed to offer the same features and benefits of public cloud systems without the concerns of control over the enterprise’s and their customer’s data, or its security, or issues connected to regulatory compliance. On the other hand a PUBLIC Cloud as defined by TechTarget is one based on the standard model, where a service provider makes resources, such as applications and storage, available to the general public over the Internet. Public cloud services may be free or offered on a pay-per-usage model and are usually a fast and cheaper implementation and scalable.

 Aaron Nathan recounts in his recent article entitled Three Tips for Choosing a Public Cloud Provider his experiences of moving from a Private Could environment to a Public Cloud and the things he learned in picking the right Public Cloud Provider. He identifies and discusses three “Values” he believes are essential in choosing a Public Cloud Provider. These essential Values are:

1.      Attitude – While performing your due diligence try to determine how much importance the Public Cloud Provider places on security. Is the Provider mainly marketing to consumers, who place less importance on security, or to enterprises which focus more on these types of issues? Try to learn from your discussions the Provider’s corporate culture regarding such matters.

2.     Awareness – This is a delicate matter since a Provider is more likely to boast about its strengths and shy away from discussing their weaknesses. The discussion can center on how past problems were discovered and fixed.

3.     Balance – No system is good if it is loaded with encryption keys, firewalls, passwords and other security blockers. If your users become frustrated they may try to avoid such hurdles and use unauthorized solutions. Your data becomes more vulnerable than secure. Test out the system with full security implemented. Determine if the user-interface was intuitive and search for the mix of security and usability.


China Mobile Opens 700 Million Subscribers to Apple's iPhone



Matt Egan reports for FOXBusiness in his article entitled Report: Apple Reaches China Mobile iPhone Deal that China Mobile, the world’s largest wireless carrier, and Apple have inked a deal which would purportedly pave the way for China Mobile’s 700 million subscribers to purchase Apple’s iPhone. China Mobile is set to unveil its 4G network at their December 18th company meeting. This new agreement synchs with the wireless carrier’s proclamations not to introduce the iPhone until their old 3G network is replaced.

Apple estimates it could sell over 20 million iPhones to China Mobile subscribers in the first year alone, in addition to the already existing more than 35 million iPhone users waiting to upgrade, despite the lack of any formal agreement.

Do You Use These Annoying Phrases - Well Stop It


He’s in a meeting … She has called another meeting … We have a meeting in 15 minutes.

Oy … One of the reasons I left “Corporate America” and started my own little law practice was to get away from the countless requests to schedule a meeting …. And to discuss what??? To this day I have no idea. Now I’m not talking about a contract negotiation, which is my “bread & butter”. Those are the types of meeting where I can “get the ball rolling” and “drill down to the minutia of detail” as I “touch base” with my opposing counsel and let him/her know that the issues are “on my radar” as I urge them to “think outside the box”. It’s a “no brainer” …. EEEK …. Stop me!!!!!

Bernard Marr is a Best-Selling Author and Enterprise Performance Expert and he recently penned a brief article entitled Stop Using These 30 Phrases At Work! and posted it in LinkedIn which was kind enough to send it along to me. Marr has compiled a list of 30 annoying phrases he refers to as “management gobbledygook” which he finds so pretentious and irritates people so much that the real issue is often misunderstood or missed altogether.

Here’s his list of 30. Do you use any of these ….?

  1. Going forward
  2. Drill-down
  3. End of play
  4. Touch base
  5. It's on my radar
  6. No brainer
  7. Best of breed
  8. Low hanging fruit
  9. Reach out
  10. Dive deeper
  11. Think outside the box
  12. Positive momentum
  13. On my plate
  14. At the end of the day
  15. Run the numbers
  16. Touch points
  17. Keep your eye on the ball
  18. Back to the drawing board
  19. Get the ball rolling
  20. Bang for your buck
  21. Close the deal
  22. When the rubber hits the road
  23. Shift paradigm
  24. Move the needle
  25. Game-changing
  26. Move the goal post
  27. Value added
  28. Win-win
  29. Across the piece
  30. All hands on deck

FULL DISCLOSURE:  In addition to 1, 2, 4, 5, and 6, I have been known to use 11, 13, 15, and 21. Lastly, I always thought I was being clever with 23 and 27, but I guess I wasn’t fooling anyone …..

Google Petitions FISA Court Regarding NSA Requests


Martha Neil reports in a June 18, 2013 article in the ABA Journal entitled Google asks intelligence court to relax gag orders on secret data requests” that the Internet Search giant has sought a declaratory judgment from the Foreign Intelligence Surveillance Court (“FISA”). Google seeks to have the courts gag rules loosened regarding the NSA requests on secret data.

Google released the following statement:

Greater transparency is needed, so today we have petitioned the Foreign Intelligence Surveillance Court to allow us to publish aggregate numbers of national security requests, including FISA disclosures, separately,”

Apple's Commitment to Customer Privacy and NSA Requests


Andy Jones reports on the NSA’s “PRISM” surveillance program and the industry’s “tech giants” (i.e. Apple, Google, Facebook, Microsoft, and Yahoo) and their cooperation to date in his article in bizcloud entitled Apple Releases Information on NSA Data Requests. The companies denied participating in the NSA program and stated that the government did not have access to their servers or data

Apple posted a Commitment to Customer Privacy on its website. They stated that any release of any customer data would require a court order. Apple then took the unprecedented step of releasing the number of data requests they have received from the NSA:

From December 1, 2012 to May 31, 2013

·         Between 4000 and 5000 requests for customer data

·         Of those requests, between 9000 and 10,000 accounts or devices were identified

·         Requests “came from federal, state and local authorities and included both criminal investigations and national security matters.

Apple stated it refuses to fulfill “inconsistent or inaccurate requests”.  Apple also stated it does not provide data on FaceTime and iMessage conversations and chooses not to retain that data.   Customer Information related to location, Maps searches, and Siri requests are not stored in any identifiable form.

What is Data Mining



The hottest topic of the day is Data Mining. Unless you have been in a coma for the last few days, it has come to light that our government is involved in this activity. I staunchly try to stay away from any discussion about politics in this Blog and will do so here. However, as my readers know, I am a man who needs to have things defined. Once I know what I am dealing with, then I, and in this case the readers of this Blog, can make an informed decision.

In my research I was able to find a White Paper on the subject simply entitled Data Mining: What is Data Mining? The White Paper is somewhat technical in nature, but it does have the definitions that we need to get a foothold on the topic and it also has some good examples to help our understanding. In the spirit of Full Disclosure the author of this White Paper is not listed. Because we are dealing with definitions it is somewhat difficult to characterize these definitions in any words other than those in the White Paper. I will cut and paste these definitions and what I feel are the salient points from the White Paper into this posting. Therefore, the bulk of the remainder of this posting will be directly from the White Paper and not my own words. 

“Generally, data mining (sometimes called data or knowledge discovery) is the process of analyzing data from different perspectives and summarizing it into useful information - information that can be used to increase revenue, cuts costs, or both. Data mining software is one of a number of analytical tools for analyzing data. It allows users to analyze data from many different dimensions or angles, categorize it, and summarize the relationships identified. Technically, data mining is the process of finding correlations or patterns among dozens of fields in large relational databases. Comment: It appears from this opening definition and from the examples given in this White Paper that the author is taking a business perspective on the topic. The activity of Data Mining can be applied to other activities such as those of interest to our government at the present time.

“Although data mining is a relatively new term, the technology is not. Companies have used powerful computers to sift through volumes of supermarket scanner data and analyze market research reports for years. However, continuous innovations in computer processing power, disk storage, and statistical software are dramatically increasing the accuracy of analysis while driving down the cost.” Comment: Again, this is from a business perspective. --- AND here is an application of the usefulness of this activity: For example, one Midwest grocery chain used the data mining capacity of Oracle software to analyze local buying patterns. They discovered that when men bought diapers on Thursdays and Saturdays, they also tended to buy beer. Further analysis showed that these shoppers typically did their weekly grocery shopping on Saturdays. On Thursdays, however, they only bought a few items. The retailer concluded that they purchased the beer to have it available for the upcoming weekend. The grocery chain could use this newly discovered information in various ways to increase revenue. For example, they could move the beer display closer to the diaper display. And, they could make sure beer and diapers were sold at full price on Thursdays.


Data are any facts, numbers, or text that can be processed by a computer. Today, organizations are accumulating vast and growing amounts of data in different formats and different databases. This includes:

  • operational or transactional data such as, sales, cost, inventory, payroll, and accounting
  • nonoperational data, such as industry sales, forecast data, and macro economic data
  • meta data - data about the data itself, such as logical database design or data dictionary definitions


The patterns, associations, or relationships among all this data can provide information. For example, analysis of retail point of sale transaction data can yield information on which products are selling and when.


Information can be converted into knowledge about historical patterns and future trends. For example, summary information on retail supermarket sales can be analyzed in light of promotional efforts to provide knowledge of consumer buying behavior. Thus, a manufacturer or retailer could determine which items are most susceptible to promotional efforts.

Data Warehouses

Dramatic advances in data capture, processing power, data transmission, and storage capabilities are enabling organizations to integrate their various databases into data warehouses. Data warehousing is defined as a process of centralized data management and retrieval. Data warehousing, like data mining, is a relatively new term although the concept itself has been around for years. Data warehousing represents an ideal vision of maintaining a central repository of all organizational data. Centralization of data is needed to maximize user access and analysis. Dramatic technological advances are making this vision a reality for many companies. And, equally dramatic advances in data analysis software are allowing users to access this data freely. The data analysis software is what supports data miningComment: This sort of activity is what has been mentioned in the news lately.

What can data mining do?

Data mining is primarily used today by companies with a strong consumer focus - retail, financial, communication, and marketing organizations. It enables these companies to determine relationships among "internal" factors such as price, product positioning, or staff skills, and "external" factors such as economic indicators, competition, and customer demographics. And, it enables them to determine the impact on sales, customer satisfaction, and corporate profits. Finally, it enables them to "drill down" into summary information to view detail transactional data.

With data mining, a retailer could use point-of-sale records of customer purchases to send targeted promotions based on an individual's purchase history. By mining demographic data from comment or warranty cards, the retailer could develop products and promotions to appeal to specific customer segments.

For example, Blockbuster Entertainment mines its video rental history database to recommend rentals to individual customers. American Express can suggest products to its cardholders based on analysis of their monthly expenditures.

WalMart is pioneering massive data mining to transform its supplier relationships. WalMart captures point-of-sale transactions from over 2,900 stores in 6 countries and continuously transmits this data to its massive 7.5 terabyte Teradata data warehouse. WalMart allows more than 3,500 suppliers, to access data on their products and perform data analyses. These suppliers use this data to identify customer buying patterns at the store display level. They use this information to manage local store inventory and identify new merchandising opportunities. In 1995, WalMart computers processed over 1 million complex data queries.

The National Basketball Association (NBA) is exploring a data mining application that can be used in conjunction with image recordings of basketball games. The Advanced Scout software analyzes the movements of players to help coaches orchestrate plays and strategies. For example, an analysis of the play-by-play sheet of the game played between the New York Knicks and the Cleveland Cavaliers on January 6, 1995 reveals that when Mark Price played the Guard position, John Williams attempted four jump shots and made each one! Advanced Scout not only finds this pattern, but explains that it is interesting because it differs considerably from the average shooting percentage of 49.30% for the Cavaliers during that game.

By using the NBA universal clock, a coach can automatically bring up the video clips showing each of the jump shots attempted by Williams with Price on the floor, without needing to comb through hours of video footage. Those clips show a very successful pick-and-roll play in which Price draws the Knick's defense and then finds Williams for an open jump shot.

How does data mining work?

While large-scale information technology has been evolving separate transaction and analytical systems, data mining provides the link between the two. Comment: The preceding sentence is key to this activity. Data mining software analyzes relationships and patterns in stored transaction data based on open-ended user queries. Several types of analytical software are available: statistical, machine learning, and neural networks. Generally, any of four types of relationships are sought:

  • Classes: Stored data is used to locate data in predetermined groups. For example, a restaurant chain could mine customer purchase data to determine when customers visit and what they typically order. This information could be used to increase traffic by having daily specials.
  • Clusters: Data items are grouped according to logical relationships or consumer preferences. For example, data can be mined to identify market segments or consumer affinities.
  • Associations: Data can be mined to identify associations. The beer-diaper example is an example of associative mining.
  • Sequential patterns: Data is mined to anticipate behavior patterns and trends. For example, an outdoor equipment retailer could predict the likelihood of a backpack being purchased based on a consumer's purchase of sleeping bags and hiking shoes.

Data mining consists of five major elements:

  • Extract, transform, and load transaction data onto the data warehouse system.
  • Store and manage the data in a multidimensional database system.
  • Provide data access to business analysts and information technology professionals.
  • Analyze the data by application software.
  • Present the data in a useful format, such as a graph or table.

Different levels of analysis are available:

  • Artificial neural networks: Non-linear predictive models that learn through training and resemble biological neural networks in structure.
  • Genetic algorithms: Optimization techniques that use processes such as genetic combination, mutation, and natural selection in a design based on the concepts of natural evolution.
  • Decision trees: Tree-shaped structures that represent sets of decisions. These decisions generate rules for the classification of a dataset. Specific decision tree methods include Classification and Regression Trees (CART) and Chi Square Automatic Interaction Detection (CHAID) . CART and CHAID are decision tree techniques used for classification of a dataset. They provide a set of rules that you can apply to a new (unclassified) dataset to predict which records will have a given outcome. CART segments a dataset by creating 2-way splits while CHAID segments using chi square tests to create multi-way splits. CART typically requires less data preparation than CHAID.
  • Nearest neighbor method: A technique that classifies each record in a dataset based on a combination of the classes of the k record(s) most similar to it in a historical dataset (where k 1). Sometimes called the k-nearest neighbor technique.
  • Rule induction: The extraction of useful if-then rules from data based on statistical significance.
  • Data visualization: The visual interpretation of complex relationships in multidimensional data. Graphics tools are used to illustrate data relationships.

What technological infrastructure is required?

Today, data mining applications are available on all size systems for mainframe, client/server, and PC platforms. System prices range from several thousand dollars for the smallest applications up to $1 million a terabyte for the largest. Enterprise-wide applications generally range in size from 10 gigabytes to over 11 terabytes. NCR has the capacity to deliver applications exceeding 100 terabytes. There are two critical technological drivers:

  • Size of the database: the more data being processed and maintained, the more powerful the system required.
  • Query complexity: the more complex the queries and the greater the number of queries being processed, the more powerful the system required.

Relational database storage and management technology is adequate for many data mining applications less than 50 gigabytes. However, this infrastructure needs to be significantly enhanced to support larger applications. Some vendors have added extensive indexing capabilities to improve query performance. Others use new hardware architectures such as Massively Parallel Processors (MPP) to achieve order-of-magnitude improvements in query time. For example, MPP systems from NCR link hundreds of high-speed Pentium processors to achieve performance levels exceeding those of the largest supercomputers.

15 Traits of Great Leaders


This is not the usual subject matter of my postings in this Blog. However, it is indirectly related to how we all function in a work environment and how we deal with personal interactions with our colleagues and that is why I placed it in the category of “Other Interesting Items”. 

In 2011, salaries for the 200 top-paid CEOs rose 5 percent to a median $14.5 million per year, according to a study by compensation-data company Equilar.”

I was very intrigued by the article in The Huffington Post by Glenn Llopis entitled The Most Successful Leaders Do 15 Things Automatically, Every Day”. I have owned a couple of businesses and had employees. I was interested to read when some of my actions and philosophy matched the author’s defined traits. I have carried over my Traits into my current position and use them in my negotiations with opposing counsel(s). 

In the introduction the author seems to be saying that Leaders are made and not born, in other words the identified traits of Leaders are an amalgam of that person’s life experiences. These life experiences eventually become so inculcated into that person’s decision making process that huge and very sensitive decisions that would cause most of us great difficulty can be made rapidly and on a daily basis. Llopis explains this is why most Leaders are comfortable going with their “gut-feel” when deciding complex issues. I still think there is a certain innate ability as part of this decision making process. You decide. Here are the 15 Traits with some brief commentary from me:

1.       Make Others Feel Safe to Speak-Up: Intimidation does not work. Be able to tap into the ideas of others.

2.       Make decisions: I’ve been in meetings where the discussions go on for hours but nothing gets decided. This breaks the rhythm of the enterprise and the frustration factor grows exponentially.

3.       Communicate Expectations: When you set expectations at the outset that are reasonable and achievable and remind others of these expectations periodically, things get done.

4.       Challenge People to Think: Once you learn your colleagues capabilities you can encourage them (not push them) to go a little further. I’ve always said that once a person becomes “comfortable” in business then it is just a matter of time when that complacency becomes counter-productive.

5.       Be Accountable to Others: The author explains that this is not succumbing to others, but rather having the ability to show that you are concerned with their success as well as your own.

6.       Lead by Example: This I think is self-explanatory.

7.       Measure and Reward Performance: Never take consistent performers for granted.

8.       Provide Continuous Feedback: And making it reciprocal builds trust.

9.       Properly Allocate and Deploy Talent: Delegation of duties should be your mantra.

10.   Ask Questions and Seek Counsel: ALL THE TIME.

11.   Avoid Procrastination: See bullet #2 above.

12.   Positive Energy and Attitude:  Set the right tone and you will motivate people.

13.   Be a Great Teacher: I love this one --- full disclosure --- I was an Assistant Professor in my younger days.

14.   Invest in Relationships: Don’t be territorial. Open up to others and seek out people that can broaden your perspective.

15.   Genuinely Enjoy Responsibilities: Not for the power, but rather for the meaningful and purposeful impact you can have on others. Serve others ….



New Privacy Laws and How They Will Affect You


Confidentiality is one of the key items negotiated in Contracts dealing with Software Licensing, and the Consulting Services necessary to implement the software package, and any Outsourcing or Hosting arrangements that may also be desired. Both parties, the Licensor and the Licensee, have valuable information that each wish to be kept secret and yet must be shared in order to go forward with the deal. In fact the sales cycle should begin with a signed Confidentiality Agreement. One might assume that this is furnished by the vendor, and in many cases that is correct. However, I have been involved in many negotiations with buyers big and small who provide their own version of their Confidentiality Agreement. The areas of concern for both parties are many and include such issues as reverse engineering, trade secrets, research, development, business activities, customer lists, products, services, technical knowledge, written or descriptive material, drawings, videotapes, operational data, blueprints, descriptions, or other papers or documents and any derivative works created from the confidential information disclosed.

These Confidentiality Agreements, also known as Nondisclosure Agreements, contain language describing what confidential and/or proprietary information will not fall under the terms of the Agreement, such as information already known to the receiving party or information already in the public domain. Disclosure by a valid court order is also allowed. And usually the parties agree that any violation of the restrictions on disclosure would cause the other party irreparable injury and thus allows such party to seek an injunction to prevent such release.

As our society and technology has advanced and methods of accessing such information have emerged, other issues in need of secrecy have developed such as HIPAA requirements and other Non-Public Personal Information, such as social security numbers, compensation, and drug testing results. As a practitioneer, I have had to deal with these issues and concerns as they developed and were presented for negotiation and also need to keep abreast of all new issues as our society and technology progress.

From time to time some of my readers have sent to me articles they have written and consider relevent to the stated purposes and goals of this blog. One such person, Gillian Holmes, has contacted me and pointed out a extremely important and relevent article in BACKGROUNDCHECK.ORG entitled The Legislation of Privacy: New Laws That Will Change Your Life.  The article is current and provides the reader a list of the new Privacy Laws that we as practitioneers and also US Citizens need to be made aware. The layout of the article is well done. There is a brief synopsis of the new law, its name, and legislative sponsor. This description is followed by two brief subsections; one entitled “How It will Affect You” (this is self-explanatory), and the second is entitled “Timeline” and lays out when the new law was passed or when it is expected to become law. In addition to a DIGITAL COMMERCE section with pertinent legislation for the purposes of this Blog, such as:

·         A bill of rights for consumers and a report entitled, “Consumer Data Privacy in a Networked World: A Framework for Protecting Privacy and Promoting Innovation in the Global Digital Economy”,

·         The GPS Act providing guidelines to when and how geolocation information can be accessed and used, and

·         Cyber intelligence Sharing and Protection Act (“CISPA”), and

·         The newly updated HIPAA entitled “Health Information Technology for Economic and  Clinical Health” (“HITECH”)

This article also includes information on:

·         Online predators with “The Protecting Children from Internet Pornographers Act of 2011”, and

·         Amendments to COPPA “Children Online Privacy Protection Act”, and

·         “Social Media Privacy Act” which addresses privacy boundaries crossed when potential employers require applicants to turn over passwords to social media accounts.

The article seems to be thorough and one that I highly recommend to be on your must read list.


IDC Forecasts $24 Billion Annual Spend on Hosted Private Cloud Services by 2016


A February 28, 2013 article in bizcloud by razavi entitled Hosted Private Cloud Services to Surpass $24 Billion in 2016 reports on International Data Corporation’s (“IDC”) optimistic outlook for Hosted Private Cloud (“HPC”) services in the near future. IDC predicts a compounded annual growth of more than 50% for the next 5 years. IDC predicts that the coming growth of HPC will transform how IT providers for outsourcing and hosting will provide their services.

The two types of deployment models for Cloud Services are:

1.       Public Cloud:  Opened to an unrestricted number of users who share services, and

2.       Private Cloud: Where a single Enterprise has defined users restrictions on access and level of allocated resources.

HPC is a hybrid of the private cloud services model and this hybrid can be further broken down into 2 models:

1.       Dedicated Private Cloud - Focus is on the needs of one enterprise with significant customer control over the contracted resources.

2.       Virtual Private Could – Contains shared virtualized resources with a wider range of customer controls and security options.

Robert Mahowald, Research Vice President at IDC and leads the SaaS and Cloud Services practice stated, “IDC anticipates that virtual private cloud will be the predominant operational model for companies wanting to take advantage of the speed and lower capital costs associated with cloud computing …”

As current IT buyers with an aging infrastructure look to the cost savings available from the Cloud, they will recognize the need to centralize their management of their cloud capabilities. These buyers are more likely to be Virtual Private Cloud customers. Enterprises with existing outsourcing and hosted environments will be looking for relief in the asset management and operational reliability area. These enterprises will probably be the Dedicated Private Cloud purchasers. Large incumbent packaged software providers and equipment providers, global systems integrators, professional services firms, and telecommunications service providers will be the beneficiaries as the Dedicated Private Cloud grows. Conversely, a new crop of vendors will benefit if the Virtual Private Cloud becomes the dominant model as IDC predicts.

Robert Mahowald stated:

“Not even the largest technology incumbents can sustain IT market leadership without achieving leadership in cloud services. Quite simply, vendor failure in cloud services will mean stagnation. Vendors need to be doing everything they can – today – to develop a full range of competitive cloud offerings and operating models optimized around those offerings.”