December 13, 2013

Return on security investment: The risky business of probability
One challenge with probability estimates is how to determine what the population should be (that's the denominator). This can be as simple as the organization overall -- three out of every 10 companies in the population. But more likely, the probability is based on percent of assets -- users, systems, applications -- expected to be compromised over a defined period of time. Completely crazy people (like me) may want to select a population of event actions.


Internet of things devices will dwarf number of PCs, tablets and smartphones
“By 2020, the number of smartphones, tablets and PCs in use will reach about 7.3 billion units," said Peter Middleton, research director at Gartner. "In contrast, the IoT will have expanded at a much faster rate, resulting in a population of about 26 billion units at that time." Part of this will be because of the low cost of adding IoT capability to consumer products, Gartner said, and it expects that "ghost" devices with unused connectivity will be common.


K-Means Data Clustering Using C#
There are many different clustering algorithms. The k-means algorithm is applicable only for purely numeric data. Data clustering is used as part of several machine-learning algorithms, and data clustering can also be used to perform ad hoc data analysis. I consider the k-means algorithm to be one of three "Hello Worlds" of machine learning (along with logistic regression and naive Bayes classification).


Hamish Taylor on innovation: think outside your industry
“We need to change the way we understand customers,” Taylor said. “We’ve got to get better generally at soft insights, not data.” Insightful customer understanding, he explained, comes from understanding the customer’s world, and to illustrate this he gave an example from his time at the helm of Sainsbury’s Bank.  The project was to set up the bank in the supermarket. The traditional approach suggested a bank information point, with leaflets and a desk staffed by people in uniform. In short, a traditional bank, but just situated in the supermarket.


Beyond Mobile Gestures
These gestures are becoming one of the main reasons while customers choosing their new smart phone such as battery consumption, screen size, weight or processor. The mobile phone companies are investing much on the features to be selected by customers. Especially the phone companies who offer their customer same Operating System (Android) are in the competition.


Michael Skok on Bring Your Own Cloud
The relentless consumerization of IT has moved from BYOD to Bring Your Own Cloud (BYOC). An example of this is how people are taking cloud services like LinkedIn from home to work and expecting those services to work seamlessly with technologies like their office CRM systems. As a result, LinkedIn has built a service for Salesforce.com, integrating its contact networks and social network with that CRM platform. ... BYOC is here to stay and will be a very significant force in the enterprise to drive business and on the IT side spurring adaptation to allow employees to freely consume these cloud services.


ITU standardizes 1Gbps over copper, but services won't come until 2015
The technology increases the bandwidth by using more spectrum, which could be compared to adding more lanes to a road. G.fast will use the 106MHz of spectrum, which compares to the 17MHz or 30MHz used by VDSL2 and the 40MHz used by the fastest LTE-Advanced networks currently being tested. The drawback with G.fast is that it will only work over short distances, so 1Gbps will only be possible at distances of up to about 100 meters.


Enhanced threat detection: The next (front) tier in security
The Chinese military classic, The Art of War, is commonly quoted within the security community: "If you know your enemies and know yourself, you will not be imperiled in a hundred battles…" We know the enemies well and their methods for evading detection. The "know yourself" part is somewhat lost in translation; most of us are focused on adding security countermeasures, which are not cookie cutter for every corporate infrastructure.


Steve Ballmer: The Exit Interview
ZDNet's Mary Jo Foley didn't get an interview with Steve Ballmer for 20 years but got his exclusive exit interview now that Ballmer's reign at Microsoft is coming to an end. Here, Foley and ZDNet Editor in Chief Larry Dignan discuss the highlights of that interview as well as Ballmer's hits and misses in 14 years as CEO and his larger legacy.


Bots now running the Internet with 61 percent of Web traffic
According to a recent study by Incapsula, more than 61 percent of all Web traffic is now generated by bots, a 21 percent increase over 2012. Much of this increase is due to "good bots," certified agents such as search engines and Web performance tools. These friendly bots saw their proportion of traffic increase from 20 percent to 31 percent. Incapsula believes that the growth of good bot traffic comes from increased activity of existing bots, as well as new online services, like search engine optimization



Quote for the day:

"Advice is what we ask for when we already know the answer but wish we didn't." -- Erica Jong