December 30, 2014

Consumerization Of Government Services Starts With Case Management
With a case-centric approach, agencies can track information more efficiently, make automated intelligent decisions, and route casework accordingly. This can mean serving a specific customer and fulfilling a request, or working across agencies to achieve a shared result, such as solving a crime, reducing the time required to determine whether a citizen is eligible for certain benefits, or even responding to a natural disaster and supporting recovery. The move to digital is critical if agencies wish to improve their standard of service -- and it means taking a holistic perspective at how your agency interacts with customers and considering new ways to leverage technology.


The World's Biggest Data Breaches, In One Incredible Infographic
In late November, hackers targeted Sony Pictures Entertainment in an unprecedented cyber attack. This led to the exposure of thousands of sensitive emails from Sony executives and threats to release more if the release of the film "The Interview" wasn't canceled. While this breach was indeed historically devastating, it's not the first successful cyber attack on a big corporate powerhouse. The folks over at Information Is Beautiful have put together an amazing infographic with the biggest data breaches in recenty history. You can see when the attack happened, who it happened to, and how large the impact was.


Alleged tech support scammers come up with all kinds of alibis to counter complaints
All four allegedly operated telemarketing scams where consumers were told that their Windows PCs were infected with malware or needed to be optimized to work properly. Some consumers had contacted the companies themselves after seeing their websites or search result ads, while others had been cold-called by the firms. The "help" provided was largely worthless, and in some cases the companies' representatives planted malware on the victims' PCs, the FTC and Microsoft charged. Customers were charged hundreds for the calls or fast-talked into expensive multi-year service contracts.


The Future of Everything? It’s About People Connecting with People
While a majority of organizations are starting to embrace social, mobile, real-time to various extents, if you really stop to think about it, they are simply running to where they think customers are rather than taking the time to understand why they’re in each channel, what they expect and how they (and you) define value. More importantly, there needs to be an integrated experience in these channels that align with the new customer journey that’s taking shape and evolving every day. The traditional funnel that exists today, or what I refer to in the new book as the Cluster Funnel, reflects how businesses are organized today.


The 2015 State of the U.S. Health & Fitness Apps Economy
It’s difficult to know what the best apps are for anything. So many apps populate Google Play and Apple App Store for each category that it is nearly impossible to know what is quality and what is merely mediocre. To help people understand what the best apps are for tracking their health & fitness and medical goals, Applause, the 360º app quality company, introduces the ARC 360 research report on The 2015 State Of The U.S. Health & Fitness Apps Economy. The report also helps companies determine where they stand in terms of quality vis-à-vis their competitors.


Designers Are Ditching The Mouse For The “Flow” 3D Motion Touch Controller
Co-founder Tobias Eichenwald thinks there are better ways to work than squinting at a screen. He wants Flow to let you control your computer “blindly, unconsciously, naturally” — like a guitar. Normally, designers have to dig through Photoshop menus, then use a clumsy mouse or hit the bracket button, which changes things in increments that are too big. “You can never do pixel-perfect graphics” says Eichenwald. With Flow, you can bump up or down the hue or brush size in Photoshop, alter model angles in AutoCAD, switch layers in Illustrator, select frames in a video editing app, and more.


5 Hyperscale Lessons For Mainstream Datacenters
In 2014, industry watchers have seen a major rise in hyperscale computing. Hadoop and other cluster architectures that originated in academic and research circles have become almost commonplace in the industry. Big data and business analytics are driving huge demand for computing power, and 2015 should be another big year in the datacenter world. What would you do if you had the same operating budget as one of the hyperscale datacenters? It might sound like winning the lottery, or entering a world without limitations, but any datacenter manager knows that infrastructure scaling requires tackling even bigger technology challenges -- which is why it makes sense to watch and learn from the pioneers who are pushing the limits.


2015 Prediction: FinServ & Regulators Will See Opportunity in Internet of Things
some legal gray areas might be whether it would be okay if a third party aggregated the farm information, combined it with satellite imagery of fields, and sold subscriptions to trading shops? If so, would that service come under regulatory scrutiny? And if that data could affect share price, how public would this data be? Would regulators call foul on firms that could not correlate the sensor data and flag suspicious employee behavior? What responsibility would a firm have to adopt these surveillance measures? "Regulators are going to be tapping into all these techniques and speeding up," Bates said. It is very probable they will leverage sensor data to track more people and things, just as firms will use the data to innovate their strategies.


Neglected Server Provided Entry for JPMorgan Hackers
The relatively simple nature of the attack — some details of which have not been previously reported — puts the breach in a new light. In August, when Bloomberg News first reported on the attack, which ultimately compromised some account information for 83 million households and small businesses, the bank’s security experts and the Federal Bureau of Investigation feared a sophisticated adversary. Some suspected the attack, possibly with backing from Russia, was intended as retaliation against economic sanctions levied by the United States and its allies in response to Russia’s policies in Ukraine. By mid-October, however, that theory began to fray, and the F.B.I. officially ruled out the Russian government as a culprit.


WiFi Preps for 5G, IoT Roles
The so-called NG60 study group has had just two meetings so far and may require as much as two years to complete its first draft standard. It is working on an upgraded version of the 60 GHz version of WiFi, 802.11ad, capable of delivering 20 Gbit/s over a very short range. Ultimately, NG60 also may include hardware support for mesh networks that could deliver a Gbit/s over 200 to 400 meters for backhaul links on small-cell base stations. Researchers at InterDigital Inc. are building a prototype of a 60 GHz directional mesh architecture using electronically steered phased array antennas that could support up to five hops.




Quote for the day:

"Great things are not something accidental, but must certainly be willed." -- Vincent van Gogh