September 03, 2015

MySecureShell Documentation

MySecureShell is a solution which has been made to bring more features to sftp/scp protocol given by OpenSSH. By default, OpenSSH brings a lot of liberty to connected users which imply to thrust in your users. The goal of MySecureShell is to offer the power and security of OpenSSH, with enhanced features (like ACL) to restrict connected users. MySecureShell was created because of the lack of file transfer features in OpenSSH. OpenSSH was not designed as a file transfer solution, that’s why we made MySecureShell. MySecureShell is not a patch for OpenSSH, it’s a shell for users.

How big data is unfair

An immediate observation is that a learning algorithm is designed to pick up statistical patterns in training data. If the training data reflect existing social biases against a minority, the algorithm is likely to incorporate these biases. This can lead to less advantageous decisions for members of these minority groups. Some might object that the classifier couldn’t possibly be biased if nothing in the feature space speaks of the protected attributed, e.g., race. This argument is invalid. After all, the whole appeal of machine learning is that we can infer absent attributes from those that are present. Race and gender, for example, are typically redundantly encoded in any sufficiently rich feature space whether they are explicitly present or not.

Your Smartphone Can Tell If You’re Bored

While using machine learning to infer your state of mind is tricky, doing so reliably via your smartphone could be powerful. For instance, if an app were able to predict that you’re bored, and also knew where you were, it could try to feed you content it thinks you’d like in that particular context. Already at least one startup is trying to do something similar to this: Triggerhood, which built software that lets apps collect data about how the phone is being used, determines when is the best time to send you a notification (see “Smarter Smartphone Alerts Come in When You Want Them”).

Learning to Trust in the Cloud

After the prominent security breaches in retail and the public sector over the last year, it’s clear that a strong security posture is a requirement, not an option, as no one wants to be the next headline. Reviews of these breaches show that they were the result of internal policy or system failures, not the result of any weakness of a cloud service.  ... Security is a shared responsibility with your cloud provider, and companies should consider implementing tools such as next-generation and application firewalls, intrusion detection and prevention, anti-virus software, encryption, identity and access management, visibility, log and big data analytics. This can help ensure internal security standards are as high as those set by cloud providers.

TGIF(P) – Thank god it’s fried phish

Spoiler: It commonly means “Thank god it’s Friday” and probably many working people will be able to appreciate such a feeling. On the other hand, while many offices may close down for the weekend, it’s the time for bad guys to boost their activity because they count on the fact that they may go unnoticed for some time, at least until the upcoming Monday morning. The IT community is working hard to find and take down malicious sites as soon as possible, but then … the weekend is the weekend for many. What happened just last Friday may be a good example of such malicious weekend activity. We received the following email to one of our inboxes:

The Problem with Corporate Innovation

Corporate innovation faces challenges that entrepreneurs can’t fathom. Entrepreneurs often wish they had the people and resources that larger organizations do, without realizing that all those people and resources are already spoken for. Larger organizations lack the freedom and agility that smaller organizations have. Larger organizations are very slow to recognize and respond to major seismic shifts, so comfortable in their day to day operating models. Industry conventions become first defensive barriers and then comfortable blankets, reassuring large organizations that they understand what the customer needs and what the industry will do. Corporate executives face a really difficult challenge: on one hand they must meet the quarterly numbers, or heads will roll.

Data Center Consolidation: a Manager’s Checklist

The reality in today’s very competitive data center and cloud market is the one who can run most optimally and cost-effectively while still delivering prime services is a leader in the market. To accomplish this goal, there are a few things to consider. First of all, getting ahead doesn’t always mean adding more gear. Smart data center and cloud providers learn to use what they have and make the absolute most out of every resource. There are new kinds of questions being asked when it comes to new data center efficiency concepts. Is there a new technology coming out that improves density? Does the ROI help improve long-term management costs? Does a new kind of platform allow me to achieve more while requiring less?

Beth Israel Launches Big Data Effort To Improve ICU Care

The way clinical care is documented can vary greatly; for example hypertension, high blood pressure and elevated blood pressure are three different terms that describe the same condition. “There has been a lot of data cleanup that needed to be done, and in the process, we’ve learned a lot about structured data, and quality of data,” says Folcarelli. She says it took at least a year to normalize the data and determine the data points that would work well in the model. Statisticians and analysts worked with clinicians and nurses during this process. The hospital’s IT team uses scripts that extract data from the transactional systems—the HIS, the clinical ICU systems, the HR systems—on a regular basis. The extracts are sent to the hospital’s clinical data warehouse, which is built with Microsoft SQL Server technologies.

Your Next Car Could Reveal More About You Than Your Facebook Profile

About 90 percent of new vehicles in western Europe will be able to send and receive data by 2020, compared with roughly one-third next year, Hitachi Ltd. estimates. Once hooked into the web, the car’s driving data could be coupled with information as detailed as a driver’s contact list, favorite routes to work and even financial information from mobile-payment systems. As cars get closer to driving themselves, their cameras and sensors will collect data about what happens in and around the vehicle and what passengers are doing. That prospect has created disputes about what data can be collected and who needs to agree to it. Rules in this area could hamper automakers from fully tapping their newfound gold mine.

Blythe Masters Tells Banks the Blockchain Changes Everything

In a matter of months, this word, blockchain, has gone viral on trading floors and in the executive suites of banks and brokerages on both sides of the Atlantic. You can’t attend a finance conference these days without hearing it mentioned on a panel or at a reception or even in the loo. ... Now, everyone’s trying to figure out whether the blockchain is just so much hype or if Masters’s firm and other startups are really going to change the systems that process trillions of dollars in securities trades. When investors buy and sell syndicated loans or derivatives or move money around the world, they must cope with opaque and clunky back-office processes that rely on negotiated contracts between buyers and sellers, lots of phone calls, lots of lawyers, and even the occasional fax. It still takes almost 20 days, on average, to settle syndicated loan trades.

Quote for the day:

"Everybody wants to do something to help, but nobody wants to be the first." -- Pearl Bailey