January 20, 2016

Semantic Data Technology and Innovations in Client Lifecycle Management

Ontologies can be used to support the KYC/AML in the following areas: a) Ontology based information extraction – used to extract relevant information from unstructured documents (for example monitoring a website to detect people who are involved in money laundering) b) Ontology based information discovery through inference – Detect money laundering schemes or establish connections of people with organizations that are on criminal watch lists c) Ontology based compliance rule verification d) Seamless integration of external and internal data – for example, data integration between internal watch lists between businesses.

Internet of Things in 2016: 6 Stats Everyone Should Know

The Internet of Things, which connects cars, homes, wearables, and everyday objects to the cloud, is a hot tech topic these days. Chipmakers such as Qualcomm andIntel are expanding into the space to diversify away from their core chip businesses. Smartphone makers such as Samsung and Apple  are entering the wearables and smart home markets to expand their mobile ecosystems. Yet according to Accenture, around 87% of mainstream consumers still don't understand what the IoT market is. Therefore, let's take a moment and review six key statistics that everyone should know about the Internet of Things.

JavaScript’s Creator Is Building A Browser For The Ad-Blocked Future

“At Brave, we’re building a solution designed to avert war and give users the fair deal they deserve for coming to the Web to browse and contribute,” Eich wrote. And an interview, he told me, “We’re doing something bigger than an ad blocker.” At a basic level, Brave is, yes, a browser that blocks ads, as well as a variety of data collection technologies, such as analytics scripts and impression-tracking pixels — as Eich put it, “We clear the whole swimming pool of algae.” But there are some important nuances here. For one thing, Eich said Brave won’t block all ads, because native, trackerless ads that only use the publisher’s own data will appear to the browser as normal content, and won’t be blocked.

8 Cheat Sheet Sites To Ace Tech Job Interviews

"You should do anything you can that's legal to prepare for an interview. That includes looking at these sites, talking to people you know who work at the company or used to work there and talking to recruiters who help the company find people," said Jon Holman, founder of the executive recruiting firm The Holman Group. ... Holman stressed, "You especially don't want to assume that the statements on the blog are true or current. Companies aren't stupid. If they know that a blogger has posted their "standard" questions ... (the) questions will get changed. And if you're flummoxed in the interview because you didn't think more broadly than the list of questions on the blog, well, you don't deserve the job."

DevOps: Tear Down the Wall!

“You build it, you run it” is one of the key principles of DevOps. The premise is based on the reluctance of a developer to pass defects downstream if there is a chance they’ll get paged later that night to fix a self-induced production incident. As developers embrace codifying resilient operational considerations into their delivery pipeline, they’ll begin to appreciate the heavy-lifting required to ensure their environments are well-managed and secure. ... Just as Development is inclusive of a myriad of interconnected disciplines and functions, Operations is also an overloaded term. The subtle complexities of infrastructure, network, and security need to be considered carefully before you remove “The Last Few Bricks”.

How to manage integrated testing for CI, CD and DevOps

With time, the need for getting quickly to the market has enforced test automation to be included in the early stages of a development process. More and more organisations are realising the importance of writing test code or scripts similar to that of writing development codes. ... An Integrated Test Management framework equipped with multi-tool integration capabilities can support continuous integration, automated triggering of build, automated testing and results reporting, ensuring continuous delivery, and rapid deployment practices - the roadmap to achieve DevOps.

Democratizing Big Data value

“Almost every company nowadays is growing so rapidly with the type of data they have,” adds Saso. “It doesn’t matter if you’re an architecture firm, a marketing company, or a large enterprise getting information from all your smaller remote sites—everyone is compiling data to [generate] better business decisions or create a system that makes their products run faster.” There are now many options available to people just starting out with using larger data set analytics. Online providers, for example, can scale up a database in a matter of minutes. “It’s much more approachable,” says Saso. “There are many different flavors and formats to start with, and people are realizing that.”

Getting Ready for IoT’s Big Data Challenges with Couchbase Mobile

Couchbase Mobile handles security in 5 areas: For User Authentication we support pluggable authentication. Out of the box we have support for popular public login providers like Facebook or you can write your own custom provider; For Data Read/Write Access there are fine-grained policy tools that allow controlling data access for individual users and roles; Data Transport on the Wire, for data in motion, is over TLS; Data Storage on Device, for data at rest on device, uses the device’s built in File System Encryption and additionally data-level encryption; and Data Storage in the Cloud, for data at rest in the cloud, you can configure Couchbase Server to use File System Encryption.

Analytics Investments Often Depend on How the CIO Views Their Legacy

What was interesting was that we discovered as we delved deeper into the data that there are three very distinct patterns of how CIOs deliver value to their organization. The patterns were “trusted operator”, “change instigator” and “business co-creator”. There is no right or wrong pattern. It is just dependent on the need of the business at that time. Cloud was a really big one for trusted operators. They viewed that as a way for them to think about and engage with internal business stakeholders and drive either some of the cost efficiencies or reliability, or whatever security issues were important to them. Cloud was important, but not as important or digital or analytics or business intelligence. But cloud seemed to be resonating really well with the trusted operators.

The trouble with being SMART

Respect for expertise, not centralized authority, coordinates open source communities that create great technologies. Innovative companies give employees off-the-clock time and free resources, and benefit from their tinkering. Such environments thrive due to decentralized action. SMART goals cannot add to, and inevitably subtract from, these structures. Second, companies no longer compete individually but as members of networks: Apple couldn’t create the iPhone, or Airbus the A350 aircraft, without collaborating with outsiders. Complexity, uncertainty, and ambiguity are unavoidably present therein since network members are geographically dispersed, and have varying strategies, processes and cultures. These enable problems and opportunities to regularly propagate with blinding speed.

Quote for the day:

"Talent hits a target no one else can hit; Genius hits a target no one else can see." -- Arthur Schopenhauer