February 17, 2016

Data Security – The Trends We Do Not See Coming

It is all about providing Security as a Service (SECaaS), which is essentially an outsourcing model for security management. The irony lies within the fact that SECaaS will use the cloud as a mainstream deployment platform, when part of its own reason of existence is to enhance the protection of…the cloud! SECaaS has evolved from delivery of a security software (such as an anti-virus) on a Software as a Service (SaaS) model to security management provided in-house by an external organization. Generally, large security service providers integrate their products into a corporate infrastructure on a subscription basis, making security more cost effective to large corporations.


Pros and cons of Windows 10 IoT for Raspberry Pi and Arduino builds

Windows 10 isn't open source, and that's not entirely in-line with Dexter Industries' mission of teaching robotics with open source technology. However, because of the popularity of Windows, and the fact that Microsoft has made Windows 10 on Raspberry Pi free for individuals, we were excited to see if we could bring the GoPiGo to even more developers in the world. Hopefully by growing the open source software around the Raspberry Pi and around the Windows environment, we're making robotics more accessible for everyone ... there are a couple of advantages to the new Windows Operating System on the Raspberry Pi. The first is that great interfaces are really possible. Steve took the lead on putting together a really nice looking interface for the GoPiGo example.


Half of UK businesses looking for internet of things lead roles

The report said 68% of UK business leaders expected to reap tangible benefits from their IoT investments this year, and one in five were already seeing the benefits. Overall, 94% of businesses claimed to be making preparations for the IoT  ... Commenting on the report’s findings, Maria Hernandez, IoT lead at Cisco UK, said: “The first internet wave was about making information digital, then we moved into making processes digital, particularly with e-commerce. The third wave was about making interactions digital with cloud, mobility social media and video. “Now the fourth is about making everything digital – organisations, cities and even countries. We believe that this wave is going to make more impact than the previous three waves together,” she said.


Tobii eyeX review: The 'eye mouse' is magical, but just not for everyone

Tobii claims that you should buy the eyeX for two reasons: as a general input device for your computer, and as a gaming peripheral. We tried both. A third selling point—to add Windows Hello capabilities to your computer—was added as we began testing, and we can confirm that feature also works. You might think of the eyeX as an “eye mouse,” but there’s more to it than just that. Once calibrated, the eyeX allows you to assign a keyboard key as a mouse button, so that you can look at a spot on the screen, click the key, and—zip!— your cursor teleports there. (You can tell the eyeX to automatically “click” that spot as well, if you want.) You can also “clone” your mouse, warping it back and forth between two points—useful if you're jumping back and forth between two pages of text, perhaps.


Can IBM bring Bitcoin's blockchain technology to mainstream business?

"It is one more indicator that blockchain fever has struck in full force across a wide swath of the banking and financial services industry, but also now expanding the scope to other verticals," Valdes said. The next question becomes what can IBM do for blockchain that hasn't already been done. So far, many of the blockchain initiatives have been vertically focused, but Valdes said that he thinks what IBM and the Hyperledger Project are doing is trying to expand interest in the technology, creating a "horizontal fabric rather than a vertical technology." In terms of the different pieces of the announcement, the Hyperledger Project is the core value. Cuomo said that an open standards approach was critical to wide adoption of blockchain.


These IaaS examples show data centers can share the load

Most IT organizations are a mix of traditional IT and emerging digital business applications. System and application characteristics and requirements differ in this bimodal IT state, where some apps need conservative changes and others benefit from agile, fast fail processes. This second group usually includes multidisciplinary teams and is more apt to rely on cloud services such as IaaS than the first group. Whether or not you agree with the concept of bimodal IT, borrow concepts from mobile app startups by using Agile development methodologies, multidisciplinary specialists and rapid release and update cycles for new applications. Due to the ease and low cost of deployment, along with the ability to rapidly add IaaS capacity and services, new projects should start and likely remain in a public cloud.


The Internet Of Medicine Is Just What The Doctor Ordered

Innovations like these are of vital importance to another segment of healthcare — the $1 trillion-a-year pharmaceutical industry. The reason is simple: The sooner doctors can detect illness, the sooner patients can start taking the drugs they need to manage or cure their conditions. New devices are in the works that will transform the treatment of many chronic ailments that comprise a large portion of recurring revenue for drug companies. For example, Swedish drug maker Novartis is working with Google on a contact lens for diabetics that can measure blood sugar from tears. It’s a significant advancement over the uncomfortable finger pricks millions of diabetics must currently endure several times a day. The lenses will also provide continuous data about blood sugar fluctuations, knowledge that’s essential in helping diabetics avoid life-threatening complications.


Transforming Cyber and Infrastructure Security: An Interview with the DHS Cyber Chief

Cyberthreats are way-of-life threats. They can cause destruction, whether actively in attacks on the electronics that control critical infrastructure such as water and energy or passively in stealing and harvesting legitimate user credentials to use maliciously later while going virtually undetected from a flawless login. Remember this: Almost everything in our world that you can’t eat is either connected or being connected to electronic logic a.k.a. a “computer.” That means it can be controlled from somewhere else, by someone else. That control needs to be protected, and we are currently designing and innovating great new technologies faster than we can secure them. NPPD recently led an awareness campaign about malware known as “Black Energy.”


The future is modular: IoT, Microservices and music gear

Beyond the consumer sphere, it seems modularity will also be an important concept in the future of enterprise IT and software development. This is not just because much of IoT will actually exist in the “Industrial Internet” but also because of the role Microservices will play in how enterprise architectures and applications are built. Matt McLarty, Enterprise Architect & Vice President of the API Academy at CA Technologies, flagged up the importance of modularity in Microservices in a recent API Academy blog post. Modularity could also prove to be an increasingly important concept for business managers taking digital products to market. Think of the enthusiasm leading Silicon Valley figures have for “unbundling” functionality from monolithic products and services.


As phone phishing grows, can bank biometrics screen out the scammers?

Nuance Communications provides biometric authentication technology to Barclays and the ATO. Beranek adds that the industry most recently took steps to fight credit-card fraud within digital channels, but many institutions are now revisiting security on the phone channels at their contact centers. In general, consumers have less technological protection when banking by phone than by app. To access their accounts over the phone, customers most commonly answer a series of verification questions with an agent at the bank's contact center. Criminals are likely to pass this security step by gathering the correct answers through phishing emails, social media, or calling the customer directly in a telephone scam.



Quote for the day:


"If anything is worth trying at all, it's worth trying at least 10 times." -- Art Linkletter,