March 14, 2016

A Bulletproof DevOps Strategy to Ensure Success in the Cloud

First, you need to understand the solution patterns of the applications you’re looking to build. For instance, will there be data-intensive or processor-intensive applications, or a mix? Will the applications require any special hardware or software requirements, such as HPC or IPC middleware? Finally, consider security, performance, monitoring, governance — basically all of the core details that make up your requirements shopping list. Keep in mind that you’re not looking to solve the problem of a single application, but selecting a core cloud architecture that can accommodate most of the applications that will be built, tested, and deployed using your DevOps automation solution. Also, keep in mind that it’s okay to use multiple target clouds for deployment.

How InteraXon plans to monetize meditation–and more

The company’s headband is essentially a meditation coach. Muse works like an electroencephalogram (EEG), measuring the user’s brainwave activity and transmitting the data to an app. When your mind is at rest, the app plays audio of calm winds. When your mind begins to wander, the winds intensify to prompt you to refocus. At the end of a session, the Muse app tells you how well you performed and displays a graph of your brain’s activity. It’s a high-tech approach to an ancient practice, one that’s becoming more popular among busy professionals who recognize the benefits of meditation but don’t have time to attend a class

The top 12 cloud security threats

Many developers make the mistake of embedding credentials and cryptographic keys in source code and leaving them in public-facing repositories such as GitHub. Keys need to be appropriately protected, and a well-secured public key infrastructure is necessary, the CSA said. They also need to be rotated periodically to make it harder for attackers to use keys they’ve obtained without authorization. Organizations planning to federate identity with a cloud provider need to understand the security measures the provider uses to protect the identity platform. Centralizing identity into a single repository has its risks. Organizations need to weigh the trade-off of the convenience of centralizing identity against the risk of having that repository become an extremely high-value target for attackers.

Surprising tips from a super-hacker

Mitnick hacks as a kind of performance art in keynotes and talks at security conferences around the world. At CeBIT in Germany this year, for example, he performed several hacks including a demonstration showing how simply plugging in a thumb drive could give a hacker total control of your machine, including the ability to activate and monitor the camera and microphone or launch any program. In the hack, the USB thumbdrive tricks the laptop or PC into thinking it's a keyboard, rather than a storage device. That enables the hacker to inject keystrokes, which means he can do anything to your device that he could do by typing on your keyboard. Mitnick demonstrates this hack because "people think USBs are safe now, because they turn off 'auto-run.'" He wants the public to know that thumbdrives are not safe.

How to Reach a Competitive Advantage Through Huawei Open Source Solutions

Standards bodies continue to produce solid architectures and protocols. But they are slow and resist change. Traditional SDOs will remain relevant but must evolve. The MEF is a perfect example of doing it right. The MEF created a collaboration program, involving key industry standards development bodies, called MEF Unite. Instead of digging in its heels and resisting change, the MEF has put off its ego and begun collaborating with ... As providers (working with their vendors) customize the code, to make it unique to each company, they have created a competitive advantage. Vendors that offer customizable, and supported, solutions will succeed. Red Hat has proven the success of this model. Vendors and providers that quickly adapt to the open source world and learn to differentiate will have a future. Those that don’t will fail.

CIO and the Digital Dilemma

Gartner predicts that by 2018, controlled shadow IT will contribute up to 30 percent of IT operations activities, up from 15 percent in 2014. CIOs are recognizing that by investing and championing the introduction of new, digital services that are capable of accelerating growth while not undermining the effectiveness of pre-existing systems, IT will shift from being seen as strictly a cost center to becoming revered as the business’ competitive weapon. Thus a digital transformation is set to motion. With the likes of AirBNB, Amazon and Uber (to name a few), digital technologies are fueling economic growth at an exponential rate by establishing strong market positions and opening up new business models on which to capitalize. But that’s only the beginning.

Data Security Trends: Shifting perceptions on data security

Although the C-suite might be more involved in data security than in the past, IT teams feel executives still are not allocating the energy or resources needed to properly address data security challenges. ... there are concerns that senior executives don’t pay enough attention and aren’t well informed about data security issues and tools. The findings also show that 3 in 4 decision makers say their C-suite plans to increase current security measures, and more than half expect to spend more money on data security in the coming years. However, cost is a concern when it comes to building on existing security programs – 53 percent cite cost constraints for why they don’t anticipate adding additional security features in the future, and only 1 in 3 businesses are very confident in their C-suite’s ability to budget enough for data security solutions over the next five years.

4 best practices for implementing external business processes

For CIOs and IT managers, working out external business processes like EDI and collaborating on business process projects with hundreds of different business partners can be a daunting and frustrating undertaking. "We're in the process of assessing our external business process growth projections for the next three years," remarked one mid-sized company CIO. He was unsure as to which external business processes would be tackled first, but he made these points: He was concerned about the readiness of his staff to team with end business users and users from other companies for effective business process design or redesign to enable the externalization of business processes that were formerly internal. He was also worried about whether security and governance measures were sufficiently robust to support external information exchanges with other companies.

How to stay ahead of cyber criminals in the data breach era

A typical example of an irrelevant information scenario is the “former employee” situation. In this case, an attacker chooses to target a specific user from your list of employees, not knowing that the person no longer works for your organization. Because the employee no longer works for you, that employee should not be taking actions within the company’s network and the network shouldn’t be contacting them. Spotting this suspicious activity can help you prevent data breaches. Global law firm, Locke Lorde, was able to mitigate a cyber attack after catching a former employee using his credentials to access their network. The closer you track the use of irrelevant information, the quicker you can stop data breaches in their tracks.

Will AI Surpass Human Intelligence?

Since depth implies computational power and efficiency, we have focused on very deep neural nets from the start. For example, by the early 1990s, others were still limited to rather shallow nets with fewer than 10 subsequent computational stages, while our methods already enabled over 1,000 such stages. I'd say we were the ones who made neural nets really deep, especially recurrent networks, the deepest and most powerful nets of them all. Back then, few researchers were interested in this, but we kept going, and with cheaper and cheaper computing power, it was just a matter of time before contests would be won through such methods. I am glad to see that the other deep learning labs and companies are now also heavily using our algorithms.

Quote for the day:

"To be successful, innovation is not just about value creation, but value capture." -- @jaysamit