Daily Tech Digest - February 21, 2017

Why Google And Apple Will Rule Mixed Reality

Computer-generated objects appear to attach or interact with real-world objects. This can range from simple applications, such as the Sphero BB8 toy robot smartphone app, to complex systems, including Hololens, Magic Leap and others. The most thrilling mixed reality experience involves real-time, 3D mapping of the environment, which enables virtual objects to interact with surfaces and objects in the real world. For example, a computer-generated creature that can stand on a table -- or hide behind it. Here's the challenge: 3D-mapping capability is compute-intensive, meaning it is expensive, power-hungry and heat-generating. So is the real-time rendering of 3D objects. With the richest mixed-reality experience, you need both 3D mapping and image rendering. As a result, products like Hololens and Magic Leap require heavy, bulky headsets and cost a lot of money.

People Don’t Buy IoT, They Buy a Solution to a Problem

Everywhere we turn there seems to be a new “connected this” or “smart that”. Many applications are novel, but not very useful. I can think of many silly examples, and I’m sure you can too. So here’s my point: The fact that we can connect any device to the Internet doesn’t mean we should. And if we’re not careful, we can fall into the trap of having technology looking for a problem, instead of starting with a problem and looking for the best way to solve it. This is Product Management 101. It’s a shame the useless products get most of the airtime, because there are many applications today that are solving important problems—in healthcare, manufacturing, transportation, energy, and more. So this is a call to action for all you IoT Product Managers: Leverage IoT only if it provides more value to your customer or your company.

Emotional Intelligence Has 12 Elements. Which Do You Need to Work On?

There are many models of emotional intelligence, each with its own set of abilities; they are often lumped together as “EQ” in the popular vernacular. We prefer “EI,” which we define as comprising four domains: self-awareness, self-management, social awareness, and relationship management. Nested within each domain are twelve EI competencies, learned and learnable capabilities that allow outstanding performance at work or as a leader (see the image below). These include areas in which Esther is clearly strong: empathy, positive outlook, and self-control. But they also include crucial abilities such as achievement, influence, conflict management, teamwork and inspirational leadership. These skills require just as much engagement with emotions as the first set, and should be just as much a part of any aspiring leader’s development priorities.

Big data privacy is a bigger issue than you think

Don't feel so compelled by transparency that you give away your strategic secrets. After all, you are in business—a very competitive business. If you give away too much information, your competitive value is eroded. You must find a way to be transparent, while keeping the secret sauce behind the firewall. Here's how. Your IT leadership team should launch proactive communication campaigns, which could include PR, speaking, social media, and outreach programs—the more the better. Explain more about what you can do than how you do it. At a minimum, it's your responsibility to let people know what you know about them and what you're capable of doing with your analytics. For instance, if location analytics allows to you know where they are and where they're likely to go next, then let users know you have this technology.

ESET looks to deepen enterprise penetration with new threat intelligence service

The ESET data feeds are typically integrated into existing SIEM [Security Information and Event Management] systems, which allow reports from multiple sources to be reviewed at once in real time. “Integrating this with a SIEM means the customer can quickly see it and address issues,” Reed stated. “Their security teams are provided with actionable information.” This use case does require that the customer is large enough to have a security team monitoring the data and making decisions. However, because ESET Threat Intelligence does not need to be deployed in a network infrastructure in order to run, ESET expects that another use case of the service will be prospects testing the efficiency of ESET if they are considering replacing their legacy endpoint security vendor.

Virtual Singapore Looks Just Like Singapore IRL—But With More Data

This technology is the latest and most sophisticated attempt to create an all-seeing “urban dashboard.” Rio’s operations center, complete with banks of screens that resemble NASA Mission Control, tracks transit, weather, utilities, and more. Los Angeles’s Bureau of Engineering has Navigate LA, which includes GIS maps overlaid with more than 20 layers of data, from property data to geotechnical information. Technology companies like IBM (which powers the Rio effort), Siemens, and Cisco—provide “Smart City” data-tracking software for several other metropolises. But none are as holistic, intuitive, or three dimensional as this. “It really opens up a window onto how all these systems impact each other,” Rocker says.

Blockchain and the "Internet of Value"

During a speech at the Stanford Graduate School of Business the co-founder and ex-CEO of Ripple Labs - Chris Larsen very well puts forward the idea of "Internet of Value" - a network of networks for moving value. Larsen says, “Just as you can’t have fire without fuel, oxygen, and heat, you can’t have effective globalization without interoperability in goods, data, and money. They all have to work together.” As we have the internet to move data, or the global logistics network to move goods, IoV will be a dedicated global network to move value (money and other digital assets) in a safe, efficient and inexpensive manner. To understand this more closely let us take the example of payments. The existing process of international wire transfer requires co-ordination and series of resource-intensive steps between participating banks, clearing houses, and the central banks.

Advanced analytics, Big Data to Blockchain driving disruption in banking sector; here’s how

Blockchain, or the distributed ledger in general, has been touted as one of the biggest disruptive technologies of recent times. While 20% of bankers feel that the event is one to two years away, another 40% think it could take twice as long. In any case, banks have got busy developing a range of use cases, especially in the areas of payments and remittances, trade and supply chain finance, digital identity management, smart contracts, document security, loan syndication and treasury management. Although it has slid from its top spot in the list of disruptive technologies, mobility, along with wearables, is still a force to reckon with. ... The smartphone’s native capabilities—camera, mobile apps, and touch screen—make it extremely suitable for biometric authentication, and customers are more than happy to adopt.

The many faces of grep

The grep command – likely one of the first ten commands that every Unix user comes to know and love – is not just a nice tool for finding a word or phrase in a file or command output. It can take on some vastly different personalities that allow you to more cleverly find the data that you are looking for and has more flexibility than many of its users have discovered. Historically provided as separate binaries, the different “flavors” of grep are now provided through a number of key command options that change how grep interprets the pattern that you provide for your search. To easily switch from one mode of searching to another, the different grep commands could be set up as aliases such as these:

Mitigating the Increasing Risks of an Insecure Internet of Things

Improving the resilience of the Internet and cyberphysical infrastructure in the face of insecure IoT devices will require a combination of technical and regulatory mechanisms. Engineers and regulators will need to work together to improve security and privacy of the Internet of Things. Engineers must continue to advance the state of the art in technologies ranging from lightweight encryption to statistical network anomaly detection to help reduce risk; similarly, engineers must design the network to improve resilience in the face of the increased risk of attack. On the other hand, realizing these advances in deployment will require the appropriate alignment of incentives, so that the parties that introduce risks are more aligned with those who bear the costs of the resulting attacks.

Quote for the day:

"The best strategy can do is shorten ur odds of success. If u are certain about ur strategy, u are dangerously delusional.” -- @RogerLMartin