Daily Tech Digest - October 09, 2017

How devops changes monitoring
Devops is speeding up the entire application lifecycle, from development to QA to production. Relatively static production applications
are now being updated as frequently as multiple times a day. This leads to many challenges, some old and some new. Developers have had to adapt by writing more comprehensive automated tests for their code,
so that QA is as automated as possible. QA has become dependent on continuous integration, which automatically runs all of the unit and integration tests whenever new code is committed. Monitoring systems are now becoming more aware of every part of the devops toolchain. Before devops, new application updates would be carefully administered by highly skilled technicians.


How the Finance Industry Uses Cloud to Streamline Compliance

Regulatory requirements in the U.S., including the Payment Card Industry Data Security Standard (PCI DSS), the Gramm-Leach-Bliley Act (GLBA) and other data privacy laws, like Europe’s GDPR - will dramatically impact U.S. companies doing business in Europe. As a result, financial institutions not only need to protect data, but they need to be able to regularly report on the effectiveness their data protection measures.  Compliance is a major consideration of financial companies, with detrimental fines and customer loyalty on the line. According to a 2015 SANS Survey, 72 percent of respondents claimed maintaining compliance in the cloud as their biggest concern across all types of cloud deployment.  Nonetheless, the cloud has proven to be an optimal environment for facilitating compliance


Are You Ready For A Data Protection Regime?

Are you ready for a data protection regime? - IT Next
Creation of a data protection regime—is by far the most obvious and immediate fallout—something which the honorable judges have pointed out as well. Protected personal data is one of the most important means to protect an individual’s privacy. Ensuring it is becoming a tough challenge in this era of digital everything. “We are in an information age. With the growth and development of technology, more information is now easily available. The information explosion has manifold advantages but also some disadvantages. The access to information, which an individual may not want to give, needs the protection of privacy. The right to privacy is claimed qua the State and non-State actors. Recognition and enforcement of claims qua non-state actors may require legislative intervention by the State,” Justice Sanjay Kishan Kaul said in his judgment.


What you need to know about concurrency models

The advantage of multiprocess is that it is very stable. If a process dies, it doesn’t have to affect anything else. The disadvantages are that starting a new process is pretty expensive, and communicating between subprocesses is cumbersome. There are ways, but honestly there aren’t good ways to communicate between these processes. You have awful ideas like shared memory, operating-system-specific interprocess communication methods, and actual remote procedure calls (RPC). Frankly, having a server open up socket connection connections to itself is gross. No modern software should be written this way. There was a time that Linux and other platforms didn’t actually support native threads and had to fork off a subprocess for concurrency. So supporting multiple platforms meant you had to do these torturous things. But in the modern era, there are better ways.


Hitachi preparing AI for enterprise storage

istock-666855924.jpg
In storage, software intelligence will probably start with more mundane concerns such as capacity planning, what will break, and when it will break, Vantara senior vice president Iri Trashanski said. It falls under the categories of application performance management and infrastructure performance management, he emphasized. There is already an AI focus in the IoT division's Lumada software. "If you build it correctly it can be used across groups," Trashanski noted. ... "This is a pretty broad topic. AI can be applied to a number of areas in storage," Rogers said by email. "On the operational side, we are exploring automation root cause analysis and resolution tasks. Right now if storage breaks in the middle of the night then someone is woken up to [find the] root cause and resolve. We think that the system should be able to learn how to resolve these challenges on its own," he wrote.


CSO Interview: Must-have Skills for New-age Cyber Security Professionals

Explaining his viewpoints on combating such vector threats and his overall security strategy for the Bank of Sharjah, Mani informs that he is a firm believer of multi-layered security arrangements. "I prefer to architect the security eco-system of my organization to be a multi-layered defense in depth approach. This starts with a governance layer, then continues with physical & environmental security, network security, infrastructure security, systems security, application security, database security and operating system security. This is how I have architected the security strategy of my organization. To add more value to this Enterprise Security Architecture, I have layers of support provided by my internal audit and risk management teams who review the cyber security practices of my organization in periodic basis to give an assurance on the robustness of the cyber security practice."


Google's Clips Camera Offers A Snapshot Of Things To Come

google clips
Google Clips uses artificial intelligence (A.I.) to choose when to take pictures. To “use” the camera, you twist the lens to get it started, place it somewhere, then forget about it. It learns familiar faces, then favors those people (and pets!) when deciding when to take pictures. It looks for smiles and action, novel situations and other criteria. It discards blurry shots. Each time it takes pictures, it captures a burst of photos at 15 frames per second, which you can use or edit as a GIF or from which you can cherry-pick your favorite still photographs. The Clips has no microphone, and it cannot record sound. In short, the A.I. is designed to take great pictures and GIFs, but with the advantage of taking pictures where there’s no photographer around to change the actions of the photographed.


CIOs, IT workers don’t always see eye-to-eye on priorities, challenges

DelPrete said when it comes to the cyber threat, respondents were most concerned about aging or old systems, followed by human error, malware and phishing attacks. “As we talked to the CIOs and asked them what they are doing about this, I think a renewed emphasis, and it seemed like some improved results, as it relates to cybersecurity awareness training,” he said. “Many felt that the agency was a little bit more effective in identifying and mitigating cyber risk today than they were a year ago, largely as a result around the dialogue they have and the training.” The survey showed simple changes like requiring employees to answer cybersecurity awareness questions before they can log on to their computer, or creating mock phishing campaigns to help employees recognize potential threats.


What is Kaspersky's role in NSA data theft?


What's more likely is that the Kaspersky product detected one of the NSA's hacking tools, taken out of the safe confines of the agency's offices, and was flagged by the software. "Experts said the software, in searching for malicious code, may have found samples of it in the data the contractor removed from the NSA," said the report. It's not surprising that Kaspersky would recognize either known malware or hacking tools, or malware-type behavior. The company, like others, already has a wealth of antivirus signatures of leaked NSA hacking tools at its disposal, including infamous malware strains like Stuxnet -- which researchers believe was developed by the NSA. Hacking tools used by the so-called Equation Group, thought to be a hacking unit within the NSA, were publicly exposed by a hacking group


Put Humans at the Center of AI

We need to be much more human-centered. If you look at where we are in AI, I would say it’s the great triumph of pattern recognition. It is very task-focused, it lacks contextual awareness, and it lacks the kind of flexible learning that humans have. We also want to make technology that makes humans’ lives better, our world safer, our lives more productive and better. All this requires a layer of human-level communication and collaboration. ... What makes humans unique is that evolution gave us the most incredible and sophisticated vision system, motor system, and language system, and they all work together. Visual Genome is exactly the kind of project that’s pushing the boundaries of language understanding and visual understanding. And eventually we’re going to connect with the world of robotics as well.



Quote for the day:


"Doing easily what others find difficult is talent; doing what is impossible for talent is genius." -- Henri-Frederic A.