Daily Tech Digest - January 15, 2018

Blockchain Company Wants to Create Alternative Decentralized Digital Economy

Blockchain Company Wants to Create Alternative Decentralized Digital Economy
One recently proposed solution to this is Pocketinns, which aims to disrupt this space by acting as a collection of marketplaces. Nearly anything you can think of would be available on the platform – its goal is to turn all the current monopolies on their heads by providing a safer, secure alternative platform by offering the same quality promised by these giant corporations.The company already has a home sharing and vacation rental marketplace active and live in Europe with 50,000 properties and is looking at adding another 250,000 properties in the next few months and all of this happens at zero percent commission. Pocketinns looks to follow the monthly subscription model by offering multiple services on one single platform.In addition, the future vision includes building an internal financial network used to support the internal transactions which include payment processors, remittances, banking, etc.


20 years on, open source hasn’t changed the world as promised
This chicken-and-egg conundrum is starting to resolve itself, thanks to the forward-looking efforts of Google, Facebook, Amazon, and other web giants that are demonstrating the value of open-sourcing code. Although it’s unlikely that a State Farm or Chevron will ever participate in the same way as a Microsoft, we are starting to see companies like Bloomberg and Capital One get involved in open source in ways they never would have considered back when the term “open source” was coined in 1997, much less in 2007. It’s a start. Let’s also not forget that although we have seen companies use more open source code over the past 20 years, the biggest win for open source since its inception is how it has changed the narrative of how innovation happens in software. We’re starting to believe, and for good reason, that the best, most innovative software is open source.


Why you’ll fire Siri and do the job yourself

ObEN’s PAI approach is one answer to the question of how virtual assistants with agency might function. We’ve assumed for years that virtual assistants will do more than just answer our questions, which is mostly what they do today. Future virtual assistants should buy things, negotiate fees, automatically remind co-workers of their deadlines and more. Consider Amy, the x.ai virtual assistant. Amy is A.I. that interacts via email and schedules meetings. Amy has a personality and can make decisions in an email conversation, such as the meeting participants and the Amy virtual assistant negotiating available times for meetings. Amy is a virtual person, and many people who encounter Amy assume they’re interacting with a real human. If our virtual assistants are to be “personalities” like Amy, they could also be virtual representations of ourselves. This approach is actually more transparent than the A.I. that’s currently used.


Safeguarding your biggest cybersecurity target: Executives

Safeguarding your biggest cybersecurity risk: Executives
“Executives need to internalize that they are targets,” says Bill Thirsk, vice president of IT and CIO at Marist College. “Cyber attackers take time to watch, plan, practice, hone, and harden their art before going after a high-value target. Attackers have the luxury of stealth, time, duplicity, and multiple platforms for designated random attacks — all of which work against normal human behavior, curiosity, and the need for connectedness.” An executive’s “digital footprint” needs to be understood and gaps must be closed as a matter of practice, Thirsk says. Social accounts should be registered, confirmed, and monitored, he says. But getting executives to buy into protection is a challenge. “Every statistic I’ve seen shows that executives are the least likely to adhere to policies that they expect everyone else to follow,” says Paul Boulanger, vice president and chief security consultant at SoCal Privacy Consultants. “In part, this is because they are the people most willing to sacrifice security for convenience.”


IT service management effectiveness hampered by lack of metrics


According to the study, the increasing demand placed on IT operations is resulting in teams taking on more work than they can handle. Axelos found that this could be having a negative effect on their reputation. “Despite struggling to keep up with demand and working beyond realistic expectations, they are still perceived as delivering poor performance,” the report stated. IT operations and development teams said they wanted to eliminate inefficient practices. The study found that 55% of ITSM professionals who took part in the survey showed an interest in identifying and eliminating wasteful work through the use of continuous service improvement, DevOps and agile practices. Axelos found that larger organisations tend to recognise lack of visibility as a problem, while smaller organisations struggle more with inefficient processes and understanding customer needs.


AI Begins to Infiltrate the Enterprise

Image: Shutterstock
The data that feeds AI systems can also present obstacles. "The gathering and curation of data is a key challenge," said Patience. "We see that over and over again, where either organizations don't have enough data, or they have it and can't get access to it.” Then there are the problems with the technology itself. While AI research has advanced incredibly quickly in recent years, we still don't have a general artificial intelligence that truly thinks and learns the way humans do. As a result, human interactions with AI are sometimes less than satisfactory. "The 'klutziness,' if you will, of a computer itself is a serious challenge," Hadley said, adding, "The opportunities for mistakes and disasters from the point of view of the customer experience are much more likely." That leads to a bigger issue: trust. "The overarching issue in the whole development of the field is do people trust the results that they get out of a machine?" Reynolds said.


Spectre and Meltdown explained: What they are, how they work, what's at risk

thinkstock 500773792 cpu processor
The problem arises because the protected data is stored in CPU cache even if the process never receives permission to access it. And because CPU cache memory can be accessed more quickly than regular memory, the process can attempt to access certain memory locations to find out if the data there has been cached — it still won't be able to access the data, but if the data has been cached, its attempt to read it will be rejected much more quickly than it otherwise would. Think of it as knocking on a box to see if it's hollow. Because of the way computer memory works, just knowing the addresses where data is stored can help you deduce what the data is. ... Spectre and Meltdown both open up possibilities for dangerous attacks. For instance, JavaScript code on a website could use Spectre to trick a web browser into revealing user and password information. Attackers could exploit Meltdown to view data owned by other users and even other virtual servers hosted on the same hardware, which is potentially disastrous for cloud computing hosts.


Don't Use a Blockchain Unless You Really Need One

Most CoinDesk readers are probably familiar with the usefulness of decentralization in a monetary context (and if you're not, take a look at recent articles about cryptocurrency adoption in Iran, Venezuela, Russia and, ahem, the alt-right). The neutrality, censorship-resistance and openness of a permissionless network mean it will attract the odious along with the oppressed, and the software doesn't decide which is which. But why is decentralization worthwhile in the data use case? "Today, every piece of content and media you have is living somewhere owned by somebody," Ravikant explained. ... Then the conversation took a turn that I have to admit made me roll my eyes at first. "If someone creates a new Pokemon card game or a Magic the Gathering card game" online, he continued, the characters are "living and owned by a certain company in a certain format. You can't just go and reuse those assets."


IOT Security Needs A White Knight

wireless network - internet of things [iot]
A lack of quality control and the presence of a host of very old devices on IoT networks might be the most critical security threats, however. Decades-old hardware, which may not have been designed to be connected to the Internet in the first place, let alone stand up to modern-day security threats, creates a serious issue. “You have over 10 billion IoT devices out there already … and a lot of these devices were created in 1992,” noted Sarangan. Moreover, the huge number of companies making IoT-enabled hardware makes for a potentially serious problem where quality control is concerned. Big companies like Amazon and Microsoft and Google make headlines for their smart home gizmos, but the world of IoT is a lot broader than that. China, in particular, is a major source of lower-end IoT devices – speakers, trackers, refrigerators, bike locks and so on – and it’s not just the Huaweis and Xiaomis of the world providing the hardware.


Forget the CES hype, IoT is all about industry

Forget the CES hype, IoT is all about industry
In addition to all the new product previews, this year’s CES is full of summits, seminars, presentations and other sessions devoted to helping consumer products companies make, sell, deploy and monetize everything from smart cars and smart homes to smart cities. But I’m here to tell you that none of that really matters much to the future of the Internet of Things (IoT). Nope, despite the CES hype, the IoT is really all about industrial and business devices, networks and applications. Here’s the thing: The consumer side of IoT is consumed by the faddish and spectacular, not the everyday and useful. Just consider the kind of IoT products that have been featured at CES in previous years: There was the infamous smart toothbrush (expect more of those this year, too), not to mention smart hairbrushes and refrigerators. Not exactly must-haves for most people.



Quote for the day:


"An approximate answer to the right problem is worth a good deal more than an exact answer to an approximate problem." -- John Tukey


Daily Tech Digest - January 14, 2018

Strategy and Innovation Roadmapping Tools

EIRMA Roadmapping ViewThe ways of doing roadmapping have existed for some time, but supporting software has not. Motorola is credited with the development of roadmapping in the 1970s to support integrated product and technology strategic planning. Unfortunately, many have struggled with drawing, and coloring boxes and connecting lines in different tools for over 20 years. This doesn’t have to be the case today. ... Added analytical capabilities in this group of strategy and innovation roadmapping tools may cover techniques such as scenario planning , Delphi, Blue Ocean and more . Such analysis may be disconnected from in-flight efforts; but, such analysis may also allow for future plans to be considered in light of current state results. Analysis techniques for the Marketplace are also integral to creating and delivering strategy and innovation in many organisations. The marketplace we’ve profiled in our Market Guide for Strategy and Innovation Roadmapping Tools supports many of these techniques


NASA Awarded A Grant For Ethereum Blockchain-Related Research

Among the goals of the program are measures to protect NASA vehicles from collisions with space junk orbiting the earth, which can damage or completely incapacitate them, and the processing of highly complex data. At the helm of the research project is Dr. Jin Wei (sometimes credited as Jin Kocsis or Jin Wei Kocsis), an assistant professor with the University of Akron's Department of Electrical and Computer Engineering.  A write-up published by the Collier Report of US Government Spending, which shares a significant amount of language with a project summary ostensibly penned by Wei, describes plans to develop a "data-driven resilient and cognitive networking management architecture." Wei's team will also conduct research into decentralized computing mechanisms that could prove instrumental in processing "the massive amount of high-dimensional data" often collected by NASA spacecraft.



By 2020 83% Of Enterprise Workloads Will Be In The Cloud

By 2020 83% Of Enterprise Workloads Will Be In The Cloud
Digitally transforming enterprises (63%) is the leading factor driving greater public cloud computing engagement or adoption today. 66% of IT professionals say security is their most significant concern in adopting an enterprise cloud computing strategy. 50% of IT professionals believe artificial intelligence and machine learning are playing a role in cloud computing adoption today, growing to 67% by 2020. Artificial Intelligence (AI) and Machine Learning will be the leading catalyst driving greater cloud computing adoption by 2020. These insights and findings are from LogicMonitor’s Cloud Vision 2020: The Future of the Cloud Study. The survey is based on interviews with approximately 300 influencers LogicMonitor interviewed in November 2017. Respondents include Amazon Web Services AWS re:Invent 2017 attendees, industry analysts, media, consultants and vendor strategists. The study’s primary goal is to explore the landscape for cloud services in 2020.


Blockchain: can the law keep up?

The legal implications of a disruptive technology such as blockchain vary as the technology is applied to different sectors and applications. Some of the key considerations are as follows: ... Distributed ledger technology is, just as described, distributed. There is no fixed location of a transaction, a registry or an application. It is therefore critical that the parties to any arrangement involving this technology have expressly agreed and recorded the jurisdiction and governing law which is to apply to the arrangement. Some jurisdictions are starting to address the legal and regulatory matters around blockchain. ... Contractual and legal issues must be seen from a different angle with blockchain technologies. How are service levels and performance defined? What is the liability position? In particular, the enforceability of an arrangement involving blockchain should be considered carefully.


The Future of Humans - Intersection of HR & AI


Artificial intelligence is transforming our lives at home and at work. At home, you may be one of the 1.8 million people who use Amazon's Alexa to control the lights, unlock your car, and receive the latest stock quotes for the companies in your portfolio. In total, Alexa is touted as having more than 3,000 skills and growing daily. In the workplace, artificial intelligence is evolving into an intelligent assistant to help us work smarter. Artificial intelligence is not the future of the workplace, it is the present and happening today. Time is not far when AI will be contributing to every business function to make transactions effective & efficient. Human Resources will not be able to stay form it for a long time and all HR professionals should embrace this change gracefully and make the most of it. Artificial intelligence is all about analysing, breaking down and transforming data into humanized format, which is easy to interpret and study. A good example of AI is the suggestions and predictions that we get from our smartphones without having to be reminded for the same.


Why the Organisation of the Tomorrow is a Data Organisation

A car company should no longer see itself as a car manufacturer, but as a software company that is in the business of helping move people from A to B. It should look at how the company can do so in the most reliable, comfortable and safe way. Whether it produces cars, self-flying taxis or develops an Uber-like app are then questions that can be asked. The same goes for, for example, a bank. They are not a financial institution, but a data company that enables people to store money and make transactions safely. Whether this is done using a cryptocurrency or as a mobile-only bank are then questions that can be asked. Nowadays, any company, regardless of the industry, should see itself as a data company. When seeing an organisation as a data company, it allows you to remove any inhibitors that prevent the business from delivering the product or service in the most efficient, effective and customer-friendly way.


Machine Learning's Greatest Potential Is Driving Revenue In The Enterprise


These and many other insights are from the recently published study, Global CIO Point of View. The entire report is downloadable here (PDF, 24 pp., no opt-in). ServiceNow and Oxford Economics collaborated on this survey of 500 CIOs in 11 countries on three continents, spanning 25 industries. In addition to the CIO interviews, leading experts in machine learning and its impact on enterprise performance contributed to the study. For additional details on the methodology, please see page 4 of the study and an online description of the CIO Survey Methodology here. Digital transformation is a cornerstone of machine learning adoption. 72% of CIOs have responsibility for digital transformation initiatives that drive machine learning adoption. The survey found that the greater the level of digital transformation success, the more likely machine learning-based programs and strategies would succeed. IDC predicts that 40% of digital transformation initiatives will be supported by machine learning and artificial intelligence by 2019.


Key considerations of AI, IoT and digital transformation

IoT is a key driver of both the machine learning and AI craze. With the volume of data produced by machines and people on a daily basis becoming unmanageable, it has become increasingly difficult to make use of this information — and the proliferation of connected sensors only serves to further up the ante. Without AI and machine learning, making heads from tails of this data is downright difficult and creates problems for businesses looking to use their data. With digital transformation at the forefront of many business initiatives, applying AI to IoT can help drive the innovation and business effectiveness that many companies are hoping to achieve. Applied correctly, companies can change the way they operate through the use of these digital technologies to realize key competitive differentiators. Some industries are more proactive in this regard than others, which is best observed in Constellation Research’s recently released “Business Transformation 150.”


In 2018, AI will be listening and watching us more than ever: Is our privacy under threat?


Finding Alexa or Google Assistant (or even both) inside a television or speaker is no longer a surprise. But as the smart home of the future finally becomes an attainable reality, artificial intelligence is appearing everywhere. At CES it was in fridges and ovens, washing machines, dryers and even light switches. Yes, we are at a stage where even the most humble of household devices — the light switch — has been given a microphone, speakers, and a blue pulsating light to indicate when it is listening and thinking. Somehow, while our backs were turned, our light switches became intelligent. The revelation of widespread surveillance efforts by the NSA and Britain's GCHQ are still a recent memory. Yet the giants of Silicon Valley are fitting microphones and cameras in every room of our house. The Amazon Echo Spot is designed as a bedside alarm clock — yet it has a small camera, an always-listening microphone and an always-on internet connection.


Blockchain and the Rise of Transaction Technology

Administrations transact with citizens to provide them with trusted public services. They transact with businesses and governments, too. Sometimes citizens transact with government through business. Within strategic sectors, like energy or utility business, transacting is key. In an increasingly data-focused economy, transacting data can even be said to be a special type of virtualized critical infrastructure. This is why states and businesses need to focus on assuring trusted data structures. Blockchains and distributed ledgers, then, can be considered a tool for ensuring data integrity, immutability and trust. It does not mean we need to port everything to blockchain. But it can mean provide an additional, transaction layer to existing data structures, a robust audit trail on what happens on our critical infrastructure. In this way, the possible role of distributed ledgers within digital state infrastructure too often goes unrecognized.



Quote for the day:

"Strength is when you have so much to cry for but you prefer to smile instead." -- Unknown

Daily Tech Digest - January 11, 2018

Cybersecurity on a network
Industrial control systems (ICS) are everywhere. These systems play a critical role in nearly every industry around the world, including electric, water and wastewater, oil and natural gas, and transportation, as the smart technology of today and tomorrow is driven by these systems. This same widespread use and importance of ICS, especially those found in critical infrastructure, also makes them a primary target for bad actors, and the increasing use of the internet is only serving to magnify the potential for issues. According to Industrial Control Systems Vulnerabilities Statistics from Kaspersky, there were only two ICS vulnerabilities detailed in 1997 (the first year this information was recorded); however, these vulnerabilities are now much more commonplace, with 189 reported in 2015.


5 ways to establish dependable edge computing

Edge computing is set to grow dramatically in 2018 and beyond. As IoT devices continue to come online in droves of tens of billions, edge data centers will grow in prevalence too, in order to collect, process and manage data when and where it’s being created. IT departments should expect to see tremendous growth and demand for reliable computing at the edge over the next few years. As edge data centers continue to play an increasingly important role in both the business and IT landscapes, we’ll see the standards for their level of predictability and uptime grow to match those that enterprises and consumers have come to expect from traditional, large data centers. So, how can you build an edge data center that’s reliable and generates value for your company? Here are five important ways IT departments should be building their edge data centers to help ensure end-to-end reliability and resiliency.


An intro to Studio 3T, a MongoDB IDE

An intro to Studio 3T, a MongoDB IDE
A good indication of whether a technology is in the plateau of productivity in Gartner’s hype cycle is when someone asks ”Is MongoDB dead?” on that bastion of, um, sane discussion, Quora. A second good indication is when there are productivity tools and at least a nascent third-party market around your technology. A third indication is when a third party creates an IDE for it: The growing third-party market is a key indication that MongoDB has moved from mere maturity to one of the dominant players in this market. Enter Studio 3T, a small European firm with its own sea mammal mascot and a reputation for being “the MongoDB GUI.” Its eponymous product is the successor to its MongoDB Chef. According to Studio 3T marketing chief Richard Collins, the company direction is as a full-fledged IDE for MongoDB. Studio 3T lets team collaborate on MongoDB charts across roles and skill levels, from the developer to the analyst to the DBA.


Report Discusses How to Approach Botnets, Cybersecurity Threats

Botnets and automated attacks include distributed denial of service (DDoS) attacks, ransomware attacks, and computational propaganda campaigns, the report noted. “Traditional DDoS mitigation techniques, such as network providers building in excess capacity to absorb the effects of botnets, are designed to protect against botnets of an anticipated size,” report authors wrote. “With new botnets that capitalize on the sheer number of ‘Internet of Things’ (IoT) devices, DDoS attacks have grown in size to more than one terabit per second, outstripping expectations. As a result, recovery time from these types of attacks may be too slow, particularly when mission-critical services are involved.” Stakeholders in all industries must be willing to coordinate and collaborate together to combat these threats. Problems must be proactively addressed “to enhance the resilience of the future Internet and communications ecosystem.”


Look at full security development lifecycle to reduce web threats


For smaller companies without a security team, this can help with patching and general security maintenance. However, it’s important to check the security measures they offer, especially in terms of security monitoring, distributed denial of service attack (DDoS) mitigation, their responsiveness to security incidents and their processes for dealing with incidents. If you need to host the website yourself, perhaps because you are delivering a web-based service that requires close coupling to your own systems, then you will need to make sure your own systems are protected and separated from the web server itself, to prevent the web server being used as a Trojan horse to attack your operational systems.  Whichever approach you take, supply chain security also needs to be considered. There have been instances over the past few years where an attacker has attacked a website tool developer and modified the code of the tools used to build a website so that every site they build includes backdoors open to the attacker, or pre-placed malware.


'Back to Basics' Might Be Your Best Security Weapon

Despite an influx of best-in-breed security technologies, organizations around the world are seeing a continued rise in cyber attacks. There are big implications. Financial consequences include immediate costs of investigating the breach and extend longer-term to include lawsuits and regulatory fines. Loss of customer trust can translate into declines in business. Perhaps most damaging is the impact of shutting down entire systems, which can grind operations to a halt. This is especially dangerous when the target is a critical healthcare, government, or utility provider. From the high-profile Equifax breach to payment compromises at hotel chains and retailers, security teams are increasingly under pressure to not only determine why this is happening but what can be done to fix or prevent these problems. For many companies, getting "back to basics" could be one of the most effective weapons in the war on cyberattacks.


How Cisco’s newest security tool can detect malware in encrypted traffic

Cisco ETA security
ETA collects metadata about traffic flows using a modified version of NetFlow and searches for characteristics that indicate the traffic could be malicious. It inspects the initial data packet, which is translated in the clear, even in encrypted traffic. It also records the size, shape and sequence of packets, how long they take to traverse the network, and it monitors for other suspicious characteristics such as a self-signed certificate, or whether it has command-and-control identifiers on it. All of this data can be collected on traffic, even if its encrypted. “ETA uses network visibility and multi-layer machine learning to look for observable differences between benign and malware traffic,” Cisco explains in a blog post announcing ETA. If characteristics of malicious traffic are identified in any packets, they are flagged for further ianalysis through deep packet inspection and potential blocking by an existing security appliance like a firewall.


Researchers uncover major security vulnerabilities in ICS mobile applications

Specifically, the research revealed the top five security weaknesses were: code tampering (94% of apps), insecure authorization (59% of apps), reverse engineering (53% of apps), insecure data storage (47% of apps) and insecure communication (38% of apps). “The flaws we found were shocking, and are evidence that mobile applications are being developed and used without any thought to security,” said Bolshev. “It’s important to note that attackers don’t need to have physical access to the smartphone to leverage the vulnerabilities, and they don’t need to directly target ICS control applications either. If the smartphone users download a malicious application of any type on the device, that application can then attack the vulnerable application used for ICS software and hardware. What this results in is attackers using mobile apps to attack other apps.”


Embark upon ITSM asset management with systematic tagging


Tags are just text strings attached to devices and infrastructure as part of an ITSM asset management strategy. A tag is a key-value pair, seen as metadata. It assigns common attributes to assets, so they can be logically defined and grouped. A simple key-value pair example that would prove useful for ITSM asset management is the following: stack = production. In this example, the IT infrastructure team applies the stack tag to all production servers when they are built. When the administrator needs to perform system management, such as an update, he puts the tag productioninto an update query to restrict any operations to those servers tagged with production. Other key-value pair examples include owner = QAteam and location = LosAngeles. Using this set of tags in an update rollout, the global IT manager can apply changes only to servers owned by the quality assurance (QA) team and located in the Los Angeles data center.


Humans and machines in one loop—collaborating in roles and new talent models

In the near future, human workers and machines will work together seamlessly, each complementing the other’s efforts in a single loop of productivity. And, in turn, HR organizations will begin developing new strategies and tools for recruiting, managing, and training a hybrid human-machine workforce. Notwithstanding sky-is-falling predictions, robotics, cognitive, and artificial intelligence (AI) will probably not displace most human workers. Yes, these tools offer opportunities to automate some repetitive low-level tasks. Perhaps more importantly, intelligent automation solutions may be able to augment human performance by automating certain parts of a task, thus freeing individuals to focus on more “human” aspects that require empathic problem-solving abilities, social skills, and emotional intelligence.



Quote for the day:


"The struggle you're in today is developing the strength you need for tomorrow." -- Robert Tew


Daily Tech Digest - January 10, 2018

How Founders Kill Their Own Start-Ups


First, micro-managing founders have a hard time scaling up their ventures. A lack of empowerment inevitably creates decision bottlenecks, which hamper speed of execution, a key ingredient of scalability. Such bottlenecks also foster “firefighting”, which is when small issues keep grabbing more attention and resources than they should. Ultimately, high-level, high-impact decisions suffer neglect and progress grinds to a halt. Second, micro-management is a talent drain. Often those who are attracted to start-ups want to build something, to be part of something bigger. Millennials in particular want to have an impact. Micro-managers clip wings and can’t retain top contributors, especially creative ones. ... Third, time spent micro-managing is time spent away from a founder’s most important tasks: Thinking about the big picture, drumming up business and finding resources to make everything run smoothly. A founder’s micro-management, evidenced by high turnover, may even put off potential advisors and investors.



How the Threat Landscape Will Shift This Year

Defending against supply chain attacks will be tough because each software vendor has a different distribution mechanism and signing infrastructure, says Weston. In the past, companies could put software on a "trusted list" if it had a history of being secure. However, he says, businesses have to realize anything can change from good to bad at any time. "Getting your software sources from centralized locations where possible is one of the practical means for protecting against supply chain attacks," Weston adds. Cryptocurrency will be a growing security issue as more people adopt it. Attackers will target machines to cannibalize their resources and focus on cryptocurrencies, which are getting harder to mine in legitimate ways. Wallets will also become popular among hackers.


The 12 biggest issues IT faces today
Most organizations struggle with finding qualified tech staff, says Todd Thibodeaux, president and CEO of CompTIA. Training them up on the clock feels equally daunting. “The good news for employers is that the majority of IT pros like what they’re doing,” Thibodeaux says. “Their jobs provide them with a sense of personal accomplishment. Their skills and talents are put to good use. They see opportunities to grow and develop in their careers — and they’re generally satisfied with their compensation and benefits.” While IT staff may enjoy their work, retraining goes a long way in keeping it that way, says Thibodeaux. “IT pros would like more resources for training and development, and more career path guidance and career advancement opportunities,” he says. “They’re also interested in having access to more tools and engaging with more technologies and applications. And they’d welcome the opportunity to work on new technology initiatives.”


Code Refactoring Techniques

Red-green refactor is the Agile engineering pattern which underpins Test Driven Development. Characterized by a “test-first” approach to design and implementation, this lays the foundation for all forms of refactoring. You incorporate refactoring into the test driven development cycle by starting with a failing “red” test, writing the simplest code possible to get the test to pass “green,” and finally work on improving and enhancing your code while keeping the test “green.” This approach is about how one can seamlessly integrate refactoring into your overall development process and work towards keeping code clean. There are two distinct parts to this: writing code that adds a new function to your system, and improving the code that does this function. The important thing is to remember to not do both at the same time during the workflow.


What is DevSecOps? Developing more secure applications

devsecops gartner image
“DevOps has become second nature for agile, high-performing enterprises and a foundation for the success of their online business,” says Pascal Geenens, a security evangelist and researcher at Radware. “Continuous change in technology and consumer demand means there is a continuous cycle of updates to run that will keep a very varied set of functions from page upload times to shopping and search features up to date and running at their best.” “However, application security was mostly an afterthought, and at times perceived as a roadblock to staying ahead of the competition,” says Geenens. “Given the reliance of applications to keep operations running, bypassing security must be considered a high-risk strategy -- a distributed or permanent denial of service attack could easily catch you out. You just need to look at the implications of failing to update the Apache Struts framework as suffered by Equifax. The DevSecOps movement is designed to change this.”


The symphonic enterprise

After a decade of domain-specific transformation, one question remains unanswered: How can disruptive technologies work together to achieve larger strategic and operational goals? We are now seeing some forward-thinking organizations approach change more broadly. They are not returning to “sins of the past” by launching separate, domain-specific initiatives. Instead, they are thinking about exploration, use cases, and deployment more holistically, focusing on how disruptive technologies can complement each other to drive greater value. For example, blockchain can serve as a new foundational protocol for trust throughout the enterprise and beyond. Cognitive technologies make automated response possible across all enterprise domains. Digital reality breaks down geographic barriers between people, and systemic barriers between humans and data. Together, these technologies can fundamentally reshape how work gets done, or set the stage for new products and business models.


Aadhaar sitting duck for cyber criminals, says RBI-backed research

Aadhaar sitting duck for cyber criminals, says RBI-backed research
"Aadhaar faces a number of challenges over the short and long-term. The primary challenge is to protect the data from prying and excessive profit seeking excess of the business world. It is wellknown that businesses are increasingly operating in a highly competitive world in which ethical boundaries are rapidly being pulled down. The problem is compounded because they have to satisfy their shareholders in a competitive business environment that rarely looks beyond the quarterly profits and the operational dynamics of stock market listing," it says. However, the paper says, cyber vulnerabilities of Aadhaar are a bigger concern than the possible commercial misuse of data. "In an era when cyber threats are frequent, the major challenge for UIDAI is to protect the data under its control since the biometrics is now an important national asset which has huge ramifications for various government programmes and the banking system," it says.


3 top trends that will drive ERP software development

Organizations are continuing to see the many advantages of developing a roadmap and strategy that leads to digital transformation (i.e. the ability to leverage the Industrial Internet of Things (IIoT), machine learning, AI, big data or analytics). This movement will continue to drive their approach through 2018 or organizations will face the consequences of being left behind by competitors. From an ERP perspective, the combined driving force of these innovative technologies will continue to re-shape how enterprises utilize their IT solutions to provide increased efficiency, process and productivity inside their organization – something for many have been left untapped. While the industry has been discussing many of these leading-edge technologies, here are the “big three” technologies which will play a significant role in re-shaping how we think of ERP in 2018.


How network verification differs from monitoring, and what it’s good for

network monitoring concept
In a network verification system, the intent is explicitly declared – in this case, that the external partner network should be connected to the demilitarized zone but isolated from the rest of the data center. The network verification system can then explore all possible data flows that could occur and determine if some flows will violate the intent, thus spotting the vulnerability well before the attack. Now suppose you are called early Saturday morning to fix this vulnerability by locking down firewall rules. ... Depending on the application and the access-control mistake, such a slip-up might result in an immediate red-alert outage, or it might not show up until Monday morning. Either way, traffic monitoring will see the problem only after it has already affected users. A company with a network verification system could incorporate the proposed change into its network model pre-deployment and predict that the change would violate the connectivity intent, saving you from causing an outage.


Will 2018 be the year of the chatbot? Not without human help

"A chatbot is like a baby—it needs to be nurtured and taught—you can't just set up a chatbot and let it go," Harles said. Developers should avoid getting too attached to a certain technology, and think about the reasoning for a chatbot, Harles said. The bot should set out to solve a problem for the customer, making it a useful, uncomplex tool. "Some organizations think chatbots will automate a process or avoid call center calls—but the truth is chatbots are like the advent of the ATM," Harles said. "Many thought the ATM would replace banks and tellers, but in reality, it simply created a new channel. That is what chatbots will deliver for brands—a new communication channel." But a new communication channel can come with its own issues, including potential abuse of the channel with inappropriate or unrelated questions.



Quote for the day:


"It's not what you look at that matters, it's what you see." -- Henry David Thoreau


Daily Tech Digest - January 08, 2018


Software architecture has traditionally been associated with big design up front and waterfall-style delivery, where a team would ensure that every last element of the software design was considered before any code was written. In 2001, the "Manifesto for Agile Software Development" suggested that we should value "responding to change over following a plan," which when taken at face value has been misinterpreted to mean that we shouldn’t plan. The net result, and I’ve seen this first hand, is that some software development teams have flipped from doing big design up front to doing no design up front. Both extremes are foolish, and there’s a sweet spot somewhere that is relatively easy to discover if you’re willing to consider that up front design is not necessarily about creating a perfect end-state. Instead, think about up front design as being about creating a starting point and setting a direction for the team. This often missed step can add a tremendous amount of value to a team by encouraging them to understand what they are going to build and whether it is going to work.



Image: Pixabay
"Disruption happens when small, nimble companies challenge incumbents with technology," said Conrad Burke, vice president of New Ventures at Intellectual Ventures and head of ISF Incubator, an incubator and accelerator within Intellectual Ventures, which creates and licenses intellectual property (IP). "Timing is everything. You have to be able to execute well and quickly because things can change rapidly." On the other hand, speed can kill. Many great ideas haven't taken off as expected simply because the timing was wrong. For example, at the turn of the millennium, mobile marketing was supposed to change the world. Now, 18 years later, marketers are advancing the same idea as if it's novel. The difference is that today we have smartphones that deliver slick experiences, as opposed to flip phones. In addition, the networks to which our phones are connected provide coverage just about everywhere and their significantly greater bandwidth supports many content types, not just text.



Why Microsoft’s Cosmos DB may displace AWS’s cloud databases

Why Microsoft’s Cosmos DB may displace AWS’s cloud databases
The reason for Cosmos DB’s ascendance may stem from declining developer interest in “polyglot persistence.” Coined by Thoughtworks’ Martin Fowler back in 2011, polyglot persistence suggests that “any decent sized enterprise will have a variety of different data storage technologies for different kinds of data.” Rather than forcing data to fit a relational data model, for example, an enterprise will more likely embrace wide-column data for some parts of an application, a graph database for others, and relational for still others. The popularity of databases like MongoDB is a clear sign that, in fact, we do live in an increasingly polyglot world. Microsoft’s genius with Cosmos DB is that developers may want to have their polyglot persistence cake and eat it too—all in one place. As InfoWorld’s Serdar Yegulalp has written, “With Cosmos DB, Microsoft offers multiple consistency models in the same database, so the choice of model can be a function of the workload rather than the product.” That’s huge.


Fundamental skills for a bright future in IT
“Going forward, I believe you’ll see a basic need for talent that understands the fundamentals of algorithms to create AI systems, as well as general design and even some psychology and understanding of human behavior,” Fermin says. “People who are tasked with designing and building, say, chatbots will need to understand how to give those technologies human characteristics and make the interactions indistinguishable from interacting with another human being — how can it show empathy, compassion, creativity, communication,” he says. But how can job seekers emphasize these kinds of “middle ground” skills on their resume? You can’t simply list them as you would harder tech skills; you should take the same approach you would when highlighting your soft skills, says Quizlet’s Glotzbach. “Emphasize how you’ve learned on the job, or how you’ve invested in a post-graduate education through online courses, microcertifications, bootcamps — anything like that,” Glotzbach says.



Why A Cyberattack Could Cause Infrastructure To Fall Like Dominoes

The biggest motive for cyberattacks over the past few years has been financial gain. Hackers shut down a network and demand a ransom before halting an attack or giving the victim access to their network. With profit in mind, companies that, presumably, have the cash to pay ransoms are typically the target. But infrastructure operators can be victims of hackers facing any number of motivations, including money, politics or vandalism. There are strong indications that bigger and more organized actors — in some cases nation-states — have probed U.S. nuclear power plants, a dam in New York and a network that sits at the center of the global banking system.  Fear of retaliation is likely the best explanation for why a major attack hasn’t occurred. Those who have the means are likely just as vulnerable.


Apple confirms all devices affected by Meltdown and Spectre


While all Mac systems and iOS devices are affected, Apple said there were no known exploits impacting Apple device users and recommended downloading software only from trusted sources. Apple has released mitigations in iOS 11.2, macOS 10.13.2, and tvOS 11.2 to help defend against Meltdown, and said the Apple Watch was unaffected. The impact of the mitigations for Meltdown have been estimated as high as a 30% reduction in performance, but Apple claimed that updates it had released so far resulted in “no measurable reduction in the performance” of macOS and iOS. Apple also plans to release mitigations in its Safari browser to help defend against Spectre “in the coming days” and said testing indicated that the Safari mitigations would have little or no measurable performance impact.


France goes after companies for deliberately shortening life of hardware

Printer manufacturers “deliberately shorten the life of printers and cartridges,” a French environmental and consumer protection group claims. That's against the law in France, and government prosecutors have agreed to investigate the claims. If the lawsuit against the printer company, Japan-based Epson, is proven, the firm could be found guilty of breaking a little-known French law that stipulates vendors can’t purposefully lower the lifespan of a product to ramp up replacement rates. A conviction could be significant for tech hardware manufacturing overall. Nabbing Epson would likely affect not only how hardware is built and sold in France, but it also could mean laws get adopted in other European territories —individual nations are involved in the functioning of the EU bloc overall.


5 steps to becoming a global IT leader

5 steps to becoming a global IT leader
An IT leader in a multicultural environment must also be aware of his or her own cultural framework, observes Annalisa Nash Fernandez, a New York-based intercultural strategist who advises international executives on cross-cultural communication. "For an American CIO, that may mean a high degree of individualism and personal accountability, a task-based versus relationship-based approach and a linear view of project timing, which is the lens through which the diverse cultures and business styles of the teams abroad will be understood and processed," she explains. Begin the journey with face-to-face contacts to better know your customers, business partners and team, suggests Keith Collins, executive vice president and CIO of SAS. "Language and cultural differences make conference calls difficult at best," Collins says. "Practicing empathy is critically important in this environment."


China to block SD-WAN and VPN traffic by Jan. 11

Global economic technology prospects: China and the United States of America
Millions of Internet users relied on virtual private networks (VPNs) to circumvent the Chinese censorship system, dubbed the Great Firewall of China. In the past, VPNs have worked intermittently but were invariably blocked, forcing users to jump to another VPN. The new regulations will block VPN access to unregistered services. Crackdowns on accessing the Internet beyond the Great Firewall — the world’s most sophisticated state-censorship operation, employs at least 2 million online censors. But this news highlights how the world’s second largest economy is struggling to balance authoritarianism with its business leadership aspirations. In addition, a strict new cybersecurity law came into effect in June. In July China Telecom, the nation’s biggest Internet service provider, sent a letter to corporate clients that said in future, VPNs would only be allowed to connect to a company’s headquarters abroad.


Four Age-Old Business Problems Machine Learning Will Soon Solve


The hype surrounding machine learning has been accelerating and expanding for years. Supporters talk about the potential of this technology to improve every process and eliminate any issue. In many cases, the levels of optimism and excitement have reached a fevered pitch. Less enthusiastic observers, however, have noted that the promise of machine learning is often described in broad terms and abstract assertions. The combination of technical jargon, hazy use cases, and vague details leaves many wondering how accessible and advantageous machine learning really is. That suspicion is valid, even important. But at the startup level, the machine learning market is innovating and advancing fast. Better still, the technologies in the pipeline are intended neither for the biggest companies nor the most complex processes. Rather, they are being designed to solve age-old business problems that could plague any enterprise.



Quote for the day:



"A mistake is a crushing weight to a pessimist and a trampoline to an optimist." -- Tim Fargo


Daily Tech Digest - January 07, 2018

Big Data Driven Smart Transportation: the Underlying Story of IoT Transformed Mobility

blog6
For public transportation, big data analytics have transformed both the plan and operations phases on planning and demand modeling, predictive maintenance, and event response. New big data tech-savvy has brought more personalized services to public transportation users, such as offering ancillary services to providing recommendations about additional destinations to visit as part of an upgrade to the passenger’s journey, etc. The big data driven smart public transportation influences both automated and human decision-making, which has clearly played a big part in re-energizing public transport network, and has offered plenty of opportunities to improve the public transportation experience with improved reliability and safety. For drivers, real-time traffic sensor data collection, analysis, visualization and optimization of dynamic transportation systems has reduced transportation time and emissions greatly.


istock-667759834.jpg
The customer-facing software development world is outgrowing stateful, object-oriented (OO) development. The bar for great, intuitive customer experience has been raised by ambient, conversation-driven user interfaces, like through Amazon Alexa. Functional programming allows enterprises to take better advantage of compute power to deliver those experiences at scale; better flexibility for delivering the right output; and a more efficient way of delivering customer value. FP also reduces regression defects in code, simplifies code creation and maintenance and allows for greater code reuse. Just as object-oriented programming (OOP) emerged as the solution to the limitations of procedural programming at the dawn of the internet boom in the mid-'90s, FP is emerging as the solution to the limitations of OOP today. The shift is already underway -- 53 percent of global developers reported that at least some teams in their companies are practicing functional programming and are planning to expand their usage.


Breaking Bitcoin With a Quantum Computer

Alex Beath, a Toronto-based physicist and pension fund analyst, is skeptical about Bitcoin but sees one useful purpose for the crypto-currency: It may detect when someone creates a working quantum computer. “The second someone creates a viable quantum computer, the NP-complete math problems at the heart of Bitcoin mining tech become instantly solvable,” Beath notes. “In other words, one answer to the question ‘what’s the first thing you’d do with a quantum computer?’ is ‘mine all of the remaining Bitcoin instantly.’ Until that happens, nobody has a quantum computer.” Beath’s off-the-cuff observation, which he made in response to a Fortune query about the security of bitcoin, is amusing. But it also underscores a serious problem: Namely, a new era of computing is fast-approaching and when it arrives, the system that gave rise to many crypto-currency fortunes will collapse.


AI Weekly: If we create artificial intelligence, will we know it?


When people talk about creating an artificial intelligence, the conversation is often focused on human or superhuman AI — systems that would equal or surpass us in intelligence. But what if we create an artificial intelligence that’s deserving of respect, but don’t recognize it as such? That’s a question I’ve had bouncing around in my head for the past several months. Over the course of human history, we’ve proven very poor as a species at successfully evaluating the intelligence of other beings, whether they’re human or non-human. Consider crows, who learn from their dead, recognize individuals, use tools, and even bring gifts to those they like — are they … intelligent? Furthermore, if we were to create an AI that produced those characteristics, does it require the same sort of considerations that a crow does, with regards to its treatment at the hands of humanity? We likely won’t have to reckon with a human-level AI for many years, but these questions could prove more pressing.


5 machine learning mistakes – and how to avoid them

Machine learning gives organizations the potential to make more accurate data-driven decisions and to solve problems that have stumped traditional analytical approaches. However, machine learning is not magic. It presents many of the same challenges as other analytics methods. In this article, we introduce some of the common machine learning mistakes that organizations must avoid to successfully incorporate this technique into their analytics strategy.  The shortage of deep analytics talent continues to be a glaring challenge, and the need for employees who can manage and consume analytical content is even greater. Recruiting and keeping these in-demand technical experts has become a significant focus for many organizations. Data scientists, the most skilled analytics professionals, need a unique blend of computer science, mathematics and domain expertise. Experienced data scientists command high price tags and demand engaging projects.


Security fears have held companies back from adopting cloud services

Companies have been slow to move from running applications and storing data on their own private servers to doing them on public clouds such as Google Cloud and Amazon Web Services, a new study by McKinsey found. Only 40% of the companies studied had more than 10% of their workloads on public clouds. Concerns about cybersecurity were holding many companies back, although attitudes are changing, McKinsey, a consulting company, found in the study, which surveyed 90 companies across multiple industries. "Despite the benefits of public-cloud platforms, persistent concerns about cybersecurity for the public cloud have deterred companies from accelerating the migration of their workloads to the cloud," McKinsey said in its report. "Executives cited security as one of the top barriers to cloud migration, along with the complexity of managing change and the difficulty of making a compelling business case for cloud adoption."


How I fell for the blockchain gold rush

I found myself obsessed, constantly monitoring Twitter, waking in the night to check coin tracking apps. Pundits were hailing verge as a game-changer, the next bitcoin. Unbelievers pointed to previous missed deadlines and called it “vaporware”, a nonexistent con, the biggest scam in crypto history. In this unprecedented hype, there was clearly unprecedented money to be made. And more than one way to make it. Three things hold sway over these unregulated crypto markets: coin innovations, bitcoin whales manipulating prices with huge pump and dumps, and social media. The merest hint of FUD (fear, uncertainty and doubt) on a coin’s Twitter or Reddit threads can tank its price quickly, and as the final days of 2017 slipped by with Wraith Protocol still unreleased, the FUDers went to town on verge. A crypto tipster named Marquis Trill tweeted his 4.6 million followers on Christmas Day to “sell XVG!”, claiming he had proof from a Reddit whistleblower that the Wraith Protocol project was falling apart.


Top 10 Retail Banking Trends and Predictions for 2018


The fact that the list of trends identified by the financial services industry has remained relatively consistent could be a symptom of a greater problem. The banking industry is moving much too slow, and legacy firms are failing to differentiate themselves. According to Forrester, “In a market where one-third of all customers say ‘all banks are basically the same,’ it would make sense for executives and their teams to obsess over how to differentiate. Unfortunately, 2018 will look more like a digital arms race between warring incumbents than a year in which firms find new ways to specialize and create value for customers.” Regarding changes in emphasis for this year’s trends, removing friction from the customer journey increased in importance from last year, with 61% of organizations placing this trend in the top three, compared to 54% last year. The trend around the use and application of data also increased in importance from last year, with 57% of those surveyed placing this in the top 3 for 2018, compared to 53% in predictions for 2017.


Google Cloud Preemptible GPUs: Dirt cheap machine learning with a serious catch

The words “artificial intelligence” often conjure up a sense of fear and apprehension. Fear for the unknown possibilities of AI, fear for the AI-fueled dystopian images brought about by movies like The Terminator, and most practically, fear for the possibility that AI will someday take our jobs. This fear is neither new nor totally unfounded. As with any disruptive technological invention, faster, more efficient machines are bound to replace human workers. However, those who fear AI will take their jobs can rest a little easier knowing they will at least have the potential to find a new job. A new report by Gartner states that although AI will eliminate 1.8 million jobs, it will create 2.3 million jobs. Peter Sondergaard, head researcher at Gartner, predicted AI will augment workers’ abilities and could be a “net job creator” starting in 2020. I believe, like all other disruptive technologies of the past, AI will bring about many opportunities for new jobs.


Brazilian Government Plans to Process Petitions and Write Laws on Ethereum

The key to employing a Blockchain system in processing petitions and electoral votes is to encrypt votes onto the immutable Blockchain network as transactions, to ensure that the specific piece of data remains unalterable and invulnerable to manipulation. Essentially, processing petition signatures on the Ethereum network would require smart contracts, and the system would operate similarly as other decentralized applications that exist on the network. The electoral system of Brazil would act as a decentralized application of its own with an independent digital token, that is used to process every vote on the Blockchain. Henrique Costa, a Universidade de Brasilia law professor, told QZ that the lack of an immutable platform to collect signatures of votes had been a real issue for the government in the past. Within the Brazilian electoral system, any popular petition with the signatures of one percent of the country’s populations is required to be heard in Congress.



Quote for the day:


"Next generation leaders are those who would rather challenge what needs to change and pay the price than remain silent and die on the inside." -- Andy Stanley


Daily Tech Digest - January 06, 2018


Self-driving cars and chess-playing computers might be the first things that come to your mind when you think about Artificial Intelligence (AI), but as a concept, AI's not exactly new. Go back to the ancient Greeks, and you'll discover Talos, a mythological giant automaton warrior made of bronze. In fact, that's not the only example from Greek mythology of what we'd consider an AI - Hephaestus, the God of Technology, was also said to have created automated servants some human-like, and others wheeled tripods. Then there's the mud-creature Golem from Jewish lore. Coming back to relatively recent times, you could even consider Frankenstein's monster to be a kind of intelligent automaton. Nearly every culture has stories about man-made creatures that could think and act on their own but given that we're a species that's always tried to play God, it seems only natural. Of course, it wasn't till the advent of computers that Artificial Intelligence moved from the realm of fiction and folklore to reality.


CIOs are in the perfect position to educate their company’s CEO and board about recent developments in AI and illustrate how AI might influence their business and competitive landscape. By following this approach, CIOs can potentially flip the traditional engagement model between IT and the business, influencing business strategy at the outset, rather than simply developing implementation projects that follow up on the executive team’s decisions. ... Recent breakthroughs in machine learning, big data, computer vision and speech recognition are increasing the commercial potential of AI. But AI requires new skills and a new way of thinking about problems. CIOs must ensure that IT owns the strategy and governance of AI solutions. Although pilot AI experiments can start with a small investment, for full production rollout, the biggest area of investment is building and retaining the necessary talent.



The reason why AI is being prevalently used now than before is twofold: 1) the science and the advancement behind algorithm development; 2) with the abundance of data generated makes it a perfect time to use this model. One of the key principles of algorithm design for AI is that there must be enough 'training' data on which to 'train' the model before it is able to make meaningful predictions. This number can range from 10,000 data points and above. The abundance of data did not exist in the same capacity as it does now, and with the prevalence of high-speed computing, this is a perfect time utilize this model. Now, that we understand what AI is and why it is being used now, let's examine what AI can and cannot do. AI is able to replicate and automate decisions based on certain parameters that are fed into the program, but no matter what AI cannot be creative.


Without a shadow of a doubt, this past year has been huge for cryptocurrencies and the blockchain technology. Whatever the future may hold for Satoshi's brainchild and all that it has given birth to, 2017 will forever hold a singular position on the timeline of events in the crypto world. But as a new year approaches, the urge to get caught up in all that has happened over the past 12 months could prevent us from considering what 2017 did not bring – and why. Admittedly, it is hard not to be mesmerized by the numbers: the more than 1,300 cryptocurrencies, the $700-plus billion market cap they have produced or the eye-popping ICO raises of Tezos, Filecoin, Bancor and others – oh yes, and the gut-wrenching ride of bitcoin’s price as it climbed over $20 000 – and fell back down. And yet, it is worthwhile taking a step back and considering what is still missing and what exactly this might mean for the year that is almost upon us.



The joint UK and EU directive, which forces the nine biggest UK banks to give customers control over their data, comes into force on 13 January, 2018, bringing the prospect of disruptive change to the stagnant banking market. Possibilities include everything from big banks going bust to the invasion of the Banks of Amazon and Google. Entrepreneurs, however, remain wary. Open Banking hasn't been backed by a public awareness campaign, so consumers are at best ignorant, at worst fearful and confused. The limited initial scope only includes current account data, with credit cards and other payment accounts added slowly over the next two years. Last month, five banks, including HSBC and Barclays, announced they would miss the deadline to release their data. Will Open Banking break the big banks' stranglehold on the banking market? Or – as some suspect – end up being suffocated by the incumbents?


If a fully self-driving vehicle being operated by an AI system was involved in an accident, who would be liable? Commissioned by the government to explore this question, Professor Koji Nakayama from the Meiji University Graduate School of Law, an expert on the Civil Procedure Code, organised a mock trial for an accident involving a self-driving car in January last year. The Road Traffic Law states that a driver must reliably operate the steering wheel, brakes and other equipment to drive at a speed and in a manner that does not put other people in danger. However, the law was not designed to apply to AI systems. In the mock trial, the hypothetical accident occurred when a bicycle suddenly pulled out in front of a self-driving car, which led the car to quickly change lanes. To avoid a collision with the car, a vehicle behind it swerved to the left and hit a utility pole, killing the driver.


screenshots-windows-10.jpg
Microsoft has warned users that its patches for the dangerous Meltdown CPU bug won't reach them if their third-party antivirus hasn't been updated to support this week's Windows security update. By now Windows users should have received the patches Microsoft released yesterday to plug the widespread Meltdown bug and its companion Spectre, which expose most computers and phones to speculative execution side-channel attacks that affect chips from Intel, AMD, and Arm. Microsoft released software updates for Internet Explorer, Microsoft Edge, Windows, and SQL Server, but customers will also need to apply firmware updates from their respective hardware vendors too. Surface and Surface Book users can expect an automatic firmware update from Microsoft but those with other hardware will need to check with their vendors.


The potential for these technologies that we call artificial intelligence is huge. They affect potentially every sector, potentially every function. One reason for that is a lot of the potential applications of AI are extensions of the work that people had already started in data and analytics. And so, we've been looking at nearly 500 different use cases of artificial intelligence across every sector, across every function. Sometimes what we say is, these traditional analytic methods, whether it's regression or what have you, gets you this much impact. But, when you could add the multidimensionality of additional data or these additional deep learning techniques, you could increase, for instance, forecast accuracy or increased OEE or decreased waste, a number of these things, which these use cases allow us to do. You could think of AI as just being another turbocharged tool for your analytical toolkit.



Blockchains could help reduce the gap of the entire lifecycle of a trade from days to minutes, even to zero. According to a report by Santander InnoVentures, the Spanish bank’s fintech investment fund, by 2022 ledger technologies could save banks $15–20 billion a year by reducing regulatory, settlement and cross-border costs. Digital Asset Holdings wants to be the distributed database handling these speedy transactions. And the who’s who of the world’s biggest financial names, including Goldman Sachs, Citibank and Blythe Masters’s old employer, JP Morgan, have ploughed more than $60 million of investment into DAH. Speed and efficiency are not the only qualities that make distributed ledgers attractive to banks. ‘Regulators will like that blockchain-based transactions can achieve greater transparency and traceability– an “immutable audit trail”,’ Masters says.



Today tech companies are facing the challenges of the current digital age: increasing user expectations, technology disruptions and fierce competition. Managers and IT workers tend to proactively push technology solutions in order to solve problems without being sure of the effects and they often fall short…or sometimes options are never evaluated. They lack a proper and rigorous approach to formulating problems, diagnosing the root causes, performing relevant corrective actions, evaluating the effects, and at the end create a better understanding of the work improves day-to-day job practices of people. In this article, we will meet Marek, the CTO of a French mobile development company and Kevin a developer. Through patient observation of a developer’s work and how the software pieces were flowing or being stopped, Marek revealed a waste in the validation & deployment process, which seriously impacts developers’ productivity.



Quote for the day:



"To make a decision, all you need is authority. To make a good decision, you also need knowledge, experience, and insight." -- Denise Moreland