Daily Tech Digest - August 15, 2018

Servitisation: What it is and how it can transform companies

It’s an idea that has certainly gained impetus, thanks largely to the growing capability of the internet of things (IoT). As we keep hearing, there will be approximately 20 billion IoT devices in place by 2020, and that level of connectivity is giving organisations an incredible amount of data on how products and services are being used, when they are performing well or when they are showing signs of malfunction, and so on. Such intelligence is worth something and, in field service circles, it’s already being used to provide predictive maintenance on products – a sort of weird science whereby the technicians can foresee problems and fix them before they happen. That’s the theory, anyway. ... For some, these figures may not be particularly enlightening – value-added services have always been good for business. But this is more than just bolting on a few services to products. This is also about using the product as a catalyst for offering customers something bigger and more ongoing. 

tree, root
Because bitcoin's ledger is public, it's obvious when someone uses one of these complex transactions. Taproot puts an end to that by making these transactions look the same as every other "boring payment," as Maxwell put it in the technology's announcement post. Yet, it can't do this without Schnorr, an upgrade to bitcoin's signature scheme that's been on developer's coding agenda for years. The signature scheme is supposed to be better than bitcoin's current signature scheme "in basically every way." And it enables Taproot because it allows signature data to be mashed together into one. "Schnorr is necessary for that because without it, we cannot encode multiple keys into a single key," Wuille continued in his presentation. ... But since developers have long been thinking about other enhancements, including those enabled by Schnorr, it's worth noting that Taproot isn't the only important change being considered. Towns thinks the privacy enhancement might be rolled in with a bunch of other upgrades going into bitcoin at the same time.

IoT Disruption Has Begun. And Retail Is Just the Start. When Will Your Industry Be Affected?

IoT Disruption Has Begun. And Retail Is Just the Start. When Will Your Industry Be Affected?
Recent research from Aruba found that 79 percent of retail companies surveyed said they will have internet of things (IoT) technology in their businesses by next year. This is good news for consumers, considering that Aruba also found that IoT improves the customer experience in 81 percent of cases examined. The IoT’s impact is also more immediate than that of other consumer tech. While virtual reality (VR) and artificial intelligence (AI) may provide in-depth knowledge and perspective, their technologies are at least one step removed from what someone is actually experiencing in the real world. IoT connectivity, in contrast, allows customers to enhance their experiences in real time, making it the most direct way for businesses to improve their customer experience. ... If an innovation costs too much to implement, the increased cost will offset the improvements a company has made in the customer experience.

The Sensors That Power Smart Cities Are A Hacker's Dream

"There are people out there who aren’t white hat hackers who have had at least one of these exploits for ages and who knows what they’ve done with it," Savage says. "This is something that people have been looking into." Industrial control hacking has recently become a major focus of nation state attackers, for instance, with Russia taking the most prolific known interest. State-sponsored Russian hackers have probed US grid and election infrastructure and have wreaked havoc overseas, causing two blackouts in Ukraine and compromising payment systems in the country with malware campaigns. As the risk grows worldwide, US officials have increasingly acknowledged the vulnerability of US infrastructure, and agencies like the Department of Homeland Security are scrambling to implement systemic safeguards. Cities will continue to invest in smart technology. Hopefully as they do, they'll appreciate that more data will often mean more risks—and that those vulnerabilities aren't always easy to fix.

5 Trends For The Truly ‘Intelligent,’ Data-Driven Business

Opportunities to push intelligence into the physical world go way beyond smart toasters, fridges, or door locks. It’s not just the Internet of Things but the “Internet of Thinking.” The next generation of intelligent systems will transform industries, using techniques including collecting sensor data from distributed utility grids, scheduling predictive maintenance of industrial equipment, monitoring workforce safety, supporting healthcare patient engagement and research, and creating new business models for insurance. All these initiatives rely on the efficient storage, movement, and analysis of data. Global revenue for big data and analytics practices in 2017 were $151 billion, up nearly 12% from the year before. And companies around the world are betting big on advances in data-hungry technologies, with AI investments in 2017 at more than $12.5 billion and IoT at more than $800 billion, according to IDC. These investments will result in more than fast and efficient businesses, concludes Accenture.

How smart contact lenses will help keep an eye on your health

One of the main problems with such diabetic contact lenses is wearability. Creating a smart contact lens means putting rigid, non-see-through components onto a lens that will be in direct contact with the eye. The eye might be clever, but it's also sensitive: whatever touches it over a long period needs to be gentle enough not to damage the delicate cornea, while not obstructing the vision of the wearer. It's no mean feat, but the Purdue University researchers have come up with a new approach that they hope will open the doors to the long-delayed commercialisation of smart contact lenses. Using a new process called interfacial debonding, Lee's team were able to separate thin-film electronics from their own wafer substrate, and then print them onto another material -- in this case, contact lenses. The glucose sensors that are attached to the contact lens are covered by a "thin layer of transparent, biocompatible, and breathable polymer", according to Lee, meaning the lens won't irritate the eye or interfere with the normal vision of the wearer.

Why Even AI-Powered Factories Will Have Jobs for Humans

Just as the internet revolution ushered in completely novel jobs — for example, web designer and search-engine optimization engineer — so will the new era of AI. Telsa, for instance, is recruiting robot engineers, computer vision scientists, deep learning scientists, and machine learning systems engineers. And the company has also posted job listings for more-esoteric AI specialties such as a battery algorithms engineer and a sensor-fusion object tracking and prediction engineer. For the former position, the requirements go beyond knowledge of lithium-ion cells (cell capacity, impedance, energy, and so on) to include expertise to develop algorithms for state-of-the-art feedback control and estimation. Moreover, it’s not just technology-related jobs that are being reimagined with AI. In fact, as Tesla and other companies have discovered, AI technologies are having a profound impact throughout the enterprise, from sales and marketing, to R&D, to back-office functions like accounting and finance.

Cisco Patches Its Operating Systems Against New IKE Crypto Attack

Cisco logo
According to Cisco, this flaw "could allow an unauthenticated, remote attacker to obtain the encrypted nonces of an Internet Key Exchange Version 1 (IKEv1) session." "The vulnerability exists because the affected software responds incorrectly to decryption failures. An attacker could exploit this vulnerability sending crafted ciphertexts to a device configured with IKEv1 that uses RSA-encrypted nonces," Cisco said in a security advisory. "With our attack you can do an active online attack. But it is impossible to recover data from an already established IPsec session with our approach," Martin Grothe, one of the researchers behind this new attack has told Bleeping Computer via email. "IKE runs before IPsec, thus you can only attack the first Phase of IKE and if you succeed you are able to impersonate another IPsec endpoint or be an active man-in-the middle and read/write data to that session," he added. With this in mind, applying the Cisco patches is highly recommended. Clavister, Huawei, and ZyXELL have also released security advisories here, here, and here, respectively.

Mimecast extends core email security to enable cyber resilience

Not all organisations appreciate the importance of email security, according to Bauer. “The more advanced and mature enterprise security teams understand how wide open an attack vector email is because of all the opportunities it presents to attackers, including malicious attachments and links, email compromise attacks and a range of social engineering attacks. “The most sophisticated security teams are looking for the best technologies and they know how to evaluate those technologies. But at the opposite end of the spectrum, there are those businesses who think the email threat is limited to spam and is not that serious, perhaps because they have not yet had a serious incident or they have seen some attacks, but think it is just ‘bad luck’ and do not really address the problem. “But this is something that will not go away and can be extremely costly to targeted organisations, so organisations that have not done so already should pay attention to shoring up their defences against email threats.”

What’s the role of the CTO in digital transformation?

What̢۪s the role of the CTO in digital transformation? image
A CTO needs to take on the role of the ‘bridge builder’ between the strictly technical components of a transformation strategy and how they can apply to people and process in the specific context of an organisation. ... The CTO has specific technological insight and therefore needs to be directly involved in helping the entire organisation identify where technical systems are simply obsolete and not fit for purpose so as well as being a bridge builder, CTOs naturally lead the charge when dealing with a technology-led approach. They must be able to explain where the value is in the application of technological change in context – too often we see visions that are de-contextualised from the reality on the ground. De-contextualised technological planning does not allow for realistic strategic planning. With visions of the ambitious but feasible in sight it is then the whole leadership team’s task to decide what course they are going to map out and to work together on the digital transformation journey.

Quote for the day:

"Entrepreneurship is neither a science nor an art. It is a practice." -- Peter Drucker

Daily Tech Digest - August 14, 2018

Image: Shutterstock
Once your DevOps team understands the metrics that connect your work to customer satisfaction, look at all the tools your DevOps team uses to deliver for your success metrics, says Rosalind Radcliffe, a distinguished engineer at IBM. "Many of the tools that people adopt as part of their DevOps transformation help generate data that can help drive numbers into these metrics," says Radcliffe.  Knowing what to measure and how to measure is half the battle, but what's possibly more important is knowing who needs to raise their hand to keep the DevOps team on track.  “The glib answer,” says Mann, “is that everyone should care [about DevOps success metrics].” However, the more specific answer Mann gives is leaders of application development or a project management office (PMO) or project manager (PM) for application development at larger companies. If you’re at a smaller company, Mann says a scrum master could be in charge of evaluating a DevOps team’s value stream and success metrics.

Does Facebook even need a CSO?

Facebook / network connections / privacy / security / breach / wide-eyed fear
As sister publication CIO has reported, not every company needs a CSO. “It's not a person who needs a seat at the table,” Simple Tire CIO CJ Das said at a CSO event, “The topic needs a seat at the table.” Indeed, Flick says, “We expect to be judged on what we do to protect people's security, not whether we have someone with a certain title.” Pinterest and Tumblr don’t have CSOs. ... “The creation -- and I guess I would say appointment of any leadership role,” Coates notes, “also tells a story to the public, intentional or otherwise. In some regards, a chief security officer is also a central point to inspire confidence that this is something where they're putting a senior role at the table to tackle this issue.” That’s why, he says, New York State mandates all financial institutions have a CSO. “Because there is a challenge in security when the work is distributed amongst teams without a central owner, you can lose some of that experience and central visibility that a security organization brings to the table,” Coates explains, “A commitment to a high placed individual shows the company has kind of matured to that level and is thinking of it that way.”

Why you should shift from systems thinking to capability thinking

At a basic level, a capability is nothing more than an ability to perform a function. This capability could be unique in the industry, or relatively rudimentary, and in some cases a seemingly simple capability requires all manner of supporting capabilities to successfully realize it. For example, Amazon has a capability for same-day package delivery in most areas, a feature that's easy to articulate and understand, but it provides a significant advantage over competitors that don't have the logistical prowess to match Amazon. Generally speaking, most IT projects and policies start with a capability in mind. That capability might range from an ability to close financial reporting within a certain time frame to providing low-cost voice communications across geographies. However, most IT shops abandon this capability mindset once they select a suite of tools designed to deliver that capability. Suddenly, IT shifts from "providing a supply chain capability" to "we're an Oracle shop." Think of this like a carpenter going from saying "I'm a cabinet maker" to "I'm a Stanley 15-106A coping saw shop."

Why Choosing Python For Data Science Is An Important Move

data science and python
Python has also become ubiquitous on the web powering numerous high-profile websites with Web development frameworks like Django, Tornado, and TurboGears. More recently, there are signs that Python is also making its way into the field of cloud services with all major cloud providers including it in some capacity in their offerings. Python obviously has a bright future in the field of data science, especially when used in conjunction with powerful tools such as Jupyter Notebooks, which have become very popular in the data scientist community. The value proposition of Notebooks is that they are very easy to create and perfect for quickly running experiments. In addition, Notebooks support multiple high-fidelity serialization formats that can capture instructions, code, and results, which can then very easily be shared with other data scientists on the team or as open source for everyone to use. For example, we’re seeing an explosion of Jupyter Notebooks being shared on GitHub with more than 2.5 Million and counting.

Malicious Cryptocurrency Mining: The Road Ahead

Scammers are even resorting to API abuse to freeze their victims’ browsers with the primary target being Chrome, followed by Brave and Firefox. Fraudsters that operate by providing fake tech support services mainly depend on gaining control of easily-exploitable business functions rather than on specific tools. Apart from exploiting security flaws in Bitcoin transactions, scammers are capitalizing on the long patch lag time for tech support cases to make large profits. In January of this year, processors were greatly impacted by vulnerabilities namely, Meltdown and Spectre. While Meltdown was exclusively used against Intel processors, Spectre could attack almost all processors. These vulnerabilities can be used to access people’s login credentials, banking information, and personally identifiable information. Notably, Microsoft, Intel, and other vendors have implemented patches, but there are issues that may need to be addressed in the long run.

Smart cities face challenges and opportunities

One constant across all projects is data traffic. Although replicating projects is a challenge, data collection and traffic variation among various city pilot projects, compared to full-scale deployments, varies greatly. In a recent RootMetrics by IHS Markit test of internet of things (IoT) technologies in Las Vegas, even at a full-scale phase, the network exhibited significant problems. In fact, certain IoT networks were unable to provide enough coverage to support even the simplest smart city applications. Due to the ever-increasing volume of sensors and their data, robust connectivity technology is a requirement for success. It is also often limited by a city’s budget. According to RootMetrics, coverage and reliability across the entire city is the key to launching any successful smart city programme. Digital security is another threat cities face when they try to implement smart city projects. As personal data gets uploaded into the cloud, it is often shared with digital devices, which, in turn, share the information among multiple users.

The Impact Of Artificial Intelligence On The (Re)Insurance Sector

AI and data will take us into a world of ex-ante predictability and ex-post monitoring, which will change the way risks are observed, carried, realized and settled. This fundamental change will lead to profound changes to market balances and equilibriums in the (re)insurance sector, and will completely redefine the dynamics of the insurance market, on both the supply and the demand side. Although (re)insurers might have an early advantage given that they have greater means and more tools and, for the time being, more data, AI will transform both sides of the insurance transaction in the long run. All parties to the insurance ecosystem, be they risk carriers, brokers, or even customers, will use AI tools. It is even likely that negotiations and discussions could take place between the AI systems of the different parties to the insurance contract! This might appear futuristic, but the idea of two AI systems dueling with each other and trying to “fool” each other already underpins generative adversarial networks (GAN) and the concept of adverse learning, which are used in research for video recognition and analysis

Web security gets a boost as TLS gets major overhaul

CloudFlare implemented one of those early versions of TLS 1.3 on its servers in 2016, but by the end of 2017 found most traffic still relying on TLS 1.2. ... Since then however web giants like Facebook have enabled TLS 1.3. Google enabled it in Chrome 65 -- the latest version of Chrome is version 68 -- but at the time had only rolled out support on Gmail. Firefox-maker Mozilla also announced that TLS 1.3 draft 28 is already shipping in Firefox 61, noting that one of its biggest improvements on the security front is that it cuts out outdated cryptography in TLS 1.2 that made attacks like FREAK, POODLE, Logjam and others possible. It will ship the final version off TLS 1.3 in Firefox 63, due out in October. "Although the previous version, TLS 1.2, can be deployed securely, several high profile vulnerabilities have exploited optional parts of the protocol and outdated algorithms," IETF engineers said in a statement. "TLS 1.3 removes many of these problematic options and only includes support for algorithms with no known vulnerabilities."

Samsung Announces New SmartThings Mesh Wi-Fi System

Samsung Announces New SmartThings Mesh Wi-Fi System
SmartThings Wifi works as a SmartThings Hub to serve as the “brain” of the smart home. Samsung’s open SmartThings ecosystem makes it easy to automate and manage the smart home with one hub and the SmartThings app. Compatible with hundreds of third-party devices and services, SmartThings enables users to expand their smart home with lights, door locks, cameras, voice assistants, thermostats and more. SmartThings Wifi delivers a simple, convenient 2-in-1 solution, offering whole-home automation out of the box. For corner to corner coverage, users can choose the right Wi-Fi configuration to fit their needs, from a home with multiple levels to a small apartment. Each SmartThings Wifi router has a range of 1,500 square feet, with the 3-pack covering 4,500 square feet, and users can expand coverage by adding additional mesh routers to the set-up. It is easily set-up and managed by the Android and iOS compatible SmartThings app.

Five key security tips to avoid an IoT hack

While layered security must remain the key priority, it is essential to understand that generic networking equipment and IoT devices are the weak link. They often have no continuous update program for firmware and software, low lifetime support, and insufficient computational power to host an antivirus or any other security agents. As practice shows, they are almost always left alone without proper supervision at consumer homes, network perimeter of small & medium business offices or branches of huge corporations. It is crucial to keep up with the evolving threat landscape. To do that, companies need to move away from traditional security approaches to the next generation solutions, especially security controls that are driven by artificial intelligence. The latter are capable to precisely map a network and identify all devices (even those that might be left alone somewhere on the edge of the network).

Quote for the day:

"When you have to make a decision, you can't wait for tomorrow to make it. You've got to make it now, and then if it's wrong, maybe tomorrow you can make a better one." -- Harry S. Truman

Daily Tech Digest - August 13, 2018

Google DeepMind's AI can now detect over 50 sight-threatening eye conditions

In a project that began two years ago, DeepMind trained its machine learning algorithms using thousands of historic and fully anonymized eye scans to identify diseases that could lead to sight loss. According to the study, the system can now do so with 94 percent accuracy, and the hope is that it could eventually be used to transform how eye exams are conducted around the world. AI is taking on a number of roles within health care more widely. ... AI is also being used to help emergency call dispatchers in Europe detect heart attack situations. Diagnosing eye diseases from ocular scans is a complex and time-consuming for doctors. Also, an aging global population means eye disease is becoming more prevalent, increasing the burden on healthcare systems. That's providing the opportunity for AI to pitch in. "The number of eye scans we're performing is growing at a pace much faster than human experts are able to interpret them," said Pearse Keane, consultant ophthalmologist at Moorfields, in a statement. "There is a risk that this may cause delays in the diagnosis and treatment of sight-threatening diseases, which can be devastating for patients."

How Fintech Is Transforming Access to Finance

A percentage of the digital transactions that merchants receive are set aside to repay their advances. This arrangement keeps repayments fluid, bite-sized, and in line with cash flow. In India, Capital Float, a nonbank finance company, provides instant decisions on collateral-free loans for small entrepreneurs. A risk profile assessment is carried out in real time by analyzing MSMEs’ cash flows using data from Paytm, an e-commerce payment system and digital wallet company, mobile financial services firm Payworld, and smartphones. Capital Float customers carry out electronic know-your-customer authentication, receive the loan offer, confirm acceptance, and sign the loan agreement on a mobile app. The loan amount is credited to their account on the same day, with nil paperwork. Cash flow loans help MSMEs seize opportunities when they arise and are an excellent example of the targeted, niche innovation that enables fintech to compete with more prominent—but slower—traditional banks. They are well-suited to businesses that maintain very high margins, but lack enough hard assets to offer as collateral.

The Commercial HPC Storage Checklist – Item 3 – Protection at Scale

Many HPC storage solutions provide only replication for data protection. Replication protects against media failure within a node by creating two or three additional copies of data on other nodes in the storage cluster. The problem is a replication only model forces the organization to store two or three full additional copies of data. While replication does maintain performance during a failure, the level of exposure to an additional failure is enormous. Most enterprise storage systems support a single or dual parity protection scheme. While parity does not have the capacity waste of a replicated system, it can hurt storage performance if the design of the storage system cannot maintain performance during a failure/rebuild process. A Commercial HPC storage system needs to provide a parity-based protection scheme, so they do not waste capacity nor unnecessarily waste data center floor space. Because restarting of workloads is so time-consuming it also needs to have multiple layers of redundancy so that one or two drive failures don’t stop an HPC process from executing.

How artificial intelligence is shaping our future

A world fuelled and enhanced by AI is one to look forward to. Autonomous cars will mean efficient and safe transport. Real-time translation buds that will enable you to speak one language and hear another will transform our travel experiences. Despite the cries of alarmists, there is little reason to believe that our AIs are going to “wake up” and decide to do away with us. ... New drugs, therapies and treatments will produce a revolution in the delivery of healthcare. What’s true for health is true for education, leisure, finance and travel. Every aspect of how individuals, corporations and governments function can be more effectively managed with the right application of the right data. ... Humans will come to confide, trust and rely on our new companions. They will support us for better or worse, in our prime and our decline. Powered by AI and abundant data, they may assume the characteristics of those dear or near to you. Imagine your late grandmother or your favourite rock star chatting helpfully in your living room.

Microsoft may soon add multi-session remote access to Windows 10 Enterprise

windows server
At this point, multi-session Remote Desktop Services (RDS) is a Windows Server-only feature, one that lets users run applications hosted on servers, whether the servers are on-premises or cloud-based. But the evidence uncovered by Alhonen hints that Microsoft will expand a form of RDS to Windows 10. "There's a ton of unanswered questions," said Wes Miller, an analyst at Directions on Microsoft, noting Microsoft silence on such a move. He expected that some answers will be revealed at Microsoft Ignite, the company's massive conference for IT professionals that's set for Sept. 24-28, or with the release of Windows 10 1809 this fall. One thing he's sure of, however. "You won't see this running on hardware at a user's desktop," Miller said of Windows 10 Enterprise for Remote Sessions. Instead, he believes the SKU should be viewed as back-end infrastructure that will be installed at server farms in the virtual machines that populate those systems. If Windows Server serves - no pun intended - as the destination for remote sessions accessing applications or even desktops, why would Microsoft dilute the market with the presumably-less-expensive Windows 10 Enterprise SKU?

Will network management functions as a service arrive soon?

The cloud also eliminates the need for patching and upgrading software. Those functions would be handled by the vendor. In considering NMaaS, Laliberte said organizations should understand the underlying architectures, which in some cases could simply be individual licenses. "After that, it would come down to the cost model of Opex versus Capex, along with maintenance," he said. Laliberte said it is important to find out how the NMaaS offering charges and to determine the cost model and whether there any ingress charges for data collected. One of the other big issues, he added, is security. "If you are in a regulated industry or have sensitive information traversing your network and that data is being sent to the cloud, make sure to get the security team engaged and that they approve the model." NMaaS also enables the collection and dissemination of benchmarking data, which companies can use to determine how their networks compare to those of their peers. "It is a capability that could be very helpful for organizations to understand and to improve their own environment," Laliberte said.

Apcela optimizes Office 365 performance, improving user productivity

Apcela optimizes Office 365 performance
The architecture of the network Apcela has built follows the model of Network as a Service. It starts with a core network anchored on globally distributed carrier-neutral commercial data centers such as Equinix, which Apcela calls application hubs, or AppHUBs. These data centers are then connected with high capacity, low latency links. That high-performance core then interconnects to the network edge, which can be enterprise locations such as branches, manufacturing facilities, regional headquarters, data centers, and so on. This core network also interconnects with the cloud, connecting to the public internet, or directly peering with cloud data centers, such those operated by Microsoft where the vendor hosts Office 365.  ... A full security stack is also deployed to these commercial data centers. By distributing security and moving it out of the enterprise data center and into these distributed network nodes, a branch office simply goes to the nearest AppHUB to clear security there, and from there, it can go to the internet or to whatever SaaS applications these branches need to use, rather than having to go all the way back through the enterprise data center before they get out to the cloud.

8 guidelines to help ensure success with robotic process automation

The first step is to find out what really goes on day-to-day in your organization. It is very surprising how many variants of processing can build up. Use process mining, process discovery tools or consultants to figure out what you actually do in a process. Methods to do so might include extracting systems logs, or mouse clicks and keystrokes to find out how many ways an activity can happen and then eliminate the less optimal ways to automate the most common paths. Many different tools can be used to support automation, especially ones that have best practice processes already in them. Filtering to see if RPA should be used needs to start with understanding the process in order to then understand the choices of automation available in the short, medium and longer term. If people don’t know what they do or how they do it, they’re not ready to start with RPA. Standardized, repetitive, re-keying tasks of digital data is the optimal place to start thinking if RPA makes sense or not.

How Smaller Financial Services Firms Can Win With Open-Banking Disruption

financial services, disruption, open banking
Even though only nine of Europe’s largest banks are required to comply with PSD2, many small and midsize financial services – as well as their much-larger rivals – are warming to the idea of opening up their customers’ transactional data. Banks and insurers like the idea of using this information to propose more compelling lending options, credit lines, and investment services to their customers. But more importantly, their customers will have the power to dictate how their information is exchanged with other institutions to find the best way to manage their financial growth. According to Oxford Economics study “The Transformation Imperative for Small and Midsize Financial Services Firms,” sponsored by SAP, small and midsize banks and insurers seem to be on the right digital path towards open banking. Surveyed participants indicated that they are heavily investing in efficient, scalable, and connected technology that can help keep their data and systems more secure and support innovation. 

The Ethics of Security

The usual Black Mirror-style thought experiment (admittedly one not used in the 18th century) is to imagine you kindly drop by to visit a friend in hospital. On walking through the door, their new Benthamometer detects your healthy heart, lungs, liver and kidneys could save the lives of 5 sick people inside and your low social media friend count suggests few folk would miss you. Statistically, sacrificing you to save those 5 more popular patients is not only OK, it is morally imperative! It is the extreme edge cases of a utilitarian or statistical approach that are often the cause of algorithmic unfairness. If the target KPIs are met, then by definition the algorithm must be good, even if a few people do suffer a bit. No omelettes without some broken eggs! If you think this would never happen in reality, we only need to look at the use of algorithmically generated drone kill lists by the US government in the Yemen. Journalist and human rights lawyer Cori Crider has revealed that thousands of apparently innocent people have been killed by America’s utilitarian approach to acceptable civilian casualties in a country they are supposed to be helping.

Quote for the day:

"Leaders know the importance of having someone in their lives who will unfailingly and fearlessly tell them the truth." -- Warren G. Bennis