April 07, 2015

Digital agenda streamlines public sector in Norway
As the name implies, DAN is inspired by the Digital Agenda for Europe framework but is tailored for Norway’s own priorities and challenges, including a small domestic market and a sparsely populated country. It is also a continuation of earlier ICT policies such as the eNorway program introduced in 2000. This long-term approach is starting to bear fruit. Almost 60% of Norwegians are eGovernment users, while the corresponding EU average is 33%. In the Norwegian Tax Administration alone the country’s "digital by default" scheme has pushed the number of electronic services users from less than 900,000 in 2014 to 3.4 million in 2015. Not bad for a country with a population of 5.1 million.

The Network Intelligence Movement Will Add Personal Context to the Online World
The movement is called “network intelligence,” and it’s a reimagining of the term that originally referred to the technology used for data analysis. This new movement focuses on people, and builds on the rise of business intelligence and analytics in both startup and corporate environments. New products built to harness network intelligence will allow for the analysis of relationships between members of a network and their specific skill sets to help achieve business objectives. These products will bridge the gap between business intelligence analytics and goals by adding people back into the equation. After all, every organization is built upon smart and connected people.

A CISO reveals why the cloud is your secret weapon for faster, better, and cheaper PCI audits
As Joan explains, “Bernie Madoff worked from a big NYC skyscraper. The building provided great security. He ran a total scam.” In the cloud, a hacker can run a scam on a “certified” AWS instance. The key is to look deeper and understand what the company is doing with your data. Joan points out that the certification of the underlying platform, however, is valuable. “We call it an unbroken-chain of paperwork. One of the things that made my audit easy. Physical and network security was AWS. They admit they’re responsible for that. Now the other 10 sections are my responsibility.”

How can privacy survive in the era of the internet of things?
Usman Haque is the founder of Thingful, which he calls a search engine for the IoT. It documents IoT devices around the world, categorising them by function, so that you search for, say, air quality in Manhattan. Haque says that people should be able to set policies governing which devices can talk to the devices that they own, and what information is shared about them. “I can make data available in real-time to my doctor, but I might delegate access to monthly figures to my mother,” he explains. “And I might be happy to participate in a medical study where I give the years’ aggregate data. So privacy has to be granular.”

The Security Concerns of SSL / TLS Encrypted Traffic
The challenges of SSL/TLS as a cover currently fall broadly into two categories: malicious activities that are directed towards enterprise servers and the malicious activity directed towards enterprise workstations, mobile devices, tablets, etc. The former consists of attackers generating application DDoS, like the application attacks that make up the Open Web Application Security Project (OWASP) Top Ten. The latter consists of malware that arrives from infected SSL/TLS servers on the Internet (such as music swapping sites, adult sites, etc.,) or via email malware/scamware that accesses the enterprise server through personal email use.

Critical infrastructure commonly hit by destructive cyber attacks, survey reveals
Trend Micro chief cyber security officer Tom Kellermann said the Americas research should serve as a wake-up call that critical infrastructures have become a prime target for cyber criminals. “These groups have escalated their attacks by leveraging destructive campaigns against the infrastructures of the Western Hemisphere," he said. Kellerman said Trend Micro hopes the findings will serve as a catalyst to motivate and encourage necessary change. OAS Inter-American Committee against Terrorism executive secretary Neil Klopfenstein said governments in the Americas and around the world must recognise the serious vulnerabilities inherent to critical infrastructure and the potential for grave consequences if not properly secured.

How the current intellectual property landscape impacts open source
Understanding the business model of the client is especially important so that the technical solution developed by the IT professional matches the business goals of the client. ... Not all open source licenses are created equal. This includes understanding the fact that the underlying power of the open source license actually resides in copyrights; the very monopolistic vehicle that allows the open source license to be enforced ... It seems that the Intellectual Property system is getting away from the original Constitutional mandate to “To promote the Progress of Science and useful Arts, by securing for limited Times to Authors and Inventors the exclusive Right to their respective Writings and Discoveries.” United States Constitution, Article I, Section 8, Clause 8.

Why You Should Start a Brain Technology Company
If effective, these new therapies could even, some argue, bring about the end of disability.  Some believe that developing such interfaces will require advanced brain implants that are still a decade or more away. More recently, though, neuroscientists—as well as a legion of “brain hackers”—have turned to powerful new sensing, processing, and prototyping tools to explore a host of non-invasive techniques to stimulate the brain. Some of these methods, proponents say, could benefit not only patients who suffer from disease or injury, but also healthy individuals, who would be able to learn faster, acquire better math skills, improve their memory capabilities, and even boost their creativity.

Microservices For Greenfield?
One of the ways in which we handle the complexity of deploying multiple separate services for a single install is by providing abstraction layers in the form of scripts, or perhaps even declarative environment provisioning systems like Terraform. But in these scenarios, we control many variables. We can pick a base operating system. We run the install ourselves. We can (hopefully) control access to the machines we deploy on to ensure that conflicts or breaking changes are kept to a minimum. But for software we expect our customers to install, we typically control far fewer variables. We also ideally we want a model where each microservice is installed in it's own unit of operating system isolation. So do our customers now need to buy more servers to install our software?

AI Doomsayer Says His Ideas Are Catching On
It’s a very, very small existential risk. For it to be one, our current models would have to be wrong—even the worst scenarios [only] mean the climate in some parts of the world would be a bit more unfavorable. Then we would have to be incapable of remediating that through some geoengineering, which also looks unlikely. Certain ethical theories imply that existential risk is just way more important. All things considered, existential risk mitigation should be much bigger than it is today. The world spends way more on developing new forms of lipstick than on existential risk.

Quote for the day:

"In matters of style, swim with the current; in matters of principle, stand like a rock." -- Thomas Jefferson

No comments:

Post a Comment