May 16, 2015

Baidu’s Artificial-Intelligence Supercomputer Beats Google at Image Recognition
The new computer, called Minwa and located in Beijing, has 72 powerful processors and 144 graphics processors, known as GPUs. Late Monday, Baidu released a paper claiming that the computer had been used to train machine-learning software that set a new record for recognizing images, beating a previous mark set by Google. “Our company is now leading the race in computer intelligence,” said Ren Wu, a Baidu scientist working on the project, speaking at the Embedded Vision Summit on Tuesday. Minwa’s computational power would probably put it among the 300 most powerful computers in the world if it weren’t specialized for deep learning, said Wu. “I think this is the fastest supercomputer dedicated to deep learning,” he said. “We have great power in our hands—much greater

Taking our breach response plan for a test-drive
One thing that we security managers can be sure of is this: There is no guarantee that our company will not suffer a security breach. In fact, the odds are increasing all the time, helped along by the proliferation of mobile devices, companies’ heavy use of software as a service and the consumerization of IT. And let’s face it: Creating a culture that fosters innovation and attracts talent exacts a cost in defensibility. Recognizing that a breach could very well lie in our future isn’t the same thing as surrendering. When something is nearly inevitable, you should prepare for it. That’s the philosophy behind disaster recovery, and I think it should apply to data security as well. So, just as we do testing for disaster recovery, why not do a trial run of our breach response?

A Hadoop data lab project on Raspberry Pi - Part 1/4
This four part blog will provide a step-by-step guide for the installation of open source Apache Hadoop from scratch on Raspberry Pi 2 Model B over the course of the next three to four weeks. Hadoop is designed for operation on commodity hardware so it will do just fine for tutorial purposes on a Raspberry Pi. We will start with a single node Hadoop setup, will move on to the installation of Hive on top of Hadoop, followed by using the Apache Hive connector of the free SAP Lumira desktop trial edition to visually explore a Hive database. We will finish the series with the extension of the single node setup to a Hadoop cluster on multiple, networked Raspberry Pis. If things go smoothly and varying with your level of Linux expertise, you can expect your Hadoop Raspberry Pi data lab project to be up and running within approximately 4 to 5 hours.

Auditing Is IGA’s New Kid on the Block
There is a lot that IGA can learn from SOD controls monitoring. A great, practical example is how auditing has started to appear in IGA products over the last two or three years. Of all the capabilities identified for our critical capabilities research, auditing was one of the most forward-looking for IGA even though such capabilities have been commonplace in SOD controls monitoring products for a number of years. The essence of auditing in IGA is the ability to identify issues with access or data, assign owners to the issues, and then provide a framework for resolving the issues. The framework for resolving issues is usually provided through some type of case management interface, although some products make use of their general workflow capabilities to simulate case management activities.

For Venom security flaw, the fix is in: Patch your VM today
The first thing many of you think when learning this is: "Who cares, I've never used a floppy drive on my virtual machine (VM)!" Ah, but, you don't have to activate the virtual floppy drive for a potential hacker snake to bite you. By default, the legacy floppy drive code is still in there, even though it's never been used. The corruption is still hiding in the code. So, even though you'd never dream of using a VM floppy drive, you're still open to attack. Indeed Crowdstrike maintains that "even if the administrator explicitly disables the virtual floppy drive, an unrelated bug causes the vulnerable FDC code to remain active and exploitable by attackers." Therefore, if you are running QEMU, or virtualization stacks that use it, such a Xen, KVM, and Oracle's VirtualBox, you could be hacked.

10 common SQL Server problems and solutions
This handy two-page list outlines 10 familiar SQL Server problems and an assortment of solutions. From "Out of Space" errors to a database going suspect, this list is great quick reference for every SQL administrator. ... You may need to follow a large chain of blocks to find the head. Once there, you can use the dbcc inputbuffer command to see the SQL statement that the SPID is running. This will point you toward the problem's cause.Join this ongoing discussion and let us know if this download provides helpful information and if there's anything we can do to improve the document's format or content.

Even Robots Now Have Their Own Virtual World
“We are trying to mimic reality as closely as we can,” says Nate Koenig, CTO of the Open Source Robotics Foundation, which is developing Gazebo, and who has spent the last decade leading its development. “The goal is to easily switch over to a real robot.” Gazebo is part of the Robot Operating System, free and open-source software for controlling various parts of a robot. Because roboticists contribute code back to the ROS project, the operating system has gained considerable momentum as a platform for robot development, especially within academia. Gazebo and ROS are being used to develop many other types of hardware. A researcher in Switzerland, for instance, is using the software to develop an autopilot system for quadcopter aircraft.

ANXPRO Exchange To Include Aten “Black Gold” Coin In 2015
“We are looking forward to offering the Aten “Black Gold” Coin for trade on ANXPRO. The Aten “Black Gold” Coin has a built-in, anti-money laundering control system and is unlike anything in the market today, ” said Lo. “We feel that the NAC’s dedication to AML regulatory practices is similar to our values at ANX. This new crypto-currency simplifies the management of customer identities and our record-keeping requirements.” Marcus Andrade hopes that his company will help to do away with any negative perceptions currently attached to digital-currency like Bitcoin. He said that the NAC is in the process of creating a database only for government officials and banks so they can see the transactions of its clients. Additionally, all governmental entities using the system will be verified.

Microsoft: It's time to shoot the lawyers
Microsoft isn't comfortable releasing products until they are a pain in the axe. Ed describes it thusly: "I blame the lawyers. Every time the discussion turns to anything close to licensing, they bury it in ... fertilizer." ... Microsoft, too, has a core, unwritten mission statement, which I would describe as: "Microsoft builds incredibly deep, powerful, and flexible software products that -- before they see the light of day -- must be infused with a level of unnecessary inconvenience, incomprehensible restrictions, and regressive policies such that all possible joy has been removed prior to customer contact." If Nadella wants to compete in a world with Amazon, Apple, and Google, it's probably time to shoot all the lawyers. Otherwise, there will be no joy in Redmond.

Using Technology To Humanize Finance
“Banking is necessary – banks are not.” Bill Gates said this in 1994. It was a bold statement to make at the time, and one that some have associated with the start of a transformation in financial technology. Now, two decades later, we are seeing this revolution unfold before our eyes.... It is one where large, traditional banks are increasingly facing heavy competition from new entrants – namely, online marketplace lenders – that are delivering a more human lending experience through the technology, transparency and trust that consumers want from their financial services providers. In a March report titled “Future of Finance,” Goldman Sachs analysts Ryan Nash and Eric Beardsley noted that regulatory changes and new technologies are among the top factors reshaping the traditional banking sector and enabling the rapid growth of marketplace lending.

Why analysts should take a predictive approach to problem solving
Skills are needed all around for advanced analytics. This skill set sometimes requires knowledge of recent data-related technologies such as Apache Hadoop. It can require knowledge of analytics techniques and how to use them. On the analytics front, vendor tools are becoming easier to use. Interfaces are easier to navigate than previous versions. Some tools can take data and decide which models make sense once outcome variables are specified. Some tools can even determine appropriate models and then automatically put together the story as output. However, many organizations realize that this behavior doesn’t negate the need for people who can frame a problem, interpret the output of an analysis and communicate the results.

Quote for the day:

"Measurement is fabulous. Unless you're busy measuring what's easy to measure as opposed to what's important" -- Godin

No comments:

Post a Comment