Open source is a disruptor that never quits. It seems to be penetrating and transforming every aspect of established data, analytics, and applications ecosystems. In a podcast recorded at IBM InterConnect 2016, Roger Strukhoff, executive director, Tau Institute for Global ICT Research, shares his expert perspective on how open source initiatives are transforming the Internet Of Things. Strukhoff responded to the following questions: How do you define the Internet of Things?; What is the most important open source initiative in the Internet of Things?; What will the Internet of Things landscape of 2020 look like?; You’ve described a “highly supple, flexible ecosystem of ecosystems” in the Internet of Things arena? ...
Watch the general session on ‘Digital Disruption in Financial Services’ where Jim Marous, owner and publisher of the Digital Banking Report, led a discussion with the following panellists on how digital transformation is driving the financial services industry. ... Digital transformation is lighting up across the industry, bringing new opportunities and opening up new markets – and demands a fundamentally new approach to thrive in a mobile-first, cloud-first world. What’s your plan for digital transformation? How will you transform and perform in this new environment, satisfying clients and shareholders alike? Watch the session to hear insights and thought-provoking conversations from your industry peers.
One of the most significant changes in the 2013 version of ISO 27001, a worldwide standard for Information Security Management Systems, is that it does not prescribe any approach in the risk assessment anymore. While it still requires the adoption of a process-based risk assessment approach (learn more here: ISO 27001 risk assessment treatment – 6 basic steps), the obligation to use an asset-threat-vulnerability model in the risk identification step no longer exists. While this approach in the standard provides more freedom for organizations to choose the risk identification approach that better fits their needs, the absence of such orientation is the source of a lot of confusion for organizations about how to approach risk identification.
Hiring a great team doesn’t start with posting a job ad. It starts with the company taking a hard look at its goals and the talent it needs to achieve those goals. As with anything surrounding data, the first step is to be clear on the questions that you want the data to answer and the challenges or goals you hope to address. No matter what size your business, don’t be afraid to start small and build your analytics as you go. Start with the questions in mind and identify the key performance indicators that will allow you to accurately judge when the questions have been answered. Then – and only then – start considering which team members can help you answer the questions.
Tighe said that the purpose of the trial is to understand the technology and assess how it can fit with Bank of Ireland’s legacy systems as a layer on top. “We see this as the start of a new concept, just like experimenting with TCP/IP in the early days of the internet. It may not end up like this but we see a strong technology that can help with transparency in transactions. “Crucially, it has to meet regulatory requirements. “It is the underlying technology that fascinates us and it could one day be an efficient way of transacting value between people and at the same time leave a transparent trail of information.”
Of course, Linux isn't the right operating system for all embedded devices. After all, the Linux kernel keeps growing. Therefore, Torvalds said, "If you're doing something really tiny, like sensors, you don't need Linux." But that still leaves a lot of room for big embedded Linux devices. In particular, Torvalds sees Linux playing a large role in the IoT because "you also need smart devices. The stupid devices talk different standards. Maybe you won't see Linux on the leaf nodes, but you'll see Linux in the hubs." Personally, Torvalds added, "I'm never been very interested in very small OSs. I liked working with hardware. But, if it doesn't have a memory management unit, I don't find it that interesting."
The future CIO will be expected to understand how every department will use technology tools and ensure a return on investment is achieved. The myriad of services out there makes this even harder. The challenges CIOs face when making purchases are exacerbated further by the different options available for the same service. Organisations can choose to use a managed service provider or OEM to complete an install. Buying from an OEM direct may seem like the cheaper option, but when you throw in added support costs and any maintenance, costs can quickly escalate. Pressure on CIOs to reduce capital spend is forcing the issue further. The latter is winning the capex vs. opex debate as IT budgets continue to be spent on technology for use across the business.
Companies that thrive in the digital economy are 26 percent more profitable than their industry peers. These companies are thriving by improving customer experiences, optimizing operations and creating new business models—all through superior digital expertise and leadership. The 26 percent profit differential will shrink because the digital laggards will fall by the wayside, leaving the digital winners to compete among themselves. This is not as grim as it sounds: There is still time for the digital laggards to catch up … but not much time. We are already seeing the impact on the competitive landscape. According to R “Ray” Wang, principal analyst, founder and chairman at Constellation Research, half of the Fortune 500 companies on the 2000 list have since fallen off as a result of mergers, acquisitions and bankruptcies due to a failure to adapt digitally.
As the bitcoin ecosystem has grown over the past few years, privacy concerns seem to have been pushed to the backburner. Many early bitcoin users assumed that the system would give them complete anonymity, but we have learned otherwise as various law enforcement agencies have revealed that they are able to deanonymize bitcoin users during investigations. The Open Bitcoin Privacy Project has picked up some of the slack with regard to educating users about privacy and recommending best practices for bitcoin services. The group is developing a threat model for attacks on bitcoin wallet privacy. ... A multitude of systems and best practices have been developed in order to increase the privacy of bitcoin users. Dr Pieter Wuille authored BIP32, hierarchical deterministic (HD) wallets, which makes it much simpler for bitcoin wallets to manage addresses.
But when you’re exercising power in an ongoing employment relationship, you should care a great deal about how the terms you dictate and the tactics you use make people feel. Their attitude toward the organization and you, their manager, directly affects the value they deliver as their part of the bargain. This is especially true when you’re dealing with geeks. The work they do requires engagement, creativity, dedication and commitment. It follows, then, that negative feelings can cost a great deal in productivity and quality. A developer who feels that she is being paid less than her equally capable peers is unlikely to think creatively day and night about how to better architect your system. A support technician who fears that his job may be converted to a contract position is thinking more about where to get a new job than about how to make a user feel good.
Quote for the day:
"The only way to discover the limits of the possible is to venture a little past them into the impossible." -- Arthur C. Clarke