May 27, 2016

A Reference Architecture for the Internet of Things

When it comes to context management we first have to agree on a context situation for the fridge and an action that is sent to the fridge. The context management is complex on the power plant side but rather simple on the fridge. The power plant side can be seen as a black-box here because we will most likely have to integrate already existing systems that detect and predict peaks. Once a peak is detected the action for the fridges triggers and is passed to the thing integration that distributes it to registered fridges. The fridge then just receives the action, decides if it wants to cool (this can be implemented with simple time constraints in a first prototype) and replies to the power plant if it will cool or not. Similarly data management is very simple on the fridge, but more complex on the power plant side. 

Obama wants more cybersecurity funding and a federal CISO

"In particular," Daniel adds, "we believe it is critically important that we begin to address the underlying structural weaknesses that we have in federal cybersecurity by modernizing our underlying IT, by updating the governance structures that we have so that agencies can actually manage their cybersecurity more effectively by accessing much more common and shared services across the government, and investing in or people so that we have the adequate resources concentrated in the right places so that agencies can effectively carry out their cybersecurity missions." The budget proposal also expands on the government's efforts to transition to cloud-based systems, adopt provisioned services and move toward an agile software development model. At the same time, departments and agencies are shedding hardware as they consolidate data centers and incorporate shared services into their IT operations.

Designing For The Internet Of Emotional Things

Emotion-sensing technology is moving from an experimental phase to a reality. The Feel wristband and the MoodMetric ring use sensors that read galvanic skin response, pulse, and skin temperature to detect emotion in a limited way. EmoSPARK is a smart home device that creates an emotional profile based on a combination of word choice, vocal characteristics and facial recognition. This profile is used to deliver music, video and images according to your mood. Wearables that can detect physical traces like heart rate, blood pressure and skin temperature give clues about mood. Screens that detect facial expressions are starting to be mapped to feelings. Text analysis is becoming more sensitive to nuance and tone. Now voice analysis is detecting emotion too. Affective computing, where our devices take inputs from multiple sources like sensors, audio and pattern recognition to detect emotion, is starting to become a real part of our experience with technology.

The Internet of Things (IoT) – creating a whole new ‘place’ in marketing

With increasingly sophisticated Generation Y customers, with a clear understanding of what they want, companies able to provide an exceptional, flexible and agile product or service configuration platform can by-pass their intermediaries, by allowing the customer to do for themselves, what the intermediary may have done for them. But there’s more. Advanced and predictive analytics can directly include the buyer in every stage of the production process at the touch of a button – so you can not only see how the product is coming together…but where the components are in the supply chain (and even change them if you find something better) – to truly customise your product or service. The ubiquity of sensors is increasing all the time. Cost has dropped significantly making them much more viable for lower value ‘devices’ which means individual components can be IoT enabled.

What the heck is RegTech?

One of the main areas for potential disruption through RegTech is the communication between different systems, be it internally between existing ones or with new systems, or between different institutions. Most financial institutions work with legacy systems that have been tweaked and amended over several years to become individual configurations that struggle to talk to other systems. A senior IT colleague ones told me that overcome these issues would be like a heart transplant surgery, where the old one basically needs to be removed first before the new one can take its place only that it would be like replacing several hearts at the same time. However, new regulation and notably MiFID II is going to bring challenges, in particular with respect to reporting requirements and the management of data for firms and service providers that will make significant investments in technology inevitable.

Steve Blank on the Tech Bubble: 'VCs Won't Admit They're in a Ponzi Scheme'

To back his point, Blank referred to a scene from the classic 1942 film, Casasblanca. In it, Captain Renault, the French head of police, orders the immediate closure of a cafĂ©, insisting he wasn't aware that gambling was occurring at the restaurant -- then, moments later, a lackey approaches him with his "winnings, sir." Blank isn't the only voice decrying the Silicon Valley tech bubble. The root of the problem, as Inc.'s Jeff Bercovici has detailed at length, is that investors are valuing more companies in the multimillion and billion-dollar range, though the risk is unlikely to pay off down the line. Many of these companies bring in little (sometimes zero) revenues, and often aren't profitable. Even the biggest names in tech boast valuations that are well-above their revenues: Uber's $50 billion valuation represented 100 times its sales, and Airbnb's $25 billion represented 28 times its sales, according to 2015 data from CB Insights.

Data Governance: Information Is the New Security Perimeter

The term “choose to allow” is used intentionally to indicate that if we have something of value, we need to apply appropriate management and protection. In other words, we need more than ever to apply data governance. Data governance is all about putting appropriate management and control directly over our information, no matter where it is. ... There is no point protecting my public author bio pic with the same security I would apply to a finance system. Data classification helps us appropriately categorize our information based on: Confidentiality—The required level of secrecy and cost impact of unexpected disclosure Integrity—How tolerant (or not) any section of the information can be to being changed or lost entirely Availability—How important it is to have timely access to the information when we need it Consent—Whether there are legal requirements or restrictions in place that impact where the information can go.

U.S. CIO aims to cut legacy spending, proposes IT modernization

In that sense, Scott explained, the proposal would take a page from the business world, where new capital expenditures are carefully vetted with a review committee examining the urgency of the project and the cost/benefit analysis. That would mark a fundamental shift in the traditional ways that the tech teams within government agencies, often operating in a silo, develop and execute IT projects. "Comprehensively, what it does is it marries management, money and a different mode of operation than the pattern that we've been in," Scott said. "This modernization fund relies on principles that we've borrowed from the private sector. If you're in the private sector, you go to a capital committee and you come in and make a business case for why you want to do what you're going to do."

Living in the Matrix with Bytecode Manipulation

Many common Java libraries such as Spring and Hibernate, as well as most JVM languages and even your IDEs, use bytecode-manipulation frameworks. For that reason, and because it’s really quite fun, you might find bytecode manipulation a valuable skillset to have. You can use bytecode manipulation to perform many tasks that would be difficult or impossible to do otherwise, and once you learn it, the sky's the limit.  One important use case is program analysis. For example, the popular FindBugs bug-locator tool uses ASM under the hood to analyze your bytecode and locate bug patterns. Some software shops have code-complexity rules such as a maximum number of if/else statements in a method or a maximum method size. Static analysis tools analyze your bytecode to determine the code complexity.

The real problem with Google's mobile messaging strategy

The underlying issue with the company creating new apps like Allo and Duo is that messaging platforms are useful only if your friends and family also use them. All the cool features in the world won't mean a thing if you go onto Allo later this year and find no one you know signed in and available to chat on it. In other words, Google's "more is more" messaging strategy depends on users continuing to migrate and adopt the latest newly branded offering (even when it confusingly overlaps with an existing option they'll also continue to need). As anyone who's ever tried to get family and friends to switch messaging apps knows, that's not something most typical users do regularly or willingly. And since these apps depend on your social circles embracing them in order to be effective, the situation rapidly turns into a self-defeating cycle.

Quote for the day:

“Make your team feel respected, empowered and genuinely excited about the company’s mission.” -- @TimWestergren

No comments:

Post a Comment