Daily Tech Digest - November 13, 2016

Agile Sailors - A Journey from a Monolithic Approach to Microservices

“Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization's communication structure” Conway argues. What did we learn from reviewing our current state by then? How did we set both structures in motion? What did we plan for and what did we actually achieve? One of the first lessons we drew from Conway´s Law was the following: changing to innovative products and short time-to-market cannot be done by relying on technological changes only. Instead, organizational changes and technology have to go hand in hand. Both dimensions need to be inspected and adapted accordingly. Although this sounds simple in concept, transforming our set-up as well as our mindset took us long and is still top on our menu.


What is OData? REST Easy With This Quick Guide

OData is a REST-based protocol for querying and updating data. It is built on technologies like HTTP, ATOM/XML, and JSON. It is more flexible than other REST-based web services and provides a uniform way to describe the data and the data model for easy interoperability between data sources, applications, services, and clients. Similar to ODBC and JDBC, OData gives you a single way of accessing various data sources. Consumers of OData master one API and use it to consume multiple data sources. As a producer, OData relieves you from spending your resources to defining and maintaining data access and discovery API. OData is an OASIS standard and is beginning the standardization process with ISO. It defines the best practice for building and consuming RESTful APIs.


Next Generation Firewall Bypass Tool: FireAway

Fireaway is a tool for auditing, bypassing, and exfiltrating data against layer 7/AppID inspection rules on next generation firewalls. These tactics are based on the principle of having to allow connections to establish through the NGFW in order to see layer 7 data to filter, as well as spoofing applications to hide communication channels inside the firewall logs as normal user traffic, such as Internet surfing. Typically the FireAway server would be started on the egress side of the firewall (such as a server on the Internet), and listen on a port believed to be closed to see if any application based rules allow traffic out on this port ... All data received by the server on this port will be saved to the file ReceivedData.txt in the directory the server was launched from.


A Software Product Vs Project

In short, a software Project is all about to execute a Statement of Work of an internal or external customer, where what customer required is right irrespective of what is ideal or what the end user would expect. Though some projects are scoped in such a way that certain aspects of non-functional requirements are left to the choice of the project teams. Product development isn’t about implementing what the customer wanted to. In product development, the product manager owns and comes up with the product requirements. A large product or product suite, typically comprise of many projects and will evolve over time. Unlike a project the product will be improved continuously without an end date based on feedback from end users and the product team prioritizes what needs to be built next based on its perceived value for its target users or customers.


Understanding the CIO’s Role in Security

The CIO should take charge for two reasons. First, he or she is in the best position to understand the complexities and specifics of the IT infrastructure and services that run the business. This level of understanding allows the CIO to consider all implications, even those stemming from or affecting operations, technology and events outside the enterprise. Secondly, CIOs are often held responsible for high-profile breaches. This extra pressure is excellent motivation for a CIO to make enterprise security a personal top priority. Specifically, the CIO’s role in security should extend to three different areas to maintain a strong security posture.


Why Cultural Change Is Necessary For Big Data Adoption

Big data is transforming businesses across industry sectors — from industrial systems to financial services, from media to health care delivery, from drug discovery to government services, from national security to professional sports. The opportunity to deploy data and analytics has accelerated the speed at which companies can enter new markets, with new solutions, and quickly challenge or displace traditional competitors and market leaders. Consider some of the firms which are at the forefront of the Digital Economy – Amazon, Google, eBay, Facebook, Uber, and Airbnb. These are firms that are rooted in big data and analytics, and have leveraged new data-driven business models to disrupt and transform traditional industries such as retailing, media, and travel.


A Warning for Fintech

At stake is the bank's continued relationship with many of its clients. Cyber attacks can prompt the most tech savvy customers to walk way: about 29 percent of U.S. millennials will close all accounts with a bank after a fraud incident, according to an October-November 2015 survey by credit scoring agency FICO. But the financial damage could spread far beyond Tesco. It's easy to imagine how the rising financial cost of cybercrime could damage the big selling point for fintech firms and challenger banks: being able to acquire customers and operate at a lower cost than established rivals. ... Protecting against cybercrime is about more than just spending of money on the right technology -- and it's also about having the right plan in place when a successful attack does get through.


Don’t let email attachments become your weakest link

Employees represent a business’s first line of defence against email threats, so they have a big responsibility to help protect data and keep the company secure. Most of the time, individuals are simply too busy or too ignorant of the consequences to consider for more than a second or two whether they should open a questionable email or attachment. The hackers are making it even harder for security teams because they know that at the beginning or the end of the day, when people want to get stuff done or get out the door, they are more likely to be fooled by an email attack. For this reason, there are often spikes of malicious activity early in the day or late in the afternoon.


The Impact Big Data Is Having How We Learn

One of the biggest technological advancements that has improved the quality of the learning tools we use is the aggregation and analysis of data. According to a report by the U.S. Department of Education, “Big data captured from users’ online behaviors enables algorithms to infer the user's’ knowledge, intentions, and interests and to create models for predicting future behavior and interest.” Big data is empowering education companies to understand things they could not have previously. Companies like Edx are using that information to determine what kinds of classes can be taught online and which are better suited to a classroom environment. When it comes to learning, there’s no doubt students have more options than ever before, learning at their convenience from home, the coffee shop, or the classroom.


5 Steps To Create A Culture Of Leadership

Creating a culture of leadership is a key component in your companies’ ability to grow year over year. It is not something that can be implemented; rather a culture of leadership evolves organically by taking the necessary steps and investing the time and resources that are required to create leaders not only at the top level, but throughout your organization. For a culture of leadership to exist, companies must first define it. This definition needs to be based on core leadership capacity principles and “must have” characteristics. These can be uncovered through internal reflection and an assessment of the company leaders which we discussed in our last article. However, culture should not be developed strictly through a top down approach.



Quote for the day:


"There is a difference between listening and waiting for your turn to speak." -- @SimonSinek


No comments:

Post a Comment