Daily Tech Digest - December 31, 2016

Who controls the marketing tech stack in 2017: The CIO or CMO?

Perhaps the most significant trend is that CIOs are facing ever-tougher competition today for their internal customers. In an earlier era, one simply had to go through the IT department to get the technology one needed that would actually work with the existing infrastructure, technology standards, and enterprise architecture. No longer. The cloud and especially software-as-a-service (SaaS), has changed this equation forever. Every IT department is now faced with the most formidable possible day-to-day competitor: The combined services inventory of the entire SaaS industry, along with all the available mobile and enterprise app stores. These new sources of marketing IT collectively represent to the CMO ... a genuine explosion of new options, going from a mere 150 business-ready marketing apps in 2011 to over an astonishing 3,500 in 2016.


Blockchain technologies entered the trough of disillusionment in 2016

More importantly, digital assets are designed for today’s era of digital information, and the underlying blockchain technology has the power to completely overhaul the current financial system, making it more efficient, transparent and accessible. When taking a look at the industry over the last 12 months, the first quarter of this year saw total investment in blockchain startups topping a staggering $1 billion. But that investment is starting to pull back. In the first nine months of 2016, blockchain startups raised $429 million across 92 equity financings. Compared to the same period in 2015, the deal activity fell this year by 16 percent, and funding was down by 7 percent. And we are already seeing some of this reticence play out in the market. For example, just last week, Circle announced they were pivoting away from the buying and selling of bitcoin through their wallet app.


10 Things InfoSec Pros Can Celebrate About 2016

According to an HP study earlier this year, the Android operating system is the second-most heavily targeted operating system with the second-most vulnerabilities, after Windows. Fortunately, in July, Google announced new measures to increase memory-level protections and reduce the overall attack surface of Android’s Linux kernel. ... It's no secret that breaches cost companies a pretty penny, but so often the costs are residual -- lost business, breach notifications, fines for late breach notifications -- but not punishments for the bad security itself. This year, however, some companies felt an extra sting for failing to protect their customers in the first place. ... Congratulate the San Francisco Municipal Transit Agency (SFMTA) for sticking up to ransomware operators, despite most likely losing money in the process. Instead of paying their $73,000 ransom demands, SFMTA gave passengers free rides at affected stations for days while they dealt with the situation.


IT mindset: CIOs, tech departments work to overcome the 'IKEA effect'

That's easier said than done, of course. Getting themselves and their IT departments to adopt those ideas requires a shift in IT mindset, which, in turn, calls for a fair bit of psychology. Interviews with CIOs and organizational experts, however, suggest that change is indeed possible -- with a regimen that includes rethinking cherished beliefs and working to overcome barriers that impede a new work culture. Atilla Tinic, CIO at Level 3 Communications, has an educational background in IT, with a focus on software development, economics and psychology. He says, somewhat facetiously, that the last degree sometimes proves the most valuable. "It might be the psychology that helps me the most at times," he said. "Change management is one of the hardest things [and] I think the IT transition might be one of the most challenging."


Citizen Data Scientist, Jumbo Shrimp, and Other Descriptions That Make No Sense

Data scientist often frames a question into its business value and data context. It makes question more readable. Those questions could go in several different levels so rather than asking it all in one, the question itself could be break down into smaller business questions. There are methods to further reduce complexity by dimension reduction, variable decomposition or principle component analysis, etc. There are many analytic algorithm and modeling options. Choosing a proper algorithm could be a challenge. The alternatives are to run large number of algorithms to search. With that, large number of results will need to be analyzed. Interpreting results is a complex task. By running a large number of algorithms, the results tend to partial converge or partial conflicting. The conflict resolution and the weights of the variables require further modeling or ensemble.


Expect Deeper and Cheaper Machine Learning

“Everybody is doing deep learning today,” says William Dally, who leads the Concurrent VLSI Architecture group at Stanford and is also chief scientist for Nvidia. And for that, he says, perhaps not surprisingly given his position, “GPUs are close to being as good as you can get.” Dally explains that there are three separate realms to consider. The first is what he calls “training in the data center.” He’s referring to the first step for any deep-learning system: adjusting perhaps many millions of connections between neurons so that the network can carry out its assigned task. In building hardware for that, a company called Nervana Systems, which was recently acquired by Intel, has been leading the charge. According to Scott Leishman, a computer scientist at Nervana, the Nervana Engine, an ASIC deep-learning accelerator, will go into production in early to mid-2017.


How AI is Revolutionizing Business Models

Most of the considerations made so far were either general or specific to big players, but we did not focus on different startup business models. An early stage company has to face a variety of challenges to succeed, and usually, they might be financial challenges, commercial problems, or operational issues. AI sector is very specific with respect to each of them: from a financial point of view, the main problem regards the absence of several specialized investors that could really increase the value of a company with more than mere money. The commercial issues concern instead the difficulties in identifying target customers and trying head around the open source model. The products are highly new and not always understood, and there might be more profitable ways to release them.


How Will Big Data Evolve in the Year Ahead?

"Near-term opportunities for cognitive systems are in industries such as banking, securities and investments, and manufacturing," IDC program director Jessica Goepfert said in an October statement about a report on global cognitive computing and AI spending. "In these segments, we find a wealth of unstructured data, a desire to harness insights from this information, and an openness to innovative technologies." In its report, IDC predicted that healthcare and manufacturing will be the biggest drivers of cognitive computing and AI revenues between now and 2020, while the education sector will also invest heavily in such technologies. Earlier this month, Tony Baer, principal analyst in information management at Ovum, predicted that machine learning in particular "will be the biggest disruptor for big data analytics in 2017." That trend will also make it increasingly important for organizations to treat data science as a "team sport," he added.


What a Game-Changing Smartphone Would Need to Do Differently

The smartphone has become a commodity to us. You don’t need to own the latest and most expensive model of all, but you are very likely to use a smartphone. There is even a small group that owns and uses a variety of smartphones. But don’t you feel that product innovation has stalled for a while? What was really new in recent years? Bigger display, smaller frame, better camera, stereo speakers, waterproof casings? All really nice but did they really change the game? No. There has not been a disruptive innovation in the mobility area since Steve Jobs was around. Not that he hoarded all the ideas and was the only thinker of our time, but he was driving disruption and therefore he was also pushing the competing manufacturers to be innovative.


How Chatbots Talk Up IoT Measures in Analytics

Bot adoption is a confluence of two key technological and marketplace trends over the last few years. First, bots reflect the popularity of instant message platforms, a derivative of social media. Instant Messaging (IM) platforms include Facebook Messenger, Slack, WhatsApp, and Telegram. People have been steadily using these platforms. Back in 2015 Business Insider declared that IM platforms have more active users than any other internet application including social networks and email applications. Many bots are designed to complement services with these applications, in the same vein as being an extension for browser or an API for software. And many of the users access these applications on mobile devices, giving bot makers a dedicated avenue to connect with customers.



Quote for the day:



"Don't ever be afraid to admit you were wrong. It's like saying you're wiser today than you were yesterday." -- Robert Newell


Daily Tech Digest - December 30, 2016

3 reasons why #FinTech may decline in 2017

In my humble opinion FinTech is addressing a customer experience driven demand strongly supported by technical evolution such as mobile, cloud, big data, etc… Has the disintermediation of banks started? While the rest of the world is changing rapidly, banks are still struggling to survive the regulatory tsunami which has not ended yet. And FinTech became a real hype strongly attracting millennials to become part of it. Hipsters created start-ups to change the banking landscape. Venture Capitalists supported this evolution and heavily invested in the first waves of disruption. Isn't #FinTech disillusioned and will this not lead to a decline in 2017? And will enlightenment come from new kids on the block? Here are 3 reasons why "hashtag"FinTech may decline in 2017


Everything You Need to Know About Gene Therapy’s Most Promising Year

It sounds complicated, and it is. Gene therapy was first tested in a person in 1990, but scary side effects turned the gene-fix idea into a scientific backwater. And the field hasn’t conquered all its problems. We started the year with the tale of Glybera, heralded as the first gene treatment ever approved that sought to correct an inherited gene error. Yet the drug came with an eye-popping price tag of $1 million and, dogged by questions over how well it works, has turned into a medical and commercial flop. But scientists haven’t given up. And neither have biotech entrepreneurs. They’re closer than ever to proving that gene therapy is for real. Here’s what happened in 2016.


What's your CIO legacy? Deloitte has some ideas for you

Last year for its CIO Legacy Project, Deloitte researchers wanted to pinpoint the methods, tools and competencies CIOs used to create value for their organizations. "To a little bit of our surprise, there wasn't a lot of difference across industries and geographies," Kark said. Instead, they uncovered three roles that CIOs take on to do this -- the trusted operator is focused on operational excellence; the change instigator is focused on business transformation; the business co-creator is focused on revenue and growth. This year, researchers wanted to know what characteristics are associated with each of the three "pattern types," be it personality, leadership skills, working style or IT capabilities. They hypothesized, for example, that trusted operators would be more risk-averse and less outgoing than change instigators and business co-creators.


Test Systems — The Soft Underbelly of System Security

If you improve the security of your test systems, you can also help your Development and QA teams by providing a safe, well-monitored environment in which you can test and deploy updated applications, test applications to recently released security patches, and improve the overall understanding of the way your projects provide access to the outside world. In other words, improved security improves the QA ability of your systems by providing another valuable perspective on the development and execution of your systems. Increasing the isolation of a system should always lead to increased security, knowledge, and testability of that system — goals that will help to unite the QA/SRE, Operations, and Security teams. Given the importance of security, then, it is critical that you follow defined policies and procedures to ensure that your test systems are as secure as possible and don’t expose existing vulnerabilities or create new ones.


Automation, Analytics and APIs: How NFV is Driving Service Assurance Innovation

Investing in new-generation analytical capabilities that are optimized for today’s hybrid NFV environments will help CSPs to better realize the full value of their NFV investments. An example of such advancement is utilizing natural-language processing algorithms for eliminating data normalization and clean-up requirements in alarm data, and using machine-learning techniques to support advanced correlation and RCA, without the need to augment alarm data with network topology and reference information, and so on. This typically becomes an inhibitor to an analytics project’s success, as the data often isn’t readily available or requires a significant integration effort. Our recent efforts in this area have surpassed even our own expectations.


Why Employees Could Be the Biggest Threat to Healthcare Data Security

Businesses across industries are also incorporating bring your own devices (BYOD) into their corporate IT cultures. By doing so, employees are now able to work on the device or devices that they are comfortable using, while saving costs that would accompany providing work-sponsored devices. However, because of the ease of onboarding mobile device, including connected wearables, it has now become commonplace at some organizations for unauthorized devices to find a way to connect to the network. Sriram Bharadwaj, director of information services at the University of California (UC) Irvine Health in Orange, Calif., has said, "In the old days, you accessed electronic health records from a PC at your desk.


5 ways healthcare providers can transform chaos into order

The easy way out — investing billions of dollars to expand facilities, extend operating hours and add staff — seems out of reach for most healthcare providers and looks more like a bandage than a cure. In the past few years, we have worked with a number of large healthcare organizations to address this problem. Drawing upon our decades-long experience helping Fortune 500 companies make operational improvements, and by employing lean principles and predictive analytics, we set out to find the root cause of this operational paradox: Vital resources are often both overbooked and underutilized on the same day. Here are five practical approaches to improving patient access, decrease wait times and reduce healthcare delivery costs without embarking on multi-year, budget-stretching mega projects.


I, Robot: How AI is redefining the use of data in healthcare

Facing up to such a huge challenge, researchers are turning to the technological advancements that will allow them to bolster their analytical abilities, both in terms of handling volume and increasing accuracy. Acknowledging this opportunity, technology firms are more than happy to respond to the call for support. McKinsey's analysis of this space has recently suggested that the use of data handling strategies for pharmaceutical research could create up to $100bn in cost savings per year, and that is just in the US. The global potential for efficiency savings is huge. Today the data problem for pharmaceutical firms is not just the volume but also its organisation within their databases. Following years of merger and acquisition activity, different research departments often work in silos, cut off from sharing information effectively between them.


5 signs we're finally getting our act together on security

Security experts have been warning for some time about the millions of devices that are connected to the internet without even the most basic security features, so the Mirai attack shouldn’t have been a surprise. And with Mirai’s source code publicly available, it is safe to assume there are other IoT botnets waiting in the shadows to strike. With all these devices connecting to the internet, we are ripe for an IoT worm, said Lamar Bailey, senior director of security research and development at Tripwire. Fixing the problem will require a lot of coordination, creativity, and persistence, but perhaps people are actually seeing the risks. The silver lining is that the Mirai attack was a “fairly cheap lesson in what a compromised IoT [threat] would look like while there’s still time to do something about it,” said Geoff Webb, vice president of solution strategy at Micro Focus.


Will networks and security converge in 2017?

Service chaining provides a framework to address the basic security issues, but enterprises still face the challenge of creating instances of that service across hundreds of application, user types and sites. A high-degree of policy integration and automation is needed to make that enterprise WAN management feasible. SD-WAN and security parameters should ideally be defined and delivered through one interface. The necessary tools should then be able to push those policies out across the infrastructure. Many leading SD-WAN providers offer those capabilities, but even then the networking and security analytics remain separate. There is no way, for example, to minimize security alerts storms for security operations personnel by correlating security and networking information.



Quote for the day:


"The very exercise of leadership fosters capacity for it." -- Cyril Falls


Daily Tech Digest - December 29, 2016

4 Information Security Threats That Will Dominate 2017

"The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of trusted organizations," Durbin says. "In 2017, we will see increased sophistication in the threat landscape with threats being tailored to their target's weak spots or threats mutating to take account of defenses that have been put in place. Cyberspace is the land of opportunity for hacktivists, terrorists and criminals motivated to wreak havoc, commit fraud, steal information or take down corporations and governments. The solution is to prepare for the unknown with an informed threat outlook. Better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high-impact security events."


People Re-engineering

Some experts don’t like talking about “Crisis Theory” when talking about the “challenges” that the software industry is increasingly facing in today’s harsh business environment. If we look further into the yield of the industry for the last 5 years as expressed by the Standish Group CHAOS Report 2015, we should at least pause. I’ve seen debates from some expert watchers about the methodology used in gathering data and deriving results to produce this report. However, I still don’t think that there is much disagreement on the significance of the report to a wide sector of watchers and practitioners as a source of data on performance in the industry. I personally find that piece of work very representative of what I see on the ground during my daily practice.


Big Data, Crystal Balls and Looking Glasses: Reviewing 2016, predicting 2017

Despite media darling success stories, for most organizations this is probably a bit too much to wrap their heads around at this point. This is understandable, as the pace of change outperforms their ability to digest and keep up with it. As for developers, on either side of the fence (vendor or application developers), both the challenges they are faced with and the stakes are higher. Of course, none of this is all that new. IDC has called this the 3rd platform, but names aside, we've seen it all before: many riding the wave and few actually getting it, the .com boom and bust, initial resistance giving way to unquestioning convert, more or less successful unification of disparate frameworks in application server environments for enterprises, skill shortage and rock star developers, the long tail for people and organizations alike.


Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk

The new version of KillDisk encrypts the local hard drives of the machines it infects as well as any network-mapped folders shared across the organization, using RSA 1028 and AES algorithms, CyberX’s vice president of marketing Phil Neray said in a blog this week. The security firm’s reverse engineering of the malware sample showed it containing a pop-up message demanding a ransom payment of 222 Bitcoins or roughly $206,000 in return for the decryption key. Ransomware attacks on companies in the industrial sector could cause significantly bigger problems than similar attacks on companies in other sectors. For example, an attack that succeeded in locking up the operational data upon which physical processes rely could do serious and potentially even catastrophic damage to people and property.


2017 will be big year for AI thanks to tech giants

The technology will be the "backbone of many of the most innovative apps and services of tomorrow," but it remains a mystery for many people who will eventually see AI influence their daily lives, according to LeCun. "Increasingly, human intellectual activities will be performed in conjunction with intelligent machines," he wrote. "Our intelligence is what makes us human, and AI is an extension of that quality." LeCun also predicted that health care services and transportation will be among the first industries that AI transforms. "The most meaningful thing Facebook can do in AI in 2017 is to make their chatbots useful, as so far they are weak and lack slick utility," Moorhead says. "Consumers are using them a few times, see they don't do much well and stop using them."


5 unexpected sources of bias in artificial intelligence

While some systems learn by looking at a set of examples in bulk, other sorts of systems learn through interaction. Bias arises based on the biases of the users driving the interaction. A clear example of this bias is Microsoft’s Tay, a Twitter-based chatbot designed to learn from its interactions with users. Unfortunately, Tay was influenced by a user community that taught Tay to be racist and misogynistic. In essence, the community repeatedly tweeted offensive statements at Tay and the system used those statements as grist for later responses. Tay lived a mere 24 hours, shut down by Microsoft after it had become a fairly aggressive racist. While the racist rants of Tay were limited to the Twitter-sphere, it’s indicative of potential real-world implications.


The Rise of the Internet of Things (IoT)

Unless you have been living under the proverbial rock, you probably heard about a number of Internet of Things (IoT) attacks this fall, beginning with KrebsOnSecurity, then OVH, then the DDoS attack on Dyn DNS. All of this started with a bot called Mirai, and involved IoT devices. Why is this important? By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. A survey by HP indicates that about 70% of these devices have vulnerabilities, making them the perfect targets for botnets like Mirai. Below is a collection of 10 blogs written by industry experts on this topic, that will help you fully understand the implications of this botnet and what it means for the future of connected devices.


What To Do If Your Data Is Taken Hostage

Hopefully the information security team has already planned out a procedure to follow in the event of a ransomware attack. They should begin by notifying the authorities and applicable regulatory bodies. The plan identifies the organization’s recovery time objective (RTO), and recovery point objective (RPO) for data breaches. In the event that a backup exists, then cyber-forensic evidence of the incident should be preserved and documented for/by law enforcement. In the event that there are no redundancy systems or if the secondary systems are compromised, then the information security team can find and implement a vendor solution or decryption tool. In many cases, files may be partially corrupted or incompletely decrypted. Even if a vendor solution is a simple executable, the victim may not be able to assure that their system is not still compromised by inactive ransomware, backdoors, or other malware.


Navigating the Ins and Outs of a Microservice Architecture

Today, enterprises are moving toward a clean SOA and embracing the concept of an MSA within a SOA. Possibly the biggest draws are the componentization and single function offered by these microservices that make it possible to deploy the component rapidly as well as scale it as needed. It isn't a novel concept though. For instance, in 2011, a service platform in the healthcare space started a new strategy where whenever it wrote a new service, it would spin up a new application server to support the service deployment. So, it's a practice that came from the DevOps side that created an environment with less dependencies between services and ensured a minimum impact to the rest of the systems in the event of some sort of maintenance.


How To Minimize Insider Threats In Cyber Security

Dealing with inadvertent and malicious insiders is similarly hard, as it poses similar challenges. It requires a unique set of tools and practices to be implemented, and can only be done when company fully realizes and acknowledges the danger of insider threats in cyber security and how to combat them. All of this is due to the fact that insiders have legitimate access to sensitive data, with which they work on a daily basis. Therefore, it is very hard to distinguish any malicious actions on their part from the usual everyday routine. Whether your system administrator does regular backup or copies data to an external storage in order to steal it and sell it – there is almost no way for you to know. Moreover, it is also almost impossible to distinguish between deliberate malicious actions and inadvertent mistakes.



Quote for the day:


"Tact is the ability to describe others as they see themselves." -- Abraham Lincoln


Daily Tech Digest - December 28, 2016

Simplify your platform with IT systems management tools

What an IT manager should be looking for is a statistically valid prediction of what workloads will be like at a point in time rather than a simple straight-line analysis of what has happened in the past. One example is FreeStor from FalconStor; it applies advanced statistical methods to gauge how storage workloads are trending and enables managers to pre-empt problems. Again, don't forget the software. Workloads need to be packaged, provisioned and managed. That management needs to include workload portability across different areas of your IT platform. ... Then there are the IT systems management tools that try to do as much as possible. For people stung by the vast framework systems of yesteryear, you may be glad to know that today's big systems tend to be more granular and open, enabling quality systems to be plugged in wherever necessary.


Maintaining Data Security with Cloud Computing Options

Data encryption was also a key aspect of the cloud computing guidance. CSPs should know that it is still considered a HIPAA business associate if it only stores encrypted ePHI and does not have a decryption key. An organization is still a BA under HIPAA regulations even if it cannot actually view the ePHI it is maintaining for a covered entity or fellow BA. Data encryption can help reduce the risk of unauthorized access, but it is not enough by itself to maintain ePHI security, according to HHS. “Encryption does not maintain the integrity and availability of the ePHI, such as ensuring that the information is not corrupted by malware, or ensuring through contingency planning that the data remains available to authorized persons even during emergency or disaster situations.”


Ensuring Bitcoin Fungibility in 2017 (And Beyond)

The only way to know that your bitcoins are clean is to go to a centralized service and ask for a background check. Suddenly the value of your coins is being decided by a centralized party. Every platform accepting bitcoin could implement different policies for deciding which coins are clean or dirty. And exchanges in different legal jurisdictions (US, China, India, etc) are likely to have different policies. The bitcoins worth the most money would then be the bitcoins accepted everywhere. This means it's not enough to just ask one exchange for a background check, you have to ask every major platform whether or not they think you have clean coins. And a platform doesn't think that you have clean coins, their decision reduces the value of your holdings regardless of whether you actually use that platform – your coins cannot be traded with any of the platform's users.


Moving to the cloud? Three things to think about before you make the jump

Matt Peers, CIO at Linklaters, says the bringing together of systems and services is still a concern for IT leaders considering a move to the cloud. "I think there's a temptation to draw on the services of many different providers but that can create a huge integration challenge," he says. Peers says effective CIOs will create a balance, drawing on enough cloud providers to take advantage of the competitive tension, while at the same time avoiding the risk of having too many partners to manage. "You don't want to be forever chopping and changing between services," he says. This need for cloud control could lead to a new trend, where expert providers help mop-up the management concerns associated to on-demand provision. Moves in this direction are being made.


More people expected to adopt EMV technology in 2017, but how secure is it?

One big problem remains: While the majority of merchants have implemented EMV technology, the report found, most cards do not offer the more secure PIN card option. Chip technology is also called EMV, which stands for Europay, MasterCard and Visa, the companies that developed it in the 1990s. It has been the standard across much of the rest of the developed world for a decade, particularly in Europe and Asia. Storing data on a chip in theory makes the credit card more secure because it isn’t easy to produce counterfeits — a key problem with cards that store data on a magnetic stripe. This reduces point-of-sale fraud, which involves buying something with a fake credit card at a physical retail counter, but it doesn’t reduce fraud when purchases are made online.


Enabling Strategic HR

These are disruptive times for the Human Resources (HR) organization. HR finds itself at an inflection point due to various external factors, one of them being the current gap that usually exists between the digital experience outside of the workplace and how the HR customer (the employee, manager, contractor, retiree, etc.) interacts with their HR organization. Driven by their usually positive digital experience outside of the office, the HR customer is beginning to ask the question: “Why can’t my interactions with HR be at least as good?” We see an opportunity in the marketplace to explore how an experience-focused, information-driven approach to delivering HR services can achieve a great digital consumer experience, what we call the “digital workplace”. There are five key attributes of what could be considered a “great” digital consumer experience


Cybersecurity: Threat Intelligence and an integrated approach to security

The Chinese mentality has been that, “I need to manage everything as a whole”. It turns out we have over 700 managed service customers, managing over 1200 networks. So we have to pull the stuff together for our customers. And because of this, the assisting methodology we’re bringing forward to our devices is we have to have these things start playing together, either through communication for better dynamic security response, or in terms of better central alerting and management. The problem with most other companies is they’re fixing on their products but very few pure cybersecurity companies actually have their products speak to each other, that siloed mode, I can’t get this device to talk to that device, even though they’re from the same company.


What CIOs Want CEOs to Know About Data Security

The most important step toward data security begins at a fundamental level. One that ensures health data is transmitted to and from vendors, providers, health systems and patients in a safe and secure manner. Consider a hospital sending a patient’s lab results to a physician, or a vendor communicating with a patient or provider about information from a personal fitness device or app. These platforms are ripe for data breaches and, therefore, penalties, lawsuits and even high profile media exposure. Another major question that CEOs and CIOs must address is which data transmission solution is best for their specific organization. Currently a number of vendors, consultants, software programs, etc. are available that promise to help organizations address their data security issues. The best option for each organization will be based on a number of factors, including size, budget, IT staff, expertise and overall goals.


CIOs will thwart cybersecurity threats with behavioral analytics in 2017

It’s no secret that boards are loosening the purse strings for cybersecurity but CIOs will continue to struggle to balance their cyber investments against managing risks to their businesses. Put another way: The choice between what to buy, implement and tune first -- the shiny new behavioral analytics platform or the latest and greatest business email compromise stopper -- poses prioritization challenges many CIOs aren't accustomed to in this age of cyber warfare. Worrall says that even if their boards allocate more funds for cybersecurity, CIOs need to beware of budget abuse. Those who take the “sky is falling” approach become chicken little, he says. One advantage Worrall has working for a networking technology company is that his tech savvy board grasps the intricacies of cyber defense.


Why Cybersecurity Leapt From the Basement to the Board Room

Notably, under the proposed regulations, board or senior compliance officers would need to certify that their organization’s security controls are meeting requirements. This could potentially expose such individuals up to criminal liability if the claim is found fraudulent. ... While overall cybersecurity spending is on the rise, certain organizations aren’t putting a cap on how far. This year, Bank of America has implemented a “whatever it takes” approach to thwarting attacks, giving unlimited budget to its cybersecurity business unit. While there will surely be scrutiny to the effectiveness and ROI of how such (non) budgets are spent, it’s obvious that the C-suite has gotten the message. Lax security practices don’t just mean embarrassing headlines and lost customer confidence.



Quote for the day:


"All progress is precarious, and the solution of one problem brings us face to face with another problem." -- MLK


Daily Tech Digest - December 27, 2016

Industries Thrive On Cognitive Cloud

Referred to as “Cognitive on cloud”, this model delivers cognitive services running in the cloud that are consumable via representational state transfer (REST) APIs. These services are available as part of platform-as-a-service (PaaS) offerings such as Bluemix and can be easily bound to an application while coding. Using this approach, cognitive analytics such as voice (tone analyzer, speech-to-text) and video (face detection, visual recognition) capabilities enables quick analysis of petabytes of unstructured data. Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. In addition to this basic analysis, an organization must consider which cloud is cognitive enabled at the Platform-as-a-Service (PaaS) layer.


Could IT change control have prevented an IT deployment failure?

Build all configuration cleanup into IT change plans. Take the necessary time to flesh out a plan to address all related configurations for a specific maintenance task. IT teams typically should remove switch port configurations for decommissioned NICs, update firewall policies and groups when changing a server IP address, and remove domain name system records that are no longer in use. Managing the issue on a daily basis is the optimal approach to prevent IT configuration build up over time. Combat risk of larger change scope through a robust IT change control process. Teams dealing with live production systems fear the service impact of any change. A formal IT change control policy will lessen these unknowns. Thoroughly plan changes, formulate test and backout plans, have peer reviews, follow a set approval process, and schedule and communicate maintenance windows for all changes to critical systems.


After a big 2016, next year may be A.I. tipping point

"We are on the cusp of a change as big as when e-commerce hit," said Chris McCann, president and CEO of 1-800-Flowers.com, in an interview this fall. "It's giving us the opportunity to have such deep relationships with our customers that it'll be like the company hasn't existed before." This past May, Google showed how focused it is on A.I. during its annual Google I/O developers conference, unveiling A.I.-powered products like Google Assistant, its Google Home device, the Allo chat app and the Duo video chat app. And this past October, IBM president and CEO Ginni Rometty said during a keynote at the company's World of Watson conference that in the next five years, every major decision -- personal or business -- will be made with the help of IBM's Watson A.I. system. A statement like that takes a lot of confidence in advances coming in the technology.


How blockchain can create the world’s biggest supercomputer

One of the fields where centralized and cloud-based computing falls short is the Internet of Things, Sønstebø says. “As IoT grows the need for distributed computing becomes an absolute necessity,” he says. Latency in round trips, network congestion, signal collisions and geographical distances are some of challenges faced when processing data produced at edge devices in the cloud. “Devices need to be able to trade computational resources with each other in real time so that the computational load can be distributed,” he says. Some of the emerging lines of software will not be supported by centralized architectures at all, iEx.ec’s Fedak says, such as decentralized applications (DApps), which among others will power fog computing, distributed AI and parallel stream processing. “This class of application is extremely challenging because they’re both data and compute-intensive, and they don’t cope well with centralized infrastructure,” Fedak says.


The Full Spectrum: How a Visual Analytics Platform Empowers the Business

BI and analytics software can help uncover this story, but there are now hundreds of companies offering technologies designed to dig into data. This proliferation of tools is both a blessing and a curse. While competition breeds excellence, there are a few standards or best practices embraced across the board. As a result, the onus is on individual businesses to embrace and uphold policies that will enable the effective use of data in a responsible, governable way. One increasingly attractive solution for doing data right is to leverage a visual analytics platform. Unlike standalone data visualization tools (which can provide useful but sometimes misleading views of the enterprise), a visual analytics platform weaves together all the elements of a full technology stack.


Ransomworm: The Next Level Of Cybersecurity

To make matters worse, Nachreiner expects cybercriminals will mix ransomware with a network worm. Years ago, network worms like CodeRed, SQL Slammer, and more recently, Conficker were pretty common. Hackers exploited network vulnerabilities and tricks to make malware automatically spread itself over networks. “Now, imagine ransomware attached to a network worm. After infecting one victim, it would tirelessly copy itself to every computer on your local network it could reach,” he says. “Whether or not you want to imagine such a scenario, I guarantee that cyber criminals are already thinking about it.” Nir Polak, Co-Founder & CEO of Exabeam, a provider of user and entity behavior analytics, agrees that ransomware will move from a one-time issue to a network infiltration problem like Nachreiner describes. “Ransomware is already big business for hackers, but ransomworms guarantee repeat business.


When the Data Thief is a Company

Companies are particularly vulnerable to this type of attack when they often offer their data for free or at low cost to the public, but professionals a fee to access and use it on their own site or in other materials. What’s to be done? Companies that offer such online data stores for a subscription need to be ever vigilant about unusual traffic patterns that suggest a machine – not a human – is behind the wheel. The differences in use patterns between a crawler and an individual human researcher are easy to spot – if you’re looking for them. Behind the scenes, companies also need to pick any low hanging fruit: making sure that free or temporary accounts can’t be abused to siphon off reams of data and watching for patterns of abuse among registered and paying members. Application security flaws such as weak authentication and SQL injection should, of course, be patched.


Using big data for security only provides insight, not protection

Big data cheerleaders will say you can use this hindsight to fix the problems that let the hacker into your system in the first place. After all, since you know what went wrong, you can patch your system so that it doesn’t happen again, right? While that may be true – you may be able to prevent that specific problem from happening again – cybersecurity simply doesn’t work that way. The threat landscape is dynamic, with new technologies, and thus, new vulnerabilities, emerging every day. Additionally, hackers are like any other criminal: They are savvy, adaptable, and know how to play on human nature. They’re always going to find your weaknesses – and your biggest weakness is your own people, your trusted employees. Most hackers don’t break into systems through the back door. They get their hands on legitimate login credentials and, essentially, walk right in the front door.


Cloud data recovery is critical, but won't always come easy

Public cloud vendors focus more on the front end of the data issues, such as system availability and uptime, and less on recovery. They figure that making their systems available 99.999% of the time should enable users to work with needed information. However, glitches, such as a read/write error, arise, causing corporations to need to recover data. And typically, public cloud vendors offer rudimentary recovery functions. In addition, these vendors draw lines between their own and their customers' backup responsibilities, something not seen with on-premises backup systems. For instance, Microsoft Azure tries to restore customer data lost due to Azure outages, but won't attempt to restore data if users delete files or if files become infected by a virus. In response, more sophisticated ways to backup cloud applications are emerging. Vendors like Commvault Systems and Veeam Software have well-developed, on-premises systems that they are extending to the cloud.


How Zalando Delivers APIs with Radical Agility

As you know, REST is more an architectural style and does not really specify API design details. We need to have some standards in the API design practices to establish a consistent API look and feel. Ideally, all the APIs should look like they were created by the same person. That’s a very ambitious target, but our guidelines help. We recently open-sourced them and have already received external contributions. The API guidelines standardize easier things like naming conventions and resource definitions, but also includes more complex things like non breaking changes and how we want to do versioning. ... In the end, the more critical aspect is that all the different services that are part of the platform fit in an overall architecture where you have really clear, separated functions that can easily be orchestrated to build the business functionality that we have in mind.



Quote for the day:


"I believe that the only courage anybody ever needs is the courage to follow your own dreams." -- Oprah Winfrey


Daily Tech Digest - December 26, 2016

Corporate Boards Aren't Prepared For Cyberattacks

Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards. "Our country and its businesses and government agencies of all sizes are under attack from a variety of aggressive adversaries and we are generally unprepared to manage and fend off these threats," said Gartner analyst Avivah Litan, a longtime cybersecurity consultant to many organizations.


Keeping a lid on SaaS & infrastructure costs

As companies continue to adopt cloud services and create even more complex, heterogeneous IT environments, their asset management tools must evolve and expand to optimise on-premises hardware and software assets, and cloud infrastructure services. Costs for cloud infrastructure services and software running in the cloud need to be managed whether they are SaaS applications or Bring Your Own License (BYOL), whereby companies host existing enterprise applications in a cloud environment. The cloud presents license compliance risk in BYOL instances, as well as risk of substantial over-spending on subscriptions for SaaS applications and cloud infrastructure services. In fact, costs can easily spiral out-of-control if not closely managed. However, organisations can keep a lid on these costs with the right Software Asset Management (SAM) processes and tools.


CEP Patterns for Stream Analytics

Real-time streaming data sources and Internet of things has brought Complex Event processing to the spotlight. The ability to collect data from devices using sensors, improvement in data carrier services and the growth of secure transfer to a centralized location has given a kick-start to analyze different data patterns from the various device at a combination. Let us start by defining what an event is. An event is said to occur when something happens which needs to be known for inferring or taking some action. An event processing is a way to track the information of the events by processing data streams and determining a circumstantial conclusion from them. This is associated with events from a single source. Ex: When the temperature of the room is more than 45 c, is what I consider an event for me to lower the temperature of my Air Conditioner.


CIOs: How to be a business leader in three steps

Technology and data are changing how work gets done. The embrace of digital technologies by companies and their customers has created a climate ripe for CIOs to stretch their business leadership muscles -- or risk seeing their roles atrophy. Part of making the leap to "business co-creator," as Deloitte terms it, requires CIOs to educate the business on the technologies and IT governance standards that are the foundation of digital transformation. Here is Kark's three-step strategy for CIOs on how to be a business leader. His advice is bolstered by two survey participants -- Vittorio Cretella, CIO at food giant Mars Inc., and Johnson Lai, CIO at NuVasive Inc., a maker of medical devices -- who function as business leaders at their companies.


16 Tech Jobs That Have A Gender Pay Gap

Computer programmer showed the highest gender pay gap, at a massive 28.3%. In job duties, computer programmers differ from software engineers (whose gap is 6%) in that engineers are more involved in designing software, while programmers receive instructions from engineers and have a more executional role. Game artists, who create visual art for video games, were second on the list, with a 15.8% gap. And information security specialists, who help prevent and repair cybersecurity breaches, ranked third. If you’re familiar with wage-gap statistics, you might be wondering why Glassdoor’s numbers are lower than the widely cited 20% pay gap, reported by the Institute for Women’s Policy Research, a Washington, D.C. think tank. Both IWPR's and Glassdoor's numbers are valid—they’re different because they’re set in separate contexts. This explanation gets a little technical, but bear with me.


Your new PC needs these 15 free, excellent programs

More than a mere blank slate, a new PC is a fresh opportunity—a collection of components that, with the right software installed, could accomplish anything from balancing your household budget to helping to cure cancer. Yes, stocking your PC is an intensely personal task. Even still, some programs are so helpful, so handy, so useful across the board that we heartily recommend them to everybody. These are the programs you want to install on a new PC first. (Longtime readers may notice that the list has slimmed down significantly this year. There’s a good reason for that: The bevy of hassle-killing extras in Windows 10 has allowed us to finally retire perennial favorites like CutePDF and WizMouse.)


The top 10 mobile risks of 2016

Mobile devices had a booming 2016, with usage of iOS and Android handhelds growing steadily throughout the year. By contrast, desktop operating systems other than Windows 10 and OS X generally showed a decline in growth. In fact, last month Marketing Land reported that global mobile internet usage was higher than that of desktop systems as of October, and predicted that nearly 80% of internet usage will be mobile by 2018. As with any element of technology, more widespread usage leads to greater and more widespread threats, and mobility is no exception. Here's a rundown of ten mobile risks we experienced in 2016, as well as some solutions to prevent or protect your devices from them (where applicable).


Weird science! 10 strangest tech stories of 2016

Science and technology news usually takes a backseat in mainstream media coverage. Contemporary attention spans being what they are, technical topics are often deemed too obscure, or their implications too complex, for the average reader. That's a shame, if for no other reason than this: Pay attention and you can find deliciously weird stuff in the sci-tech section, with occasional forays into the truly bonkers. Here we take a look at 1o of the stranger stories of 2016, selecting for items that generally flew under the radar and/or those with odd implications for the future. Click on through for updates on weaponized display technology, erotic robotics, and a biotech initiative that literally defies death.


Software Is Eating The Food World

Snack vending machines are everywhere. Here's how they work. A vending machine company makes a deal with a company that wants to provide snacks to employees. The vending company sends a person around every week or every few weeks to re-stock the machine with items bought at wholesale, collects the money (which is split with the business owner) and makes sure the machine is working properly. Any food placed into an old-school vending machine must be durable. It has to survive for weeks at unpredictable temperatures, and also survive the drop when selected. That's why vending machine food tends to be non-fresh, unhealthy junk food. With most vending machines, there are two or three items that are most popular and other items that might be selected as a second or third choice only after the favorite item runs out. The vending company has no idea.


Technical developments in Cryptography: 2016 in Review

The biggest practical development in crypto for 2016 is Transport Layer Security version 1.3. TLS is the most important and widely used cryptographic protocol and is the backbone of secure Internet communication; you're using it right now to read this blog! After years of work by hundreds of researchers and engineers, the new TLS design is now considered final from a cryptography standpoint. The protocol is now supported and available in Firefox, Chrome, and Opera. While it might seem like a minor version upgrade, TLS 1.3 is a major redesign from TLS 1.2 (which was finished over 8 years ago now). In fact, one of the most contentious issues was if the name should be something else to indicate how much of an improvement TLS 1.3 really is.



Quote for the day:


"You'll never be a bigger person by trying to make someone else feel smaller." -- @LeadToday


Daily Tech Digest - December 25, 2016

Data Scientists Spend Most of Their Time Cleaning Data

Data scientists spend 60% of their time on cleaning and organizing data. Collecting data sets comes second at 19% of their time, meaning data scientists spend around 80% of their time on preparing and managing data for analysis. 76% of data scientists view data preparation as the least enjoyable part of their work 57% of data scientists regard cleaning and organizing data as the least enjoyable part of their work and 19% say this about collecting data sets. These findings are yet another confirmation of a very widely known and lamented fact of the data scientist’s work experience. In 2009, data scientist Mike Driscoll popularized the term “data munging,” describing the “painful process of cleaning, parsing, and proofing one’s data” as one of the three sexy skills of data geeks. In 2013, Josh Wills (then director of Data Science at Cloudera, now Director of Data Engineering at Slack) told Technology Review “I’m a data janitor.


Are bots set to be your next banker?

The global race for banks to be digital first is on, but it is early days still. Leading banks are in the process of learning how to take a mobile-first approach and re-imagine their customer experiences, from opening up a current account to buying a home or taking out a small business loan. While many have begun migrating their customers from the branch or call centre to their digital channels, it’s critical to take a country-specific view and carefully consider the cultural differences and preferences before deciding on the pace of change. The UAE could serve as an ideal test market, research from Google on the matter recently ranked the country as no. 1 in global smartphone penetration, with 73.8 per cent of consumers carrying smartphones. The UAE’s strong retail sector based upon it’s a growing middle class, surging consumer confidence in technology and increasing domestic consumption means there is major potential for digitisation.


Susanne Tarkowski on How Smart Contracts Can Add Value to Your Business

Smart contracts are applications ‘living on’ the Blockchain, and therefore can’t be censored. Simple, immutable and autonomous applications, basically. As Primavera de Filippi eloquently phrased it during her talk at OuiShare Paris 2016 “Smart Contracts are neither smart nor contracts...”. But ironically, smart contracts are however ideally suited to be… well… contracts! In essence, your contract, whether it’s a marriage contract or a freelance gig contract, becomes a self-executing application. The contract goes from being a static agreement to a living application. That’s tremendously exciting. What really turned me onto it was reading the “Lex Cryptographia” blog post by Justin Ranvier back in 2013, that’s when I realized the Blockchain, and smart contract technology more specifically, could be used to replace the government in its core function: security and dispute resolution.


What’s the Difference Between Consumer and Industrial IoT?

In theory, an IoT system should be expandable, allowing dynamic changes to its operation and include devices not provided by a single vendor. Consumer, commercial, and industrial IoT share attributes and are typically built on the same hardware and software platforms. That’s why IoT discussions tend to get murky, especially when delving into the details. For instance, smartphone and tablet apps tend to provide one way of querying and controlling devices. Windows and iOS PCs, on the other hand, generally run the heavier user interfaces, often providing management tools that would be cumbersome on the smaller, portable devices. The IoT devices and software basically differ in areas such as ruggedness and expected lifetimes, as well as who has access to data and how that data is made available to various parties.


‘Security Fatigue’ Can Cause Computer Users to Feel Hopeless and Act Recklessly

Security fatigue is defined in the study as a weariness or reluctance to deal with computer security. As one of the study’s research subjects said about computer security, “I don’t pay any attention to those things anymore…People get weary from being bombarded by ‘watch out for this or watch out for that.’” “The finding that the general public is suffering from security fatigue is important because it has implications in the workplace and in people’s everyday life,” cognitive psychologist and co-author Brian Stanton said. “It is critical because so many people bank online, and since health care and other valuable information is being moved to the internet.” “If people can’t use security, they are not going to, and then we and our nation won’t be secure,” Stanton said.


The role of the CIO in a digital age

The CIO is now expected to be an expert in user experience, security, customer centricity, journeys and behaviours. They are storytellers, evangelists and advocates of communicating the art of the possible, they are the voice of the customer and their role is far more commercial than reducing costs. Indeed, modern ‘IT’ functions also generate revenue as well as drive margin. They are ‘schizophrenic chameleons’…on the one hand grounded in strong engineering and process orientation skills and are champions of best practice and on the other they are risk takers, innovators, change agents and disrupters of traditional working models. In addition, they have been further challenged by the rise of the chief digital officer – who tend to be very customer focussed and have come about because of executive perception of legacy IT and a misunderstanding about what ‘being Digital’ really is…. in reality the best CIOs could equally be CDOs.


Transitioning into 'Machine Learnable' Data Management

The MDM to MLDM transition can have various business benefits. Some of them are: quicker procurement times due to closer & quicker material matches; increased market (regional/zonal/geo) penetration due to the much closer & faster accuracy of customer profiles, demographics and segmentation; automation of mundane stewardship activities which will lead to better business resource utilizations. The faster shelf replenishment of the higher revenue products for retailers, improving the e-commerce efficiency for e-tailers and maybe handling & procuring the right parts of a prototype from a vast set of suppliers to beat the competition on a launch. The benefits can be endless. All of this is made possible, as the system can now look at reducing the number of iterations that it takes to arrive at the right threshold based on business priorities and inputs.


We Don’t Need No Stinking IoT! Or Do We?

While countless headlines play up the potential security snafus of the Internet of Things, there is barely a mention of the its potential to improve the security of everything from schools to urban areas. Connected cameras or gunshot detection systems could instantly notify police that there is a sniper in, say, a school. The possibilities extend much further beyond connecting household gadgets and security. Many technology pundits believe we are on the cusp of a new industrial revolution, where devices can warn shop floor owners of potential problems before they occur while bolstering efficiency. In the near future, machines could even transact business with one another. But an average person is likely to only have a vague idea of the power of IoT technology.


How Location-Based Marketing Will Evolve in 2017

Location-based advertising and marketing technology has seen tremendous growth and improvement in 2016. Thanks to innovations in location intelligence, marketers can now leverage real-time data to better target consumers based on where they go, effectively measure how digital ads drive foot traffic into stores, and even connect the consumer journey from ad exposure to store visit to purchase data. Location intelligence is a massive industry. It allows consumer obsession with mobile devices to create significant amounts of data and insights that drive critical decision-making for a wide range of businesses. But since the space is still nascent, marketers should expect evolution in the year ahead. Here are five predictions for location intelligence in 2017:


How data science turns big data into ROI

Big data is the business buzz word of our era, bandied around at conferences and in the press as the universal panacea. However, data on its own is not the answer. As an unprocessed asset data is a cost centre, not a source of profit. Where the ROI lies is in what you do with the data and how you leverage it to drive business decisions, and the answer to that lies in data science.  Long the preserve of academics and rocket scientists, data science is now front and centre of business strategy and is one of the fastest growing areas of technology. Using advanced statistical techniques to extract value from data can be transformational for businesses, boosting existing revenue streams, creating entirely new sources of revenue and identifying areas of inefficiency and waste.



Quote for the day:


"You think you can win on talent alone? Gentlemen, you don't have enough talent to win on talent alone." -- Herb Brooks, Miracle


Daily Tech Digest - December 24, 2016

Smart Homes: Are the Security Risks Worth It?

Early smart home systems have some serious security flaws that have come to light within the last few years. Trailblazing smart home manufacturers have been more concerned with innovation and getting their products to market than in keeping up with the latest developments in cyber security. These companies often neglect even the basics of keeping their smart home systems safe, making them ridiculously easy to hack. One Synack security analyst who tested the cyber security of some of these products was able to hack into 15 of 16 smart home devices within 20 minutes. When you consider that those devices could include home security cameras, garage doors, and water pumps, it’s easy to see that these vulnerabilities pose a physical threat to the home’s inhabitants.


The State of Autonomous Vehicles: A "Who's Who" of Industry Drivers

Forward-thinking car manufacturers, in Detroit and abroad, are taking advantage of these disruptive technologies, focusing on building partnerships, acquiring startups, and beefing up internal R&D departments to avoid extinction. These partnerships and acquisitions also signal a maturing market, with further maturity reached as new revenue streams emerge in both automotive and also tangential industries that focus on providing services that complement or depend on the self-driving car experience.  Autonomous vehicles are about more than a "new" iterative feature sets, faster 0-60 speeds, or any other typical measurement of automotive innovation. They enable an entirely unprecedented consumer lifestyle, much like the internet itself, that surpasses traditional industry boundaries and will serve as the foundation for entirely new business models for the corporations that fuel its evolution


Want to know how to choose Machine Learning algorithm?

Machine Learning is the foundation for today’s insights on customer, products, costs and revenues which learns from the data provided to its algorithms. Some of the most common examples of machine learning are Netflix’s algorithms to give movie suggestions based on movies you have watched in the past or Amazon’s algorithms that recommend products based on other customers bought before. Typical algorithm model selection can be decided broadly on following questions: How much data do you have & is it continuous?; Is it classification or regression problem?; Predefined variables (Labeled), unlabeled or mix?; Data class skewed?; What is the goal? – predict or rank?; Result interpretation easy or hard? Here are the most used algorithms for various business problems


5 trends in open source documentation

People are increasingly choosing lightweight markup languages for a number of reasons. They are usually easier to write, at least for simple things. They tend to play better with version control systems, because they're generally line oriented. And they can help lower the barrier to entry for new contributors, although you should be careful not to expect a change in source format alone to drive lots of contributors to your project. ... Another reason static sites are more popular is that source hosting sites are easier to use, and a growing number of technical people use them. One of the draws of a wiki was that somebody could contribute without downloading anything or installing special tools. If your source files are stored in a hosting service like GitHub, anybody with a GitHub account can edit them right in their web browser and ask you to merge their changes.


EHR Data, Machine Learning Create Cost-Based Clinical Pathways

“With medical cost being such an opaque subject, providers may not have the best guidance strategy for the treatments that they offer to their patients,” wrote authors Yiye Zhang, PhD, and Rema Padman, PhD. Value-based care and innovative payment models for chronic disease management are prompting providers to take a more patient-centered approach to treatment, Zhang and Padman said, and require more patient involvement in their own care.  By creating step-by-step clinical pathways based on a patient’s anticipated disease development, big data analytics techniques could help providers “achieve accurate predictions of anticipated future events and costs following different clinical and cost pathways for improved shared decision making, and, subsequently, identify appropriate ranges of cost for targeted clinical pathways within a patient population,” says the article.


The 5 Most Worrying Technology Trends For 2017 And Beyond

Combining AI with advances in robotics, medicine and gene-technology means that people could stop dying or at least live a lot longer. That sounds great at first, but more people living well past 100 years would have massive implications for the economy and society at large. The population would continue to grow at an even faster rate, putting more pressure on resources around the world. ... As technology advances, we run the risk of entering a world of digital feudalism, in which a few technology elites — whether they are individuals or corporations — control our lives and our fate by controlling our data and our world. So far, people can still choose to opt-out, but it’s already inconvenient and uncomfortable. What happens when all transactions are handled digitally, when you can’t do something as simple as buy food, drive a car, or read a book without a digital signature.


5 game-changers coming to cloud in 2017

According to the same IDG survey, 21 percent are worried about vendor lock-in, which is understandable. The big public cloud providers offer one-size-fits-all cloud models that can orphan back-end systems or even require complete rewriting of critical business applications. Once you’re on their proprietary systems, it can be expensive — if not completely cost prohibitive — to move your workloads and data off their cloud. Take a look at this ZDNET story detailing how American Airlines is migrating to the cloud and using IBM Bluemix to develop new services and business models. IBM and American are partnering to build cloud-based applications that solve specific problems unique to their business, workloads and data. It’s a cloud strategy shaped around American’s unique business model, not its public cloud provider’s.


What the 4th Industrial Revolution Means for Future Jobs

Putting a little extra “elbow grease” into your work isn’t necessarily a good thing anymore (and with that, all couch potatoes rejoice). Mundane tasks are being replaced by more significant and engaging work for employees as Smart Technology is allowing for increased worker productivity by having computers do the tedious and time consuming work (sorry lazy people, you still have to actually do some work). Smart Technology is empowering the workforce. With IIoT solutions, employees develop working relationships with intelligent machines to achieve production results that neither human nor machine could accomplish independently. As IIoT innovations continue to develop, it is expected that the number of connected devices will multiply into the tens of billions! Many industrial organizations already see considerable value in IIoT technology as a complementary service to Big Data analytics.


8 Content Marketing Trends To Watch Out For In 2017

Regardless of your expertise in the growing realm of content marketing, one of the most important factors that goes into successfully marketing your brand is knowing how to use your time and budget to effectively relate to an evolving marketplace. ... One of the best ways for brands to capture attention is by creating interactive content. According to a recent study done by The Content Marketing Institute, 81% of the marketers surveyed said, “Interactive content grabs attention more effectively than static content.” Users today like to feel involved in the content they consume. Some of the popular ways brands are implementing interactive content is though quizzes, polls, or assessments.


Conquering the Challenges of Cloud Migration

If you haven't already, you're going to move something to the cloud at some point in the future. Even if you are not sure that a cloud service is right for you, you still need to investigate the cloud migration process to be able to make an informed decision -- even if you ultimately decide not to go that route. If you are not an expert in cloud migration -- I assume most of you are not -- there are services that can help you be successful. Once you decide to migrate some functions to the cloud, you will discover that this is only the beginning. Likely, more functions will be moved spanning years of IT and UC operation. Along this journey, many challenges will surface. Among the most common difficulties is the task of properly maintaining existing application services during the migration. Other challenges will be not disrupting the user experience or weakening the security you already have.



Quote for the day:


"The function of leadership is to produce more leaders, not more followers.” -- Ralph Nader