Daily Tech Digest - February 25, 2019

Harnessing RegTech to build payments reputation

RegTech
The scope and complexity of the regulatory reporting is significant and increasing year on year. This poses challenges for financial institutions not only around deciphering new legislation within strict deadlines, but also ‘translating’ it into their process framework. Every legislatorial update results in changes in regulatory rules that are imposed upon financial institutions. Banks and financial institutions spend billions of dollars every year to stay compliant. The Banks and PPI operators find it difficult to keep pace with a dramatic rise in a vast gamut of regulatory requirements and compliance obligations. According to an estimate, financial institutions could end up spending 10 percent of their revenues on compliance within the next few years. Inability to contain these costs can cause a severe dent in the profitability of Banks. Experience suggests that the inability to keep pace with the speed and scale of regulatory requirements can cause the poor governance of sensitive customer data. Often, the data is heterogeneous and not integrated.



Does Blockchain Matter Yet In Intellectual Property For Business?

For patent law, blockchain has probably been most noteworthy because of the influx of applications filed in the U.S. Patent and Trademark Office (“USPTO”) to protect various uses of blockchain technology. But blockchain’s strength as an unchangeable, distributed ledger is ideally suited to compiling information and lists. While its tamper-proof code can provide solid evidence of facts about what invention may have been created, and when, the only way to get enforceable patent rights is by filing an application with the United States Patent and Trademark Office, surviving the application (or “prosecution”) process, and having a federal patent issued in your name. That is the only way to get a legal monopoly. You can invent that “Next Great Thing,” but if you don’t patent your rights, it will be free for anyone to copy once it is out in public and you have exceeded the timetable to get a patent. Blockchain is a great way to track all of the information regarding inventions, inventor names, ownership rights and other formalities.


Expect microservices implementation to break down IT norms


Microservices broaden the developer's responsibilities to include everything from network communications to business interactions. "J2EE developers got away with a lot," Morgenthal said. "With an opinionated platform, you'd design to the spec and deploy your file, and ops would be responsible for that entire resilient infrastructure to run it." To implement microservices, developers must understand the language, the container and how to automate that container's creation. They should perform some tests and know how network communications work and which ports to open, Morgenthal said. Database and storage demands also fall under the developer's purview, such as how to ensure separation of service and files. But before they design a single microservice, developers must grasp how the architecture all fits together. "Don't overload microservices with capabilities," Morgenthal said. "Do one thing well." Microservices should fit into appropriate business domains and be organized by business logic. Component changes should not break any dependency models upon which applications work.



Modernizing the Data Warehouse

The primary DW interest is to have a full set of validated data about the business that can be used for many use cases. While a simple need statement, it represents many difficult fields in technology, organizational dynamics, and work activities. The adjective “validated” itself it is a major and long-term challenge to solve. How do know it is valid? Is it valid for all reports and queries? Will it be valid when new data is added? How can you find and correct errors? Can the technology store the breadth of data desired, parsing it all, cyclically interrogating for model-based computing or Machine Learning, and ad doc querying multiple levels of data over multiple time frames? These are the activities needed and which could be done by a large number of trained people, such as actuarial work before widespread use of computers . Until recent years, major technology advances were logarithm tables, the slide rule, and mechanical calculators starting in the 1600s. The first wave of data warehousing arose when computing technology shrunk in size and cost from the early behemoths into feasible business tools.


Foldable phones could finally push office workers away from the PC


Part of the answer has to do with the resilience of the PC, which Bill Gates and Steve Jobs famously discussed during the D5 conference in 2007. During an interview, the pair described a world with general-purpose computing devices as well as specialized, service-dependent post-PC devices. "This general purpose device is going to continue to be with us and morph with us, whether it's a tablet or a notebook or, you know, a big curved desktop that you have at your house or whatever it might be," said Jobs. We may eventually enter the fully post-PC world that Perlow predicted in 2012 where "the majority of business professionals will be using extremely inexpensive thin notebooks, tablets and thin clients (sub $500) which will utilize any number of software technologies that run within the browser or will use next-generation Web-based APIs..," but we're not there yet. Perlow gives us another part of the answer in a 2011 ZDNet article.


Cloud IDE review: AWS Cloud9 vs. Eclipse Che vs. Eclipse Theia

Cloud IDE review: AWS Cloud9 vs. Eclipse Che vs. Eclipse Theia
Eclipse Che is an open source developer workspace server and cloud IDE designed for teams and organizations. Che version 7, currently in beta, uses Eclipse Theia as the basis of its IDE. Older versions of Che use a GWT-based IDE. Che workspaces run in containers on Docker, OpenShift, or Kubernetes. You can run Che in the public cloud, a private cloud, or install it on any operating system. Che has been tested on Ubuntu, Linux, MacOS, and Windows. You can also run Che in a self-service workspace hosted at https://che.openshift.io/, for which you’ll need to have or create a free OpenShift or Red Hat log-in. In addition, Eclipse Che comprises the core of Red Hat CodeReady Workspaces, the new development environment for OpenShift. In addition to being supported by Red Hat, CodeReady Workspaces have pre-built stacks with supported Red Hat technologies and include Red Hat SSO to handle authentication and security between the developer teams.


US may cut off countries that use Huawei in 5G networks


“As a supplier, Huawei cannot decide how much Huawei equipment will be deployed in the UK. Also we cannot make decision on customer’s behalf whether they should choose Huawei or not,” said Ding. “However, I can tell you the multi-operator video call we made yesterday was based on live networks.” “Also, in the past few years, we have had extensive and in-depth collaboration and innovations with operators on deployment and standards of 5G. Third, I firmly believe a 5G market without Huawei is just like the English Premier League without Manchester United.” In remarks made on social media on 21 February, Pompeo’s boss, Donald Trump, said he wanted 5G, and “even 6G” networks operational in the US as soon as possible. He urged US networking suppliers to step up their game in the race to innovate around 5G, an area where Huawei is particularly strong. Implying that he concedes Huawei does have a substantial technological lead, 


microsoft-msft-hololens-2-1422.jpg
Remote Assist is just one of a handful of Microsoft-developed, Dynamics 365-branded HoloLens apps targeting this market. Others include Dynamics 365 Layout, a 3D layout app also introduced last year; Dynamics 365 Product Visualize for showcasing products in 3D, which Microsoft announced last week; and a coming Dynamics 365 Guides application for 3D training at scale. Last week, Microsoft officials also announced that a Dynamics 365 Remote Assist app will be coming to Android devices and Dynamics 365 Product Visualize app will be coming to iOS devices. What officials didn't explain at that time is how users on those mobile phones will be able to see holograms at high fidelity. This is where Azure comes into play. Microsoft is introducing two new Azure services to enable more intelligent cloud-intelligent edge scenarios. They'll initially be available as previews. Currently, holographic applications can share spatial anchors between themselves, enabling users to render a hologram at the same place in the real world across multiple devices.



Get ready for the age of sensor panic

Smile, you are on camera
The consternation over airplane cameras and security system microphones represents a new phenomenon I call “sensor panic.” And I believe this is just the beginning. The companies both responded to the criticism with the same basic claim: The sensors were installed for some future purpose, but to date they have been non-active. The companies also seemed to be surprised that anyone would freak out over the existence of sensors that weren’t being used for anything. But after what seems like daily reports about Facebook privacy transgressions, Russian hacking, Chinese industrial espionage, Android malware and all manner of leaks, hacks and privacy-invading blunders, we’ve entered into a new era of public distrust of all things technological. For example, can Singapore Airlines and Google be trusted to not use their cameras and microphones given that they couldn’t be trusted to even disclose their existence? (And by the way, it’s been just a couple of weeks since it was revealed that Singapore Airlines may have been secretly recording user activity on the company’s iPhone app.


There is an ongoing and significant risk to DNS infrastructure

Cryptographically signing DNS records can prevent unauthorized third-parties from modifying DNS entries without a private DNSSEC signing key that's usually in the possession of the legitimate domain owner only. ICANN officials said DNSSEC would have prevented the recent DNS hijacking attacks that have made headlines in the past two month. At the start of the year, US cyber-security firm FireEye revealed a months-long campaigncarried out by Iranian threat actors who hacked into the web hosting and domain registrar accounts to change the DNS records of email domains belonging to private companies and government entities. This attacks --called DNS hijacking-- allowed the crooks to redirect legitimate traffic to their own malicious servers, where they performed man-in-the-middle attacks to intercept login credentials and then forwarded the traffic back to the legitimate email servers.



Quote for the day:


"Every right that we enjoy has a corresponding duty to not interfere with the enjoyment of the same right by others." - Orrin Woodward


No comments:

Post a Comment