Daily Tech Digest - December 05, 2020

What Tech Jargon Reveals about Bias in the Industry

Tech language was developed back in the early days of modern computing during a time when globally racism was much more explicit and often went unchallenged. But there is no reason we can’t change that language. It’s not embedded in the code itself; it’s just how we talk about these concepts. I recently heard of an example where a team of coders working on a solution had to go through the “blacklist and whitelist” of terms/commands for a specific product. The “blacklist” was terms/commands they couldn’t or shouldn’t use while the “whitelist” was stuff that’s OK. Because of the Black Lives Matter movement and what’s in the news, they noticed these terms in a new light for the first time and changed the language they were using to avoid using those racialized terms. It’s easy to just use different words, so why not? It’s an easy low-cost, low-tech solution to change language and improve output. Recently, Microsoft removed terms like these from their documentation. Cloudflare is debiasing some of the terms used in their coding. There are no reasons why such simple conscious actions can’t be undertaken for the benefit of us all. The benefits of diversity are widely stated. But they’re actually only available to companies when they include people. 


How to make remote pair programming work

When you cannot assemble a team physically, turn to pair programming remotely. But to see the benefits of remote pair programming, approach the practice systematically with one of the following styles: unstructured, driver/navigator or ping-pong. Plan pair programming remotely with decisions about the team's skill level: Should novices work with experts, or is a different approach better? Editor's note: Interest in remote pair programming has risen during the global COVID-19 pandemic. Developers working in distributed, at-home settings for the first time should also check out tips to empower productive remote dev teams, and insights into psychological safety when the workplace is suddenly part of home life. ... Most pair programming relationships fall into the unstructured style, where two programmers work together in an ad hoc manner. With the collaboration being loosely guided, both programmers should have matching skill levels. A common variant of this style is the unstructured expert-novice pair, where an expert programmer guides a novice. An unstructured approach is hard to discipline and unlikely to persist on longer projects. Unstructured pair programming is also harder to sustain remotely than styles with established guidelines.


Enterprise Architecture: What It Is, Why It's Important And How To Talk About It

The enterprise architect’s ultimate goal is to enact effective and measurable change. To do so, architects work to create not just a complete picture of the organization, but also roadmaps that represent different desired future states. By mapping out the paths to desired future states, they can decide the best path to take—with metrics to back up that decision showing how much better the organization will operate once changes are made. With precise understanding of the tradeoffs that come with each potential scenario, architects can propose multiple solutions in line with changing strategies. These scenarios can be optimized for different business outcomes, like growth, cost optimization, risk reduction, etc., and ultimately drive important business decisions that can be confidently backed with data. Modern enterprise architecture tools go far beyond the old-school perceptions of EA as a simple visualization tool, and now include dynamic and collaborative data that supports the different ways to model future states. One example of enterprise architecture in action comes from New Zealand’s largest retail grocery organization, Foodstuffs, which implemented enterprise architecture to help it stay agile and competitive.


Intel details Horse Ridge II as helping overcome quantum computing hurdle

Horse Ridge II, Intel says, supports "enhanced capabilities and higher levels of integration for elegant control of the quantum system". New features include the ability to manipulate and read qubit states and control the potential of several gates required to entangle multiple qubits. Horse Ridge II builds on the first-generation system-on-chip (SoC) ability to generate radio frequency pulses to manipulate the state of the qubit, known as qubit drive. "With Horse Ridge I, we essentially were able to drive the qubit, basically apply signals that would manipulate the state of the qubit between 0-1; with Horse Ridge II, we can not only drive the qubit, but we can read out the state of the qubit, we can apply pulses that would allow us to control the interaction between two qubits, and so we've added additional controller capabilities to Horse Ridge II," Clarke said. "We have a very programmable filter that would allow us to send a variety of different pulse shapes to control our qubits, we have an integrated microcontroller, we have a lot of DACs -- digital to analogue controllers -- that would allow us to control the individual qubits to a greater extent and these DACs would otherwise be discrete boxes in a control rack external to the refrigerator, so we're starting to take some of these boxes and put them into our SoC inside of our qubit refrigerator."


What organisations should expect next in the evolution of data

Before Covid-19 hit, data was already becoming fundamental to organisations’ future success. That journey has been supercharged. According to new research from Druva, 79% of IT decision makers in the US and UK now see data management and protection as key to competitive advantage. Similarly, 73% say they rely more heavily on data for business decisions, while 33% believe its value has permanently increased since the pandemic began. Therefore, if the message for IT leaders on their data strategy pre-pandemic was ‘get moving’, in 2021 it will be ‘go faster’. As the move towards a digitally-led future gathers pace, we’ll see a growing number of organisations move to make data a pervasive part of everything, from operational decision-making to customer experiences. Rapid availability and analysis will be vital. That’s not to say this transformation comes without risk. The same Druva research found 73% of IT decision makers have become more concerned about protecting their data from ransomware, and rightly so. Many report a year-on-year increase in phishing, malware and ransomware attacks. With large numbers of people working outside the office and some high-profile recent successes for cyber criminals, we can expect this threat to grow further in 2021.


Blockchain Attempts To Secure The Supply Chain

Counterfeiting is a real and growing problem. “We have several customers who are very concerned about counterfeiting and other security issues, and they are thinking of multiple ways to secure their ICs and systems,” said Geoff Tate, CEO of Flex Logix. This is partly the role of identity, but identity may not be sufficient without the further knowledge of the history of the item. And that history can involve an enormous range of considerations. How much to include must balance the cost of tracking and storing data about huge numbers of individual components and systems against the consequences of having too little historical information. “Blockchains provide a convenient means to permanently record transactions, and they have application to the provenance of components,” said John Hallman, product manager for trust and security at OneSpin Solutions. Dave Huntley, business development at PDF Solutions and co-chair of three SEMI committees/task forces, elaborated further. “When a new asset like a package is assembled, it is enrolled as a brand-new asset on the blockchain, along with its bill of materials,” he said. “You now have a genealogy, and you could take a module from a car, open it up, figure out the printed circuit board and slide it out, open that up, look at the packages inside, open one of them up, and look at the die inside. ...”


Building real cyber resiliency in government

While threats are constantly evolving, Branko Bokan, a cybersecurity specialist at CISA, said the tactics, techniques and procedures are actually the same -- the real change is in the distribution type and frequency of these attacks. “Regardless of how well we try to prevent cyberattacks, they will always happen, and we have to be ready and able to detect bad things when they happen, or as soon as possible after they happen,” he said. Often, organizations think of cybersecurity as preventing/protecting networks against cyber threats – but that is just one element of the cybersecurity framework, as outlined by the National Institute of Standards and Technology. NIST framework includes five functions, which match the pillars for cyber resiliency: identify, protect, prevent, respond and recover. By dividing cybersecurity into these five stages, agencies can identify cyber actions adversaries might take. It can also help them create a coverage map of the threat landscape to see how their current capabilities can protect, detect and respond to each one of these actual threat actions – and identify where the gaps are. As agencies take a threat-based approach to security, cloud is also playing a large role in resiliency plans.


Microsoft Cloud Security Exec Talks New Tech, WFH, Gamification

From a cloud operator's perspective, Ollmann is seeing the growth of cloud security posture management (CSPM) technologies, which are meant to help security teams bring together their assets and resources in one place to better manage and understand their cloud infrastructure.  "CSPM has been that vehicle for providing visibility of security risk, vulnerabilities, vulnerability management, and then a little bit of gamification to enable and help customers and organizations improve their security posture as they go along," he explained. Security posture management gives infosec teams visibility and control while managing policies. The gamification – a "loose interpretation" of the term, Ollmann noted – is in the score, which informs teams of the risk or security value in a particular asset, resource, application, or environment as a whole. Every vulnerability and poor or absent configuration has a value tied to it. By addressing the weaknesses, a team can increase its overall security score. "Security will never be 100%, so hopefully as you develop these sorts of things, you keep improving on your score," he said. Some larger businesses have multiple apps in multiple environments, and teams compete against one another to boost their numbers.


The resurgence of enterprise architecture

Because enterprise architecture enables a business to map out all their systems and processes and how they connect together, EA is becoming a “very important method and tool to drive forward digital transformation,” said Christ. He explained that since most transformations don’t start off as greenfield projects, about 70% of them fail due to their existing IT landscape. Having a solid baseline, which EA aims to provide, is crucial for any transformation initiative.  “The reason for this is that once you’ve started a transformation program, you discover new dependencies because of applications connected to other systems that you never knew of before. So replacing them with better applications, with newer interfaces, and with better APIs all of a sudden isn’t as easy as you thought when you were starting the transformation program,” he explained.  Businesses also want to understand where their investments in the IT landscape are going, and connect the business strategic goals to the activities in their transformation program. “This is where enterprise architecture can help you. It allows you to look at this whole hierarchy of objectives and programs you are setting up, the affected applications you are having, and the underlying changes in detail,” said Christ.


Quantum Acceleration in 2020

Many frameworks and tools have emerged for developing quantum applications based on these algorithms. Microsoft’s Quantum Development Kit (QDK), for example, provides a tool set integrated with leading development environments, open-source resources, and the company’s high-level programming language, Q#. It also offers access to quantum inspired optimization (QIO) solvers for running optimization problems in the cloud. For building quantum circuits and algorithms that take advantage of quantum processors, IBM offers Qiskit, an open-source quantum computing library for Python. Cirq is yet another quantum programming library created by the team of scientists and engineers at Google. It contains a growing set of functionalities allowing users to manipulate and simulate quantum circuits. Finally, Quil is a quantum programming toolkit from Rigetti that also provides a diverse array of functionalities and data structures for supporting quantum computation. There are also packages, such as Xanadu’s Strawberry Fields and D-Wave's Leap, aimed at quantum backends that are not based on the gate model paradigm. In addition, we see the ongoing creation of domain-specific tools, such as OpenFermion and Xanadu’s PennyLane, purpose-built for running quantum chemistry and quantum machine learning applications, respectively.



Quote for the day:

"The only person you are destined to become is the person you decide to be." -- Ralph Waldo Emerson

No comments:

Post a Comment