Can Open Source Sustain Itself without Losing Its Soul?
It’s clear that businesses will need to play more of a role in open source. As
Valsorda noted in the same blog post, “open source sustainability and supply
chain security are on everyone’s slide decks, blogs, and press releases. Big
companies desperately need the open source ecosystem to
professionalize.” Amanda Brock, CEO of OpenUK, a not-for-profit that
supports the use of open technologies, concurred: “We need to know not only that
we have the best software that can be produced — which collaborative and diverse
globally produced open source software is — but also that appropriate funding
has been provided to ensure that those building all this essential software are
able to maintain and support it being secure.” Brock cited a number of examples
of where this is happening in the U.K.; for example, she pointed to the work of
the Energy Digitalisation Taskforce. That governmental group “suggested that the
spine of the digitalized energy sector should be built on open source software.
The National Health Service in the U.K. also now has an open source
software-first approach for code it creates that it is increasingly trying to
live by.”
Using the Business Model Canvas in Enterprise Architecture
The Business Model Canvas brings together nine key elements of a business model,
making it possible to observe and describe the relationships of those nine
elements to each other. As architects, plotting the relationship of one element
to other elements is familiar territory. We align patterns, find gaps, map gives
and gets, and understand strategy by assessing the relationships of the critical
systems in an architecture landscape. The Business Model Canvas is yet another
tool to help us convey understanding. Many enterprise architects hang their hats
on “People, Process, Technology,” the popular PPT framework popularized in the
1990s. The roots of PPT extend further back, to the 1960s and the Diamond Model
from Harold Leavitt. PPT and the Diamond Model are useful, for certain, but the
canvas offers something that every enterprise architect should value. In the
aggregate, the nine blocks tell the story of the organization, how it goes to
market and aims to create, deliver, and capture value...”
How Enterprise Architecture Helps Reduce IT Costs
Easier said than done with the traditional process of manual follow-ups hampered
by inconsistent documentation often scattered across many teams. The issue with
documentation also often means that maintenance efforts are duplicated,
resources that could have been better deployed elsewhere. The result is the
equivalent of around 3 hours of a dedicated employee’s focus per application per
year spent on documentation, governance, and maintenance. Not so for the
organization that has a digital-native EA platform that leverages your data to
enable scalability and automation in workflows and messaging so you can reach
out to the most relevant people in your organization when it's most needed.
Features like these can save an immense amount of time otherwise spent
identifying the right people to talk to and when to reach out to them, making
your enterprise architecture the single source of truth and a solid foundation
for effective governance. The result is a reduction of approximately a third of
the time usually needed to achieve this.
AI drug algorithms can be flipped to invent bioweapons
Now consider an AI algorithm that can generate deadly biochemicals that behave
like VX but are made up of entirely non-regulated compounds. "We didn't do this
but it is quite possible for someone to take one of these models and use it as
an input to the generative model, and now say 'I want something that is toxic',
'I want something that does not use the current precursors on the watch list'.
And it generates something that's in that range. We didn't want to go that extra
step. But there's no logical reason why you couldn't do that," Urbina added. If
it's not possible to achieve this, you're back to square one. As veteran drug
chemist Derek Lowe put it: "I'm not all that worried about new nerve agents ...
I'm not sure that anyone needs to deploy a new compound in order to wreak havoc
– they can save themselves a lot of trouble by just making Sarin or VX, God help
us." There is no strict regulation on the machine-learning-powered synthesis of
new chemical molecules.
A Primer on Proxies
In HTTP/2, each request and response is sent on a different stream. To support
this, HTTP/2 defines frames that contain the stream identifier that they are
associated with. Requests and responses are composed of HEADERS and DATA frames
which contain HTTP header fields and HTTP content, respectively. Frames can be
large. When they are sent on the wire they might span multiple TLS records or
TCP segments. Side note: the HTTP WG has been working on a new revision of the
document that defines HTTP semantics that are common to all HTTP versions. The
terms message, header fields, and content all come from this description. HTTP/2
concurrency allows applications to read and write multiple objects at different
rates, which can improve HTTP application performance, such as web browsing.
HTTP/1.1 traditionally dealt with this concurrency by opening multiple TCP
connections in parallel and striping requests across these connections. In
contrast, HTTP/2 multiplexes frames belonging to different streams onto the
single byte stream provided by one TCP connection.
Thinking Strategically Will Help You Get Ahead and Stay Ahead
Create mental space for new ideas to kick-in. Without the quiet time to sit with
your thoughts, facing the uncomfortable silence, and letting your mind wander
away, you cannot draw useful connections. It will not happen the first time
around and probably not even the second time. But if you are persistent in your
efforts, without digital and other distractions of daily life, you will start to
notice new patterns of thinking. New ideas that you never thought about before
will start to surface. Another great strategy is to not restrict yourself to
knowledge within your current scope of work. Spend time learning about your
business and industry. Meet with other functions within your organization to
understand how they operate, what their challenges are and how they make
decisions. All of this knowledge will enable you to apply different mental
models to connect ideas from different domains thereby expanding your circle of
competence and building your strategic thinking skills. Remember, building
strategic thinking skills involves looking beyond the obvious and now to
prodding and shaping the uncertain future.
Microsoft Azure reveals a key breakthrough toward scaling quantum computing
“It’s never been done before, and until now it was never certain that it could
be done. And now it’s like yes, here’s this ultimate validation that we’re on
the right path,” she said. What have researchers achieved? They have developed
devices capable of inducing a topological phase of matter bookended by a pair of
Majorana zero modes, types of quantum excitations first theorized about in 1937
that don’t normally exist in nature. Majorana zero modes are crucial to
protecting quantum information, enabling reliable computation, and producing a
unique type of qubit, called a topological qubit, which Microsoft’s quantum
machine will use to store and compute information. A quantum computer built with
these qubits will likely be more stable than machines built with other types of
known qubits and may help solve some of the problems which currently baffle
classical computers. “Figuring out how to feed the world or cure it of climate
change will require discoveries or optimization of molecules that simply can’t
be done by today’s classical computers
Lensless Camera Captures Cellular-Level 3D Details
At the sensor, light that comes through the mask appears as a point spread
function, a pair of blurry blobs that seems useless but is actually key to
acquiring details about objects below the diffraction limit that are too small
for many microscopes to see. The blobs’ sizes, shapes, and distances from each
other indicate how far the subject is from the focal plane. Software
reinterprets the data into an image that can be refocused at will. The
researchers first tested the device by capturing cellular structures in a lily
of the valley, and then calcium activity in small jellyfish-like hydra. The team
then monitored a running rodent, attaching the device to the rodent’s skull and
then setting the animal down on a wheel. Data showed fluorescent-tagged neurons
in a region of the animal’s brain, connecting activity in the motor cortex with
motion and resolving blood vessels as small as 10 µm in diameter. In
collaboration with Rebecca Richards-Kortum and research scientist Jennifer Carns
from Rice Bioengineering, the team identified vascular imaging as a potential
clinical application of the Bio-FlatScope.
Handling Out-of-Order Data in Real-Time Analytics Applications
The solution is simple and elegant: a mutable cloud native real-time analytics
database. Late-arriving events are simply written to the portions of the
database they would have been if they had arrived on time in the first place. In
the case of Rockset, a real-time analytics database that I helped create,
individual fields in a data record can be natively updated, overwritten or
deleted. There is no need for expensive and slow copy-on-writes, a la Apache
Druid, or kludgy segregated dynamic partitions. A mutable real-time analytics
database provides high raw data ingestion speeds, the native ability to update
and backfill records with out-of-order data, all without creating additional
cost, data error risk or work for developers and data engineers. This supports
the mission-critical real-time analytics required by today’s data-driven
disruptors. In future blog posts, I’ll describe other must-have features of
real-time analytics databases such as bursty data traffic and complex queries.
CISOs face 'perfect storm' of ransomware and state-supported cybercrime
With not just ransomware gangs raiding network after network, but nation states
consciously turning a blind eye to it, today's chief information security
officers are caught in a "perfect storm," says Cybereason CSO Sam Curry.
"There's this marriage right now of financially motivated cybercrime that can
have a critical infrastructure and economic impact," Curry said during a CISO
roundtable hosted by his endpoint security shop. "And there are some nation
states that do what we call state-ignored sanctioning," he continued, using
Russia-based REvil and Conti ransomware groups as examples of criminal
operations that benefit from their home governments looking the other way. "You
get the umbrella of sovereignty, and you get the free license to be a privateer
in essence," Curry said. "It's not just an economic threat. It's not just a
geopolitical threat. It's a perfect storm." It's probably not a huge surprise to
anyone that destructive cyberattacks keep CISOs awake at night.
Quote for the day:
"Leadership means forming a team and
working toward common objectives that are tied to time, metrics, and
resources." -- Russel Honore
No comments:
Post a Comment