Metaverse Standards Forum Makes Data Interoperable But Only For Big Tech

Interoperability is the driving force for the growth and adoption of the open
metaverse. Hence, the Metaverse Standards Forum aims to analyze the
interoperability necessary for running the metaverse. More than 30 companies
took up their respective posts as founding members of the forum. Game
developers, architects, and engineers are mere clicks away from building the
next cutting-edge metaverse project with artificial intelligence and advanced
hardware. Setting interoperability standards with consideration to available
technology is crucial to the mass adoption of the metaverse. Similar to the
Metaverse Standards Forum, some key players are missing from the Oasis
Consortium, like Meta. And in the past, groups like this have become smaller and
smaller once internal conflict inevitably arises. The Metaverse Standards Forum
is led by the Khronos Group, a nonprofit consortium working on AR/VR, artificial
intelligence, machine learning, and more. Khronos has already tried to set a
standard for VR APIs with its similarly named VR Standards Initiative in 2016,
which included companies like Google, Nvidia. Epic Games and Oculus, which is
now part of Meta.
Identity Access Management Is Set for Exploding Growth, Big Changes — Report

As SaaS and cloud subscription services have proliferated in the space, smaller
firms increasingly have found IAM within their reach, and this study says to
expect this trend to snowball. Whereas the subscription model makes up 60% of
the market now, in five years the researchers forecast it will make up 94% of
all IAM spending. Meanwhile, other, broader IT trends such as the explosion in
cloud computing, bring-your-own-device (BYOD) policies, mobile computing,
Internet of Things (IoT), and more geographically dispersed workers are all
spurring greater IAM services spending to solve an acute need for saner access
control. "There are more devices and services to be managed than ever before,
with different requirements for associated access privileges," according to
Juniper's analysts. "With so much more to keep track of, as employees migrate
through different roles in an organization, it becomes increasingly difficult to
manage identity and access." According to Naresh Persaud, managing director in
cyber-identity services for Deloitte Risk & Financial Advisory, the market
has been especially jumpstarted in the last 12 to 18 months as organizations
work to accommodate a broader range and larger scale of remote-work
situations.
Working with Microsoft’s .NET Rules Engine

Getting started with the .NET Rule Engine is relatively simple. You will need to
first consider how to separate rules from your application and then how to
describe them in lambda expressions. There are options for building your own
custom rules using public classes that can be referred to from a lambda
expression, an approach that gets around the limitations associated with lambda
expressions only being able to use methods from .NET’s system namespace. You can
find a JSON schema for the rules in the project’s GitHub repository. It’s a
comprehensive schema, but in practice, you’re likely to only need a relatively
basic structure for your rules. Start by giving your rules workflow a name and
then following it up with a nested list of rules. Each rule needs a name, an
event that’s raised if it’s successful, an error message and type, and a rule
expression that’s defined as a lambda expression. Your rule expression needs to
be defined in terms of the inputs to the rules engine. Each input is an object,
and the lambda function evaluates the various values associated with the
input. 
10 Questions to Ask Yourself Before Starting Your Entrepreneurial Journey
Entrepreneurship is over-glorified and misrepresented on social media. In
reality, it is about building a business that solves a problem for a consumer.
It's not about driving nice cars or posting nice pictures on social media. In
fact, real entrepreneurship looks quite contrary to what we see on social media.
Do we require a certain level of luck, genetics and an environment around us to
be an entrepreneur? Yes — somewhat, for sure. But also, anyone can solve
problems anywhere in the world. That is true for both small problems and big
problems. The choice comes in the decision to find people who have needs, wants
and issues that you can offer a solution for. It is also a choice that each of
us gets to make on how well we wish to solve that issue — how obsessed we are
willing to become with that solution and how above and beyond we are willing to
go with servicing the customers well. Beyond the business solution also comes
the personal and emotional responsibility — shaping and growing ourselves to be
able to handle and maneuver through constant stress and difficulties. 
Don’t let automation break change management

Where automation is essential and unavoidable, network teams need to make sure
  all the good they can do with automation is not done at the expense of or in
  conflict with one of the other pillars of enterprise IT: change management.
  They need to make sure automation is controlled by change management, and that
  they are keeping change management processes in step with their increasing
  reliance on automation. One aspect is to implement change management on the
  automation, including the scripts, config files, and playbooks, used to manage
  the network. The use of code management tools helps with this: check-out and
  check-in events help staff remember to follow other parts of proper process.
  Applying change management at this level means describing the intended
  modifications to the automation, testing them, planning deployment, having a
  fallback plan to the previous known-good code where that is applicable, and
  determining specific criteria by which to judge whether the change succeeded
  or needs to be rolled back.
Imagination is key to effective data loss prevention
SecOps teams are charged with protecting data on a network or endpoint in each
  of its forms: at rest, in use, and in motion. To be in the driver’s seat and
  create the appropriate rules or policies to protect data across these three
  classifications requires teams to understand their environment fully. This is
  why organizations should consider implementing a flexible, scalable XDR
  (extended detection and response) architecture that can seamlessly integrate
  with their current security tools and connect all the dots to eliminate
  security gaps. With native integrations and connections for security policy
  orchestration across data and users, endpoints and collaboration, clouds and
  infrastructure, an XDR architecture provides SecOps teams with maximum
  visibility and control. ... Knowing what to protect, even before establishing
  protection, is key. So much so that comprehensive data visibility is a
  critical tenet for any SecOps team. Achieving this enables security teams to
  have the flexibility to create data protection parameters tailored to their
  own specific needs, creating an environment where the only limit on what they
  can achieve is their imagination.
The importance of digital skills bootcamps to UK tech industry success

The success of digital skills bootcamps in helping to secure the UK tech
  industry’s future is heavily contingent on the level of involvement from
  businesses. At present, however, not enough organisations are devoting the
  time needed to upskill or reskill staff, with research conducted by MPA Group
  finding that over a third of companies – 35 per cent – only allow workers to
  devote less than two hours per week to training, research, and development.
  Although there may be a number of reasons for this, MPA Group’s research
  indicated that ‘a lack of budget’ was considered by businesses to be the
  largest barrier for workplaces allowing staff to spend time on development.
  Digital skills bootcamps are helping to solve this problem by enabling
  companies to take advantage of the considerable state investment in the
  initiative, meaning organisations are given more affordable access to
  industry-led training. What’s more, with bootcamps having already been
  trialled to great success in places like the West Midlands – where
  approximately 2,000 adults have been trained with essential tech skills over
  the past few years – firms have the opportunity to hire recent programme
  graduates who can help impart what they have learned onto their workers.
The Parity Problem: Ensuring Mobile Apps Are Secure Across Platforms
So to build a robust defense, mobile developers need to implement a
  multi-layered defense that is both ‘broad’ and ‘deep’. By broad, I'm talking
  about multiple security features from different protection categories, which
  complement each other, such as encryption + obfuscation. By ‘deep’, I mean
  that each security feature should have multiple methods of detection or
  protection. For example, a jailbreak-detection SDK that only performs its
  checks when the app launches won’t be very effective because attackers can
  easily bypass the protection. Or consider anti-debugging, which is an
  important runtime defense to prevent attackers from using debuggers to perform
  dynamic analysis – where they run the app in a controlled environment for
  purposes of understanding or modifying the app’s behavior. There are many
  different types of debuggers – some based on LLDB – for native code like C++
  or objective C, others that inspect at the Java or Kotlin layer, and a lot
  more. Every debugger works a little bit differently in terms of how it
  attaches to and analyzes the app.
4 ways CIOs can create resilient organizations

As CIO, you need to make sure your technology investments enable change. After
  all, you might need to support an entirely remote employee population. You
  might need to offer new capabilities that attract top talent or quickly shut
  down business in a region wracked by geopolitical conflict. Organizations
  invest large sums in migrating to the cloud. One reason is the ability to grow
  with needs. But technology scale is no longer the primary benefit of the
  cloud. And scale is no longer a guarantee of resilience. Rather, focus your
  cloud and software-as-a-service (SaaS) investments on supporting rapid change.
  Multi-cloud strategy, containerization, agile DevSecOps development
  methodologies: All should be designed around elasticity that equips you to
  make quick wins or pivot to new business models. ... Data analytics can
  provide holistic views and predictive models that help CIOs and others
  understand emerging trends. Those insights support data-driven decision-making
  and ultimately, resilience. That’s because you no longer have to rely on gut
  feel to prepare for an otherwise unpredictable future. 
What happens when there’s not enough cloud?

Most companies struggle to find enough customers to buy their products.
  According to Selipsky in a Mad Money interview, cloud companies like AWS might
  have the opposite problem. “IT is going to move to the cloud. And it’s going
  to take a while. You’ve seen maybe only, call it 10% of IT today move. So it’s
  still day 1. It’s still early. … Most of it’s still yet to come.” Years ago I
  noted that the cloud will take time. Not because there’s limited demand, but
  precisely because even with enterprises on a full sprint to the cloud, there
  are trillions of dollars’ worth of IT to modernize. As MongoDB CMO Peder
  Ulander responded to McLaughlin, “If anything, the growing shortage of
  capacity is a watershed moment for AWS, Google Cloud, and Microsoft Azure.”
  (Disclosure: I work for MongoDB.) In a hot market, it’s standard for demand to
  outstrip supply. Ulander cites products as diverse as Teslas or Tickle Me Elmo
  toys. What’s interesting here is that we’re having the enterprise equivalent
  of a 1996 Tickle Me Elmo shortage. 
Quote for the day:
"Leaders know the importance of having
    someone in their lives who will unfailingly and fearlessly tell them the
    truth." -- Warren G. Bennis
 
 
No comments:
Post a Comment