Digital presenteeism is creating a future of work that nobody wants
While technology has enabled more employees to work remotely – bringing
considerable benefits in doing so – it has also facilitated digital
presenteeism, Qatalog and GitLab concluded. One solution is to make technology
less invasive and "more considerate of the user and completely redesigned for
the new way of work, rather than supporting old habits in new environments" –
although this may be easier said than done. According to Raud, current solutions
require a "radical redesign that is more considerate of the user and prioritizes
their objectives, rather than simply capturing our attention." Culture shift is
also necessary for async work to become normalized, says Rauf. This comes from
the top, and starts with trust: "When leaders send a message to their team, make
clear whether or not it needs an immediate response or better yet, schedule
updates to go out when people are most likely online. If I message a team member
at an odd hour, I prefix a 'for tomorrow' or 'no rush', so they know it's not an
urgent issue."
Confronting the risks of artificial intelligence
Because AI is a relatively new force in business, few leaders have had the
opportunity to hone their intuition about the full scope of societal,
organizational, and individual risks, or to develop a working knowledge of their
associated drivers, which range from the data fed into AI systems to the
operation of algorithmic models and the interactions between humans and
machines. As a result, executives often overlook potential perils (“We’re not
using AI in anything that could ‘blow up,’ like self-driving cars”) or
overestimate an organization’s risk-mitigation capabilities (“We’ve been doing
analytics for a long time, so we already have the right controls in place, and
our practices are in line with those of our industry peers”). It’s also common
for leaders to lump in AI risks with others owned by specialists in the IT and
analytics organizations. Leaders hoping to avoid, or at least mitigate,
unintended consequences need both to build their pattern-recognition skills with
respect to AI risks and to engage the entire organization so that it is ready to
embrace the power and the responsibility associated with AI.
The AIoT Revolution: How AI and IoT Are Transforming Our World
AIoT is a growing field with many potential benefits. Businesses that adopt AIoT
can improve their efficiency, decision-making, customization, and safety. ...
Increased efficiency: By combining AI with IoT, businesses can automate tasks
and processes that would otherwise be performed manually. This can free up
employees to focus on more important tasks and increase overall productivity.
Improved decision-making: By collecting data from various sources and using AI
to analyze it, businesses can gain insights they wouldn’t otherwise have. It can
help businesses make more informed decisions, from product development to
marketing. Greater customization: Businesses can create customized products and
services tailored to their customers’ needs and preferences using data collected
from IoT devices. This can lead to increased customer satisfaction and loyalty.
Reduced costs: Businesses can reduce their labor costs by automating tasks and
processes. Additionally, AIoT can help businesses reduce their energy costs by
optimizing their use of resources. Increased safety: By monitoring conditions
and using AI to identify potential hazards, businesses can take steps to prevent
accidents and injuries.
It's time for manufacturers to build a collaborative cybersecurity team
Despite the best laid plans, bear in mind that these are active,
interconnected and dynamic systems. It’s impossible to separate physical and
cybersecurity elements, as their role in business operations is so
foundational. As the landscape for new technologies and best practices change,
adapt along with it. Ensure the lines of communication are open, management
maintains involvement in the process, and all the key parties across IT and OT
are committed to working collaboratively to strengthen every element of
security. These tenets will help manufacturing organizations stay nimble in
the face of an ever-changing security landscape. As the convergence of IT and
OT continues, the risk of cyberthreats will continue to rise along with it.
Building a collaborative security team across both IT and OT will help to
reduce organizational risk and fortify critical infrastructure. By involving
leadership, setting a plan, and staying adaptable as things change, security
leaders will be armed with a comprehensive security approach that supports
near-term needs and offers long-term business sustainability.
Why diverse recruitment is the key to closing the cyber-security skills gap
When it comes to mitigating the ever-evolving cyber threat, diversity is a
crucial, but often overlooked, factor. As cyber attacks are becoming
increasingly culturally nuanced, it is important that we meet the challenge by
drawing from a wide range of backgrounds and life experiences. Cyber attacks
come from everywhere - from a wide range of ages, locations, and educational
backgrounds - so our responders should too. Perceptions of cyber security
often see it as revolving around highly complex technology and driven mainly
by this. While tech clearly plays a crucial role in mitigating cyber attacks,
successfully countering them would not be possible without the role performed
by people. This is enriched hugely by having a workforce which covers as many
educational and socio-economic backgrounds as possible. In making a concerted
effort towards a more diverse workforce, the cyber-security industry will be
able to gain a deeper awareness of the cultural nuances that underlie cyber
attacks. It’s important to fully understand what we mean by diverse hiring.
Considering entry routes into the industry is a big part of attracting a
broader range of demographics.
You have mountains of data, but do you know how to climb?
We have more data than ever before, but it is not enough to merely accumulate
it. Dedicate time and resources to establishing digital governance to ensure
the data you are using is clean, consistently implemented, and universally
understood. ... The tech team is not solely responsible for the quality of our
data—we all need to take ownership of and champion the data we use.
Visualization tools bridge the gap between the tech team and the business
team, doing away with barriers to entry and enabling end-to-end analytics. In
this way, you can empower employees to immerse themselves in and take
ownership of the data at hand. Users no longer have to submit a request to the
tech team to create a report and twiddle their thumbs until it comes back.
They can now take initiative and do it themselves, creating a more streamlined
process and a more informed group of employees who can work quickly to make
data-driven decisions. Furthermore, when you empower people to take control of
their data and ask their own questions, they may uncover new insights they
would never have found when presented with pre-packaged reports.
Software Supply Chain Concerns Reach C-Suite
From Cornell's perspective, DevOps — or hopefully, DevSecOps groups — should
really spearhead the management of software supply chain risk. "They are the
ones who own the software development process, and they see the code that is
written," he says. "They see the components that are pulled in. They watch the
software get built. And they make it available to whoever is next on down the
line." Given this vantage point, they can help to impact — in a positive way —
an organization's software supply chain security status by implementing good
policies and practices around what open source code is included in their
software and when those open source components are upgraded. "Forward-leaning
DevSecOps teams can take advantage of their automation and testing to start
pushing for more aggressive component-upgrade life cycles and other approaches
that help minimize technical debt," he explains. He says they’re also in a
position and own the tooling to help generate SBOMs that they can then provide
to software consumers who are in turn looking to manage their supply chain
risk.
Know Your Risks – and Your Friends’ Risks, Too
Identifying risks and documenting response actions are only part of the
equation. Crucial to the overall C-SCRM process is the communication and
education of all parties involved about organizational risks and how to
respond. Organizations must ensure that all personnel and third-party partners
are trained on supply chain risks, encourage awareness from the top down, and
involve partners and suppliers in organization-wide tests and assessments of
response plans. Organizations should establish open communications with their
supplier partners about risk concerns and encourage partners to do the same in
return. The general idea is individual strength through community strength. As
an organization matures its C-SCRM (or overall cybersecurity) process, lessons
learned and best practices should be shared along the way to help bolster
others’ programs. The concept of C-SCRM is not a new one. In fact, there are
many sources that have provided guidance on the topic over the years. The
National Institute of Standards and Technology (NIST) has a Special
Publication (SP) 800-161 and an Internal Report (IR) 8276 on the
subject.
3 data quality metrics dataops should prioritize
The good news is that as business leaders trust their data, they’ll use it
more for decision-making, analysis, and prediction. With that comes an
expectation that the data, network, and systems for accessing key data sources
are available and reliable. Ian Funnell, manager of developer relations at
Matillion, says, “The key data quality metric for dataops teams to prioritize
is availability. Data quality starts at the source because it’s the source
data that run today’s business operations.” Funnell suggests that dataops must
also show they can drive data and systems improvements. He says, “Dataops is
concerned with the automation of the data processing life cycle that powers
data integration and, when used properly, allows quick and reliable data
processing changes.” Barr Moses, CEO and cofounder of Monte Carlo Data, shares
a similar perspective. “After speaking with hundreds of data teams over the
years about how they measure the impact of data quality or lack thereof, I
found that two key metrics—time to detection and time to resolution for data
downtime—offer a good start.”
How Optic Detects NFT Fraud with AI and Machine Learning
The NFT space has ongoing issues with fraud, including through bad actors
wholesale lifting art from one project and using it in a second project — a
process often referred to as “copyminting.” They are derivative projects that
have a few too many similarities to the original project to be considered
anything other than a ripoff. While most of these duplicate projects do very
little sales volume relative to the original, they may damage the underlying
brand, contribute to the overall distrust of the NFT space, or trick less
savvy buyers into spending money on something that’s the jpg equivalent of a
street vendor shilling fake Rolex watches. To help combat this fraud, a few
companies are emerging that specialize in fraud detection in NFTs. They tend
to leverage blockchain data to help determine which project came first and
apply some image detection to find metadata matches. One of these solutions is
Optic, which uses artificial intelligence and machine learning to analyze the
images associated with an NFT, which helps NFT marketplaces and minting
platforms catch copies and protect both creators and buyers.
Quote for the day:
"The test we must set for ourselves is
not to march alone but to march in such a way that others will wish to join
us." -- Hubert Humphrey
No comments:
Post a Comment