As decentralized application (dApps) developers gain more experience working with blockchains, some are running into limitations created by the parameters of blockchain architecture. Ethereum, for instance, allows for applications to be created via smart contracts, but does not allow for automatic execution of code. It also maintains fairly strict control over the way consensus and networking functions are exposed to those applications. To overcome these limitations, some developers are turning to application-specific blockchains — purpose-built and tuned for their specific application needs, and colloquially called “appchains.” One of the more popular options for building appchains is the Cosmos SDK, due to built-in composability, interconnected blockchains, and the ability for developers to maintain sovereignty over their blockchain. We’ve covered Cosmos in the past, including a developer academy for learning to build in the Cosmos Network and the addition of Interchain Security, which allows multiple Cosmos blockchains to align around common security protocols while maintaining sovereignty.
First, and most important, many businesses now consider IT spending to be directly reflected in the value built within the enterprise. IT systems are no longer just for tactical uses such as processing transactions. Instead, cloud systems are becoming the business itself. The businesses disrupting their markets are doing so with their own unique innovations. They can only create these innovations by developing core IT systems using digital transformation processes and cloud computing. IT is no longer a cost center but an investment that needs to be nurtured. This new outlook is seen in manufacturing companies invested in supply chain automation using cloud-based artificial intelligence capabilities and cloud-based blockchain to lower costs and increase productivity. It’s seen in businesses that are entirely based on technology offerings, such as ride-sharing or residence-sharing applications. Many investors and company executives now believe software will define the future of business. IT is the engine that can build and use these systems; thus it’s a budgetary line item that boards and executives are reluctant to touch.
Cybersecurity and Technology Industry Leaders Launch Open-Source Project to Help Organizations Detect and Stop Cyberattacks Faster and More Effectively"Every business deserves a simple, straightforward way to analyze and understand the security landscape – and that starts with their data," said John Graham-Cumming, CTO at Cloudflare. "By participating in the OCSF, we hope to help the entire security industry focus on doing the work that matters instead of wasting countless hours and resources on formatting data." "At CrowdStrike, our mission is to stop breaches and power productivity for organizations," said Michael Sentonas, Chief Technology Officer, CrowdStrike. "We believe strongly in the concept of a shared data schema, which enables organizations to understand and digest all data, streamline their security operations and lower risk. As a member of the OCSF, CrowdStrike is committed to doing the hard work to deliver solutions that organizations need to stay ahead of adversaries." "Modern cybersecurity operations is a team sport, and products must integrate with each other to provide value beyond what a single product can. Sure, it's possible to make that happen with open APIs and mapping data structures, but development and processing resources are not infinite," said Mohan Koo, Co-founder and CTO with DTEX Systems.
What do you do when you face an important but complicated decision? Do you turn to experts? Dig for data? Ask trusted friends and colleagues? Go with your gut? The truth is many of us approach decision making from the same perspective over and over. We use the same tools and habits every time, even if the decisions are vastly different. But following the same strategy for every problem limits your abilities. To make better decisions, you need to break out of these patterns and see things differently, even if it is uncomfortable. First, you need to understand your own decision-making strengths and your blind spots: What is the psychology of your decision making? What is your typical approach? What mental mistakes or cognitive biases tend to get in your way? Looking inward to what you value can illuminate why you make decisions the way you do — and how you might be shortchanging yourself with your approach. From there, you can disrupt your traditional processes.
Relay Network 's CMO Tal Klein points out the CIO/CDO has a vested interest in the interplay of technology and business. “Depending on what marketing pillar the fractional CMO is being brought onboard to address, the CIO may care a lot if the fractional CMO is being brought in to address operational issues like lead generation or lead-to-opportunity conversion velocity,” he says. That's because that kind of work relies heavily on technology and may impact changes to the company's CRM, website, or even communication infrastructure. “Whereas if the fractional CMO is being brought it to address messaging or market positioning, the CIO may have less of a vested stake in the recruitment efforts,” Klein says. Klein adds other than the obvious infrastructure work associated with supporting marketing operations, the CIO or CDO may own a lot of the outputs from marketing engagements like the compliance issues. These could arise from capturing customer information, security ramifications associated with new tools or processes, and ensuring whatever prospect or customer data marketing needs in order to run effective campaigns is available to them.
With an overwhelming number of employees saying they want hybrid work to become the new normal, flexible work arrangements are becoming integral to an organization’s hiring and retention strategies. Pre-pandemic, industries that offered work flexibility were often considered somewhat progressive and it was more the exception than the norm. Today, hybrid work is standard in a growing number of fields. Still, there are challenges. ... With employees potentially using personal devices and home wi-fi connections, IT security teams must constantly consider new vulnerabilities and strategies to remain safe. Clear policies and practices, along with training programs that reflect these new procedures are essential for any successful hybrid work model. On the positive side, hybrid work reduces the impact on our environment. Working remotely means less paper consumption and energy used to maintain office buildings and less waste from consumable products in the workplace. It also provides team members an opportunity to practice sustainability when working at home.
Quote for the day:
"I have a different vision of leadership. A leadership is someone who brings people together." -- George W. Bush