Daily Tech Digest - January 02, 2023

5 ways CIOs will disappoint their CEOs in 2023

Promise #1: The cloud will save money. Disappointment: It never did, and still won’t Why it won’t: You can buy servers as cheaply as the cloud providers, and they need to add a profit margin when they charge you for using them. What you should promise instead: Unlike on-premises infrastructure, the cloud lets IT easily add capacity in small increments when demand requires it. And — and this is the biggie — it also lets IT shed capacity when it’s no longer needed. The result? When demand is seasonal or unpredictable the cloud truly does save money. But when demand is steady, or increases in demand are predictable, on-premises infrastructure costs less. In the cloud, fixed costs are small but incremental costs are big. The costs of on-premises systems are the opposite. ... Promise #4: ‘Agile’ means no more big-project failures. Disappointment: Your name will be on some miserable Agile project failures this year What’s going to go wrong: Your company is going to make three Agile mistakes. The first, and worst, is that it won’t lose the habit of insisting on multitasking — developers will still be asked to juggle multiple competing projects, and their top priority will still be the next phone call.


Digital transformation: 4 security tips for 2023

Cybersecurity training keeps employees, customers, and vendors safe from cyberattacks. Take the initiative to seek out top-of-the-line training resources that will walk you through every aspect of promoting a secure environment. Training does not need to be expensive. Learn how to avoid data breaches, cultivate a security-first mindset, and maintain airtight security. While no measure can prevent a cyberattack entirely, proper training can help minimize your risk and reduce the chance of a breach. In addition, continue to sweat the small stuff. While one weak password or phishing email may not seem like a big deal, it’s in your best interest to take every threat seriously. Implement strong password complexity controls and policies, develop and maintain phishing campaigns, track user activity, and create policies for sharing information on the internet. For example, posting information on social media could reveal answers to common security questions. Staying vigilant will help your organization avoid trouble in the future.


Wireless electronics can power trillions of IoT sensors. Here's how

We are yet to witness the full potential of IoT, but before that, we need to overcome a big challenge. The sensors that make IoT networks possible require power to stay functional, and unfortunately, our existing energy solutions are not enough to support this demand. A team of researchers at King Abdullah University of Science and Technology (KAUST) in Saudi Arabia has been working on this problem and in their latest study, they propose an interesting solution. The authors reveal details about wireless-powered electronics that promise to meet the energy demands of IoT networks in a sustainable and eco-friendly manner. Sensors are currently powered by technologies like Li-ion batteries. Although batteries can power a large network of devices, they need to be replaced again and again. Therefore a battery-based approach is expensive, unsustainable, and harmful to the environment. For instance, conventional batteries are made of metals that are procured through mining activities resulting in air and soil contamination. Plus, when these batteries are not carefully disposed of, they release toxic chemicals into our environment.


Agile vs. waterfall: Comparing project management cultures

Waterfall and agile culture are different forms of managing software projects, but they are made of the same constituent concept: people managing people. The values we covered, on the other hand, are not interchangeable. They are different in kind, they are indeed the quintessential difference between agile and waterfall. Following the scrum guide by the book, having squads, agile coaches, dailies, and meetups might make you show up as agile, but unless your values are aligned with the Manifesto, you’re just dressing waterfall as agility. This is precisely the scenario we have been witnessing in the last few years. As more and more companies see the results of strong agile culture creating unicorns and industry juggernauts, more of them want a quick way to execute digital transformation. What happens is that they start practicing agile, but keep the waterfall values of control with a lack of flexibility and hierarchy. Even worse, since the number of successfully transformed companies is way smaller than those who just pretend to have transitioned, more and more people have no experience with agile values, leading them to believe that doing agile with waterfall values is perfectly normal.


What Rust Brings to Frontend and Web Development

“Rust to WebAssembly is one of the most mature paths because there’s a lot of overlap between the communities,” Gardner told The New Stack. “A lot of people are interested in both Rust and WebAssembly at the same time.” It’s not an either “Rust or JavaScript” or even “WebAssembly or JavaScript” situation, he said. It’s possible to blend WebAssembly with JavaScript. “You’re going to see some people rewrite for WebAssembly, but you’re going to see some people take advantage of WebAssembly where appropriate, and then use JavaScript for connecting the various pieces under the hood, and maybe running portions of the application as necessary,” he said. ... Chris Siebenmann, a Unix systems administrator at the University of Toronto’s CS Labs, has a theory about that: Languages spread when developers like using the language to accomplish things that matter to them. Right now, that language is Rust. “Rust is a wave of the future because a lot of people are fond of it and they are writing more and more things in Rust, and some of these things are things that matter to plenty of people,” Siebenmann wrote in 2021.


An Entity to DTO

According to Martin Fowler, DTO is: “An object that carries data between processes in order to reduce the number of method calls. When you're working with a remote interface, such as Remote Facade, each call to it is expensive. As a result, you need to reduce the number of calls. The solution is to create a Data Transfer Object that can hold all the data for the call.” So, initially, DTOs were intended to be used as a container for remote calls. In a perfect world, DTOs should not have any logic inside and be immutable. We use them only as state holders. Nowadays, many developers create DTOs to transfer data between application layers, even for in-app method calls. If we use JPA as a persistence layer, we can read an opinion that it is a bad practice to use entities in the business logic, and all entities should be immediately replaced by DTOs. We recently introduced DTO support in the JPA Buddy plugin. The plugin can create DTOs based on JPA entities produced by data access layer classes and vice versa – create entities based on POJOs. This allowed us to look at DTOs closer and see how we can use them on different occasions.


Blockchain & Internet Of Things Are A Perfect Match

It won’t all be plain sailing if we’re to migrate IoT workloads to a blockchain-based infrastructure. There are some key issues that need to be overcome, but luckily a number of interesting solutions are already being built. One of the main challenges with blockchain is that it’s not a low-latency protocol. As such, most blockchains process a very low number of transactions per second, and that presents issues for large-scale IoT device networks, as these require extremely rapid rates of data transfer to keep up. Ethereum, the world’s most popular smart contract blockchain, is only capable of processing around seven transactions per second, for example. Moreover, the Ethereum network is often congested, leading to high transaction costs. In its natural state, it’s not a realistic platform for large-scale IoT deployments. The answer to this problem may lie in scaling solutions like Boba Network, which is a Layer-2 network and hybrid compute platform that powers lightning fast transactions with much lower costs than traditional Layer-1 networks. Boba Network relies on a technology called optimistic rollups, which enable multiple transactions to be bundled into one and processed simultaneously. 


Getting data loss prevention right

DLP is not a plug-and-play solution. There is considerable prep work that must take place before anything is deployed. Reliable processes must exist for identifying data, performing continuous inspections, and verifying results. There must be a clear framework that identifies how data is classified, what gets blocked, and who is responsible for ultimately setting policies. Historically, many DLPs have relied on data access pattern recognition (REGEX), which offers mediocre insights into how data is used. In other words, even with the right people at the helm, the tools may be lackluster. DLP’s middling capabilities, often wielded by untrained IT departments, have given it a reputation for over-promising and under-delivering. Without a strong ability to apply context to data, many DLPs are glorified string-matching tools that overwhelm analysts with false positives. ... Much of DLP’s shortcomings are attributable to untrained staff or poor implementations. Some DLPs are built upon frameworks with functional limitations that may negatively impact their effectiveness. 


Ransomware ecosystem becoming more diverse for 2023

The ransomware ecosystem has changed significantly in 2022, with attackers shifting from large groups that dominated the landscape toward smaller ransomware-as-a-service (RaaS) operations in search of more flexibility and drawing less attention from law enforcement. This democratization of ransomware is bad news for organizations because it also brought in a diversification of tactics, techniques, and procedures (TTPs), more indicators of compromise (IOCs) to track, and potentially more hurdles to jump through when trying to negotiate or pay ransoms. ...  "Fast forward to this year, when the ransomware scene seems as dynamic as ever, with various groups adapting to increased disruptive efforts by law enforcement and private industry, infighting and insider threats, and a competitive market that has developers and operators shifting their affiliation continuously in search of the most lucrative ransomware operation." ... This trend is likely to continue in 2023 with ransomware groups expected to come up with new extortion tactics to monetize attacks on victims where they're detected before deploying the final ransomware payload.


Driving Employee Retention and Performance Through Recruiting

When the job market reopened as the pandemic wound down, there simply weren’t enough workers to fill jobs. Recruiters and hiring managers were under a lot of pressure to fill roles and fill them fast. The Muse CEO and founder Kathryn Minshew explains it this way: With companies desperate to hire and HR pros stretched thin, recruiters may be going rogue and stretching the truth to fill roles. Or, they could say things they think are true, but they don’t have the full picture of the workplace experience. She advises companies to be honest about what it’s like to work there, including successes as well as areas for improvement. Interviews should be a two-way street, and you must give candidates enough time to ask questions about company culture. "When people feel like they have opted into a situation with eyes wide open," Minshew says, "they’re much more likely to accept the good and the bad, and to show up as engaged, productive, satisfied employees. Rather than fluffy mission statements, what if you were able to openly and transparently connect candidates to their personal purpose from their first connection to your employer brand?



Quote for the day:

"A lot of people have gone farther than they thought they could because someone else thought they could. " -- Zig Zigler

No comments:

Post a Comment