Daily Tech Digest - October 07, 2023

No Need to Have a 'FOBO' for AI

It is a well- known fact that before AI takes your job, someone using AI will take it. To stay relevant in the job market, it is then absolutely essential to adopt AI and automation tools to enhance one's productivity to ensure that his or her job is not rendered obsolete. Here are some strategies, which will help one stay ahead of the curve and be able to effectively compete and thrive in the fast paced and dynamic world of employment. ... Being Human: Human beings have evolved over centuries of evolution to become a superior race and embracing human emotions like empathy, gratitude, compassion, zeal to strive for the betterment of our fellow human beings will always keep us ahead of the game. This is what distinguishes us from machines. Interdisciplinary skills: Consider developing skills across multiple disciplines and combining them will make one more versatile and valuable to the employers. Problem Solving: It cannot be understated more, that problem solving and our ability to think critically to solve the complex problems around us will make us stay ahead of the machines. 

Driving Digital Transformation Through Model-Based Systems Engineering

Digital engineering is revolutionizing important areas such as the health care industry. From sophisticated imaging devices and robotic surgical systems to telemedicine platforms that connect doctors and patients across vast distances, each of these systems depends on the integration of numerous complex components, and each must operate seamlessly to ensure optimal performance. A key approach that relates systems engineering to digital transformation and digital engineering is model-based systems engineering (MBSE). Whereas traditional systems engineering relies on document-based approaches to support systems engineering activities (e.g., text-based requirements and design documents), MBSE does so by relying on digital system models instead. In essence, MBSE supports traditional systems engineering. It doesn’t replace it; rather, it offers an approach that aims to make systems engineering more efficient. 

Optimize Your Observability Spending in 5 Steps

You can’t use an observability agent on its own to put these steps into practice. Agents are simply neutral forwarders, sending out information to be processed downstream in the observability analysis tools. You could implement some of these steps using open source tools and in-house development, but this comes with increased operational cost and complexity, requiring your team to build expertise that is not core to your business. Overall, the main challenge with putting these steps into practice is that the available tools are either like agents, which simply send information, or like observability tools, which simply receive it. You need to be able to process telemetry data in stream, to be able to transform and route it as it passes from agent to tool, to optimize and shape it for your downstream requirements. Our Mezmo Telemetry Pipelines were conceived with the goal of helping organizations get better control of their data in stream. This approach enables you to control the flow between your data sources and your observability tools, and manage in detail the optimization of your data before it arrives downstream.

Why AI Regulations Are Needed to Check Risk and Misuse

Adopting a new technology poses certain risks, especially if it has not been previously deployed. That calls for certain risk mitigation strategies, such as testing, sandboxing, proof of concepts, and taking smaller steps such as minimum viable product, before complete adoption. Mahadevan believes there will always be risks and that we "amplify the risk" to a large extent today. "Companies need to follow a framework and put together a risk mitigation panel, rather than focus on the risk itself. I insist that AI and the risk mitigation should become a part of the blueprint. And this is not a job for a CIO alone, it is a job for a CHRO, the risk manager, and for operations," Mahadevan said. Deep fake and the violation of one's privacy is a hotly debated topic in the industry today. Thomas said deep fake will lead to many scams, causing victims to lose a lot of money. It is also a violation of one's privacy, and poses a substantial risk at an individual level. Deep fake technology uses a form of artificial intelligence called deep learning to create convincing videos, photo or audio clips of a subject, which are used for misinformation campaigns or to defraud/deceive relatives or friends.

New kind of quantum computer made using high-resolution microscope

It is unlikely to compete any time soon with the leading approaches to quantum computing, including those adopted by Google and IBM, as well as by many start-up companies. But the tactic could be used to study quantum properties in a variety of other chemical elements or even molecules, say the researchers who developed it. At some level, everything in nature is quantum and can, in principle, perform quantum computations. The hard part is to isolate quantum states called qubits — the quantum equivalent of the memory bits in a classical computer — from environmental disturbances, and to control them finely enough for such calculations to be achieved. Andreas Heinrich at the Institute for Basic Science in Seoul and his collaborators worked with nature’s ‘original’ qubit — the spin of the electron. Electrons act like tiny compass needles, and measuring the direction of their spin can yield only two possible values, ‘up’ or ‘down’, which correspond to the ‘0’ and ‘1’ of a classical bit. 

Net-zero carbon data centers: Expanding capacity amid evolving policy and regulation

The sting in the tail for data center developers, is that emissions associated with the IT process load are now to be included in the calculation. Given that the annual energy consumption of even a modestly sized facility could run to hundreds of thousands of megawatt hours (MWh), this represents a very substantial cost for developers – unless they can drive their on-site emissions down below the 35 percent threshold. Outside of London, there is currently no policy for carbon offsetting, but it seems likely that other local authorities will follow London’s lead and introduce similar schemes in the future. In some regions, particularly the Nordic’s, planning policy has been introduced requiring new data centers to provide waste heat to local district heating infrastructure, or to be ‘heat network ready’ for connection to future schemes. Whilst a policy of promoting heat reuse may not lead to a direct reduction in data center emissions, it is seen as an important step towards decarbonizing the wider community, by displacing other, more carbon intensive, sources of heat.

6 Key Personality Traits for Disruptive Innovation Leaders

“Disruptive innovators require a mindset focused on leapfrogging – creating or doing something radically new or different that produces a significant leap forward,” said Hightech Partners. “Disruptive leaders ensure that everything they do adds value to the market.” ... For companies, it is important that leaders understand how to continually push the limits of their teams, organizations, and partners. Some believe that disruptive leaders should also push boundaries. “Leaders who travel a lot, surrounding themselves with diverse people and entrepreneurs, are able to continually expand their mindset and creative problem solving abilities,” said the report. ... Disruptive leaders manage incredible levels of uncertainty. “Adaptive planning is an approach where actions lead to results and leaders take the opportunity to reflect on and learn from these actions and results,” said Hightech Partners. “Then, they can modify their assumptions and approaches accordingly.” ... The word “normal” doesn’t exist in a disruptive leader’s vocabulary, says the report. “Once something has become normal, it’s probably obsolete,” said Hightech Partners. 

Enterprise architecture creating sustainable business value

“If you imagine a company with a C-suite in the penthouse and the IT department maybe in the basement, and then the business department somewhere in between, enterprise architects are able to ride the elevator and they have the capability to exit the elevator on every floor. And they are also able to move around on that floor in a very free manner. “They do have their own office somewhere. Mostly it's on the floor where the IT department is, but they're barely in their office because they're constantly sitting in other people's offices to communicate, collaborate, bring together and enable people – riding the elevator up and down. ... “Business fluency and an understanding of how a business works, as well as the ability to have a holistic perspective on a complex problem, is crucial. It is important to not only look at one aspect, but also consider how that aspect might influence another aspect. That is also something that enterprise architects are trained for like nobody else. Therefore, I believe that the success of holistic sustainability will be a discipline of enterprise architecture.”

Achieving Scalable, Agile, and Comprehensive Data Management and Governance

“Data governance in general is fairly uneven,” he explained. “In terms of protecting sensitive data, there’s been improvement, though. Organizations have been more willing to shut down risky programs that may expose sensitive data even at the expense of losing competitive advantage rather than run afoul of regulations.” As a sign of this improvement, he added, 73% of survey respondents said they were at least somewhat successful at meeting their regulatory and compliance objectives. Another key concern Stodder discussed was the highly distributed nature of today’s data environment. “Creating data silos goes hand in hand with data democratization,” he said. “Forty-one percent of our survey respondents said managing data silos was one of their top three challenges.” To address this, he said, many are turning to solutions such as data virtualization, data fabrics, or data meshes. He also added that the research showed roughly 30% as already using data virtualization and about the same number planning to.

Global Cyberespionage Operations Surging, Microsoft Warns

Microsoft reports that when it comes to cyber operations and intelligence gathering, nominal allies target each other. Despite last month's meeting between Russian President Vladimir Putin and North Korean hereditary dictator Kim Jong Un, Pyongyang continues to run Moscow-focused espionage operations, especially focused on "nuclear energy, defense and government policy intelligence collection." Alongside the risk posed by nation-state groups, the threat posed by criminals also continues to intensify. "Ransomware‐as‐ a-service and phishing-as-a-service are key threats to businesses, and cybercriminals have conducted business email compromise and other cybercrimes, largely undeterred by the increasing commitment of global law enforcement resources," Burt said. Microsoft said that from September 2022 through July, it saw the number of human-operated or "hands on keyboard" ransomware attacks double compared to less sophisticated, fully automated attacks. Since last November, it said, it saw the number of security incidents that appeared to lead to data exfiltration double.

Quote for the day:

''Success is a state of mind. If you want success start thinking of yourself as a sucess." -- Joyce Brothers

No comments:

Post a Comment