Showing posts with label Business Process Management. Show all posts
Showing posts with label Business Process Management. Show all posts

Daily Tech Digest - April 16, 2026


Quote for the day:

“You may be disappointed if you fail, but you are doomed if you don’t try.” -- Beverly Sills


🎧 Listen to this digest on YouTube Music

▶ Play Audio Digest

Duration: 21 mins • Perfect for listening on the go.


How technical debt turns your IT infrastructure into a game you can’t win

Technical debt is compared to a high-stakes game of Jenga where every shortcut or deferred refactoring pulls a vital block from an organization’s structural foundation. Initially, quick fixes seem harmless, driven by aggressive deadlines and resource constraints; however, they eventually create a "velocity trap" where development speed plummets because engineers spend more time navigating fragile code than building new features. Beyond slow shipping, this debt manifests as a silent budget killer through architectural mismatches—such as using stateless frameworks for real-time systems—resulting in exorbitant cloud costs and significant cybersecurity vulnerabilities, evidenced by massive data breaches at firms like Equifax. While agile startups leverage modern, scalable architectures to outpace incumbents, many established organizations suffer because their internal culture discourages developers from addressing these structural issues, viewing refactoring as a distraction from value creation. To break this cycle, businesses must move beyond pretending the trade-off doesn’t exist. Successful companies explicitly measure their "technical debt ratio," tracking the percentage of engineering time spent on maintenance versus innovation. By acknowledging that high-quality code is a strategic asset rather than an optional luxury, organizations can stop pulling the "safe blocks" of their infrastructure and instead build the resilient, high-velocity systems required to survive in an increasingly competitive global market.


The Compliance Blueprint: Handling Minors’ Data in the Post-DPDP Era

The blog post titled "The Compliance Blueprint: Handling Minors’ Data in the Post-DPDP Era" explores the stringent regulatory landscape established by India’s Digital Personal Data Protection (DPDP) Act regarding users under eighteen. Under Section 9, organizations face significant mandates, including securing verifiable parental consent, prohibiting behavioral tracking, and banning targeted advertising to children. Failure to comply can result in catastrophic penalties of up to ₹200 Crore, making data protection a critical operational priority rather than a mere policy update. The author outlines various verification methods, such as utilizing government-backed tokens or linked family accounts, while highlighting the "implementation paradox" where verifying age often requires collecting even more sensitive data. Operationally, businesses must redesign user interfaces to "fork" into protective modes for minors, provide itemized notices in multiple languages, and maintain detailed audit logs. Despite the heavy compliance burden and challenges like the "death of personalization" for EdTech and gaming firms, the Act serves as a vital safeguard for India’s 450 million children. Ultimately, the article advises companies to adopt a "Safety First" mindset, viewing children’s data as a potential liability that necessitates a fundamental shift in product design and data governance to ensure long-term viability in the Indian digital ecosystem.


The need for a board-level definition of cyber resilience

The article emphasizes that the lack of a standardized definition for cyber resilience creates significant systemic risks for organizational boards and executive teams. Currently, conceptual fragmentation across various regulatory frameworks makes it difficult for leadership to determine what to oversee or how to measure success. To address this, the focus must shift from technical metrics and security controls toward broader business outcomes, such as maintaining operational continuity, preserving stakeholder confidence, and ensuring financial stability during disruptions. Cyber resilience is increasingly framed as a core leadership responsibility, with many jurisdictions now legally requiring boards to oversee these outcomes. However, a major point of contention remains regarding the scope of resilience—specifically whether it includes proactive preparedness or is limited strictly to response and recovery phases. Furthermore, resilience is no longer just about defending against cybercrime; it encompasses all forms of digital disruption, including unintentional outages. As global economies become more interdependent, an individual organization’s ability to recover quickly is essential not only for its own survival but also for overall economic stability. Ultimately, establishing a clear, board-level definition is a critical governance requirement that provides the foundation for navigating the complexities of modern digital economies and ensuring long-term institutional health.


2026 global semiconductor industry outlook: Delloite

Deloitte’s 2026 global semiconductor industry outlook forecasts a transformative year, with annual sales projected to reach a historic peak of $975 billion. Driven primarily by an intensifying artificial intelligence infrastructure boom, the sector expects a remarkable 26% growth rate following a robust 2025. This surge is reflected in the staggering $9.5 trillion market capitalization of the top ten global chip companies, though wealth remains highly concentrated among the top three leaders. While AI chips generate half of total revenue, they represent less than 0.2% of total unit volume, creating a stark structural divergence. Personal computing and smartphone markets may face declines as specialized AI demand causes consumer memory prices to spike. Technological advancements will likely focus on integrating high-bandwidth memory via 3D stacking and adopting co-packaged optics to reduce power consumption by up to 50%. However, the outlook warns of a "high-stakes paradox." While the immediate future appears solid due to backlogged orders, 2027 and 2028 may face significant headwinds from power grid constraints—requiring 92 gigawatts of additional energy—and potential return-on-investment concerns. Ultimately, long-term success hinges on balancing aggressive AI investments with proactive risk mitigation against infrastructure limits and geopolitical shifts, including India’s emergence as a vital back-end assembly hub.


New Executive Leadership Challenges Emerging—And What’s Driving Them

In the article "New Executive Leadership Challenges Emerging—And What's Driving Them," members of the Forbes Coaches Council highlight a significant shift in the corporate landscape driven by hybrid work, AI integration, and rapid systemic change. Today’s executives face a "leadership vortex," where they must navigate role compression and overwhelming demands while maintaining strategic clarity. A primary challenge is rebuilding connection in hybrid environments, where communication gaps are more visible and psychological safety is harder to cultivate. Leaders are moving beyond traditional performance metrics to focus on their "being"—cultivating a leadership identity that prioritizes generative dialogue and mutual accountability over mere individual contribution. The rise of AI has introduced systemic ambiguity, requiring a pivot from "expert" to "explorer" to manage fears of obsolescence. Furthermore, the modern era demands a heightened appetite for change and a renewed focus on team cohesion, as previous playbooks rewarding certainty and control become less effective. Ultimately, successful leadership now hinges on expanding personal capacity and translating technical uncertainty into a shared, meaningful vision. This evolution reflects a broader trend where emotional intelligence and adaptive identity are as critical as technical expertise in steering organizations through unprecedented volatility and complexity.


New US Air Force Office Will Focus on OT Cybersecurity

The U.S. Air Force has pioneered a critical shift in military defense by establishing the Cyber Resiliency Office for Control Systems (CROCS), the first dedicated office within the American military services focused specifically on operational technology (OT) cybersecurity. Launched to address vulnerabilities in essential infrastructure like power grids, water supplies, and HVAC systems, CROCS serves as a central "front door" for managing the security of non-traditional IT assets that are vital for mission readiness. While the office reached initial operating capability in 2024, its creation followed years of bureaucratic effort to recognize OT systems as primary targets for foreign adversaries seeking asymmetric advantages. A significant milestone for the office was successfully integrating OT security costs into the Department of Defense’s long-term budgeting process, ensuring that assessments, training, and mitigations are formally funded rather than treated as secondary mandates. Directed by Daryl Haegley, CROCS does not execute all security tasks directly but instead coordinates contracts, personnel, and prioritized strategies to bridge reporting gaps between engineering teams and the CIO. By modeling itself after the Air Force’s existing weapon systems resiliency office, CROCS aims to build a robust defense pipeline, ultimately securing the foundational utilities that allow the military to function globally.


Rethinking Business Processes for the Age of AI

The article "Rethinking Business Processes for the Age of AI" by Vasily Yamaletdinov explores the fundamental evolution of business architecture as organizations transition from human-centric automation to agentic AI systems. Traditionally, business processes have relied on BPMN 2.0, a notation designed for deterministic, repeatable, and rigid sequences. However, these classical methods struggle with the non-deterministic nature of AI, which requires dynamic planning and context-driven decision-making. The author argues that modern AI-native processes must shift from "rigid conveyor belts" to flexible systems that prioritize goals, guardrails, and autonomy over strict algorithmic steps. To address the limitations of traditional BPMN—such as poor exception handling and an inability to model uncertainty—the article advocates for Goal-Oriented BPMN (GO-BPMN). This approach decomposes processes into a tree of objectives and modular plans, allowing AI agents to dynamically select the best path based on real-time context. By integrating a "Human-in-the-loop" framework and supporting the "Reason-Act-Observe" cycle, GO-BPMN enables a hybrid environment where deterministic operations and intelligent agents coexist. Ultimately, while traditional modeling remains valuable for highly regulated tasks, GO-BPMN provides the necessary framework for building resilient, adaptive, and truly intelligent enterprise operations in the burgeoning age of AI.


Runtime FinOps: Making Cloud Cost Observable

The article "Runtime FinOps: Making Cloud Cost Observable" argues for transforming cloud spend from a delayed financial report into a real-time system metric. Author David Iyanu Jonathan identifies a "structural information deficit" in modern engineering, where the lag between code deployment and billing visibility prevents timely remediation of expensive inefficiencies. Runtime FinOps addresses this by integrating cost data directly into observability tools like Grafana, enabling "dollars-per-minute" tracking alongside traditional metrics like latency and CPU usage. While static infrastructure estimation tools like Infracost provide initial value, they often fail to capture variable operational costs such as data transfer and API calls that scale with traffic patterns. To bridge this gap, the piece advocates for adopting SRE-inspired practices, including cost-based error budgets, robust tagging governance, and routing anomaly alerts directly to on-call engineering teams rather than isolated finance departments. This shift fosters a culture of accountability where costs are treated as visceral signals during blameless postmortems and architectural reviews. Ultimately, the article concludes that the primary barriers to effective FinOps are cultural rather than technical; success requires clear service-level ownership and a fundamental commitment to treating cloud expenditure as a critical performance indicator that is functionally inseparable from the code itself.


Shadow AI and the new visibility gap in software development

The rise of "shadow AI" in software development has introduced a significant visibility gap, posing new challenges for organizations and managed service providers. As developers increasingly turn to unapproved AI tools and agents to boost productivity, they inadvertently create a "lethal trifecta" of risks involving sensitive private data, external communications, and vulnerability to malicious prompt injections. This unauthorized usage bypasses traditional security monitoring like SaaS discovery platforms because AI agents often operate within local engineering environments or through personal API keys. To address this, the article suggests shifting from futile attempts to block AI toward a governance-first infrastructure. By routing AI access through centrally managed platforms and implementing process-level controls at runtime, organizations can secure data flows and restrict agents to approved services without stifling innovation. This approach allows developers to maintain their preferred workflows while providing the oversight necessary to prevent code leaks and compliance breaches. Ultimately, closing the visibility gap requires building governance around fundamental development processes rather than individual tools, enabling partners to guide businesses through a secure evolution of AI integration that scales from initial modernization to advanced agentic automation.


Audit: Big Tech Often Ignores CA Privacy Law Opt-Out Requests

A recent independent audit conducted by privacy organization WebXray reveals that major technology companies, specifically Google, Meta, and Microsoft, frequently fail to honor legally mandated data collection opt-out requests in California. Despite the California Consumer Privacy Act (CCPA) requiring businesses to respect the Global Privacy Control (GPC) signal—a browser-based mechanism allowing users to decline personal data sharing—the audit found widespread non-compliance. Google emerged as the worst offender with an 86% failure rate, followed by Meta at 69% and Microsoft at 50%. Researchers observed that Google’s servers often respond to opt-out signals by explicitly commanding the creation of advertising cookies, such as the “IDE” cookie, effectively ignoring the user's preference in "plain sight." In response, Meta dismissed the findings as a “marketing ploy,” while Microsoft claimed that some cookies remain necessary for operational functions rather than unauthorized tracking. This systemic disregard for privacy signals underscores the ongoing tension between Big Tech and state regulations. To address these gaps, the report recommends that security professionals treat privacy telemetry with the same rigor as security data, conducting frequent audits of third-party data flows and aligning runtime behavior with privacy controls to ensure legitimate regulatory compliance.

Daily Tech Digest - July 24, 2022

AI can see things we can’t – but does that include the future?

“What we focus on is augmented intelligence for humans to take action [on],” says Radtke when I raise this concern. “We are not prescribing the action to be taken based on the insights that we get – we're trying to make sure that the human has all the necessary intelligence to drive the behavior that they need to drive. We're reporting facts back – this actually happened here, this is what has happened in the past – and you can take action based on that. It's all about driving improved safety for everyone in that area.” When I press him on the possible human rights concern and the inevitable pushback that will arise if AI is routinely used to pre-emptively police areas deemed as problematic, he answers: “I think that with every technology that's ever been out there in history there is always a way to use it for non-good. I think you have to focus on the good that it can provide and make sure that you police the non-good behavior that could happen from it.” This will entail some sort of oversight. “There are consortiums out there to help drive the ethical adoption of AI throughout the industry – we definitely keep aware of those.


RPA vs. BPA: Which approach to automation should you use?

Where BPA and RPA overlap, according to Mullakara, is the goal of eliminating human intervention in order to process multiple automation. “The whole idea of BPA was to remove people from the process and that's kind of what RPA is also aiming for. In the sense of the simple workflow automation, both can do it. RPA does it through a UI integration whereas BPA does it mostly with APIs. And you know, automating the workflow with the systems by invoking the systems,” he tells us. However, Taulli explains that automation really won’t get rid of people at this point and it will be the usual suspects that will, such as recessions. Mullakara agrees that this messaging for BPA and RPA is a common misconception and has earned both technologies quite a bad rap. “So, what you actually automate with RPA for example is tasks – it's not jobs. It's not an entire job even if it's a process. It’s not jobs, so we still need people,” he says. 


All the Things a Service Mesh Can Do

Many organizations have different teams and services dispersed across different networks and regions of a given cloud. Many also have services deployed across multiple cloud environments. Securely connecting these services across different cloud networks is a highly desirable function that typically requires significant effort by network teams. In addition, limitations that require non-overlapping Classless Inter-Domain Routing (CIDR) ranges between subnets can prevent network connectivity between virtual private clouds (VPCs) and virtual networks (VNETs). Service mesh products can securely connect services running on different cloud networks without requiring the same level of effort. HashiCorp Consul, for example, supports a multidata center topology that uses mesh gateways to establish secure connections between multiple Consul deployments running in different networks across clouds. Team A can deploy a Consul cluster on EKS. Team B can deploy a separate Consul cluster on AKS. Team C can deploy a Consul cluster on virtual machines in a private on-premises data center. 


Snowballing Ransomware Variants Highlight Growing Threat to VMware ESXi Environments

The proliferation of ransomware targeting ESXi systems poses a major threat to organizations using the technology, security experts have noted. An attacker that gains access to an EXSi host system can infect all virtual machines running on it and the host itself. If the host is part of a larger cluster with shared storage volumes, an attacker can infect all VMs in the cluster as well, causing widespread damage. "If a VMware guest server is encrypted at the operating system level, recovery from VMware backups or snapshots can be fairly easy," McGuffin says. '[But] if the VMware server itself is used to encrypt the guests, those backups and snapshots are likely encrypted as well." Recovering from such an attack would require first recovering the infrastructure and then the virtual machines. "Organizations should consider truly offline storage for backups where they will be unavailable for attackers to encrypt," McGuffin adds. Vulnerabilities are another factor that is likely fueling attacker interest in ESXi. VMware has disclosed multiple vulnerabilities in recent months.


5 typical beginner mistakes in Machine Learning

Tree-based models don’t need data normalization as feature raw values are not used as multipliers and outliers don’t impact them. Neural Networks might not need the explicit normalization as well — for example, if the network already contains the layer handling normalization inside (e.g. BatchNormalization of Keras library). And in some cases, even Linear Regression might not need data normalization. This is when all the features are already in similar value ranges and have the same meaning. For example, if the model is applied for the time-series data and all the features are the historical values of the same parameter. In practice, applying unneeded data normalization won’t necessarily hurt the model. Mostly, the results in these cases will be very similar to skipped normalization. However, having additional unnecessary data transformation will complicate the solution and will increase the risk of introducing some bugs.


Git for Network Engineers Series – The Basics

Version control systems, primarily Git, are becoming more and more prevalent outside of the realm of software development. The increase in DevOps, network automation, and infrastructure as code practices over the last decade has made it even more important to not only be familiar with Git, but proficient with it. As teams move into the realm of infrastructure as code, understanding and using Git is a key skill. ... Unlike other Version Control Systems, Git uses a snapshot method to track changes instead of a delta-based method. Every time you commit in Git, it basically takes a snapshot of those files that have been changed while simply linking unchanged files to a previous snapshot, efficiently storing the history of the files. Think of it as a series of snapshots where only the changed files are referenced in the snapshot, and unchanged files are referenced in previous snapshots. Git operations are local, for the most part, meaning it does not need to interact with a remote or central repository. 


Deep learning delivers proactive cyber defense

The timing couldn’t be better. The increasing availability of ransomware-as-a-service offerings, such as ransomware kits and target lists, are making it easier than ever for bad actors—even those with limited experience—to launch a ransomware attack, causing crippling damage in the very first moments of infection. Other sophisticated attackers use targeted strikes, in which the ransomware is placed inside the network to trigger on command. Another cause for concern is the increasing disappearance of an IT environment’s perimeter as cloud compute storage and resources move to the edge. Today’s organizations must secure endpoints or entry points of end-user devices, such as desktops, laptops, and mobile devices, from being exploited by malicious hackers—a challenging feat, according to Michael Suby, research vice president, security and trust, at IDC. “Attacks continue to evolve, as do the endpoints themselves and the end users who utilize their devices,” he says. “These dynamic circumstances create a trifecta for bad actors to enter and establish a presence on any endpoint and use that endpoint to stage an attack sequence.”


Towards Geometric Deep Learning III: First Geometric Architectures

The neocognitron consisted of interleaved S- and C-layers of neurons (a naming convention reflecting its inspiration in the biological visual cortex); the neurons in each layer were arranged in 2D arrays following the structure of the input image (‘retinotopic’), with multiple ‘cell-planes’ (feature maps in modern terminology) per layer. The S-layers were designed to be translationally symmetric: they aggregated inputs from a local receptive field using shared learnable weights, resulting in cells in a single cell-plane have receptive fields of the same function, but at different positions. The rationale was to pick up patterns that could appear anywhere in the input. The C-layers were fixed and performed local pooling (a weighted average), affording insensitivity to the specific location of the pattern: a C-neuron would be activated if any of the neurons in its input are activated. Since the main application of the neocognitron was character recognition, translation invariance was crucial. 


Don’t Just Climb the Ladder. Explore the Jungle Gym

Most of us do not approach work (or life) with a master plan in mind, and many of the steps we take are beautiful accidents that help us become who we are. “I’m 67 years old,” Guy said, “and I think I finally found my true calling.” He was referring to his podcast, Remarkable People, where he interviews exceptional leaders and innovators (think Jane Goodall, Neil deGrasse Tyson, Steve Wozniak, and Kristi Yamaguchi) about how they got to be remarkable. “In a sense, my whole career has prepared me for this moment. I’ve had decades of experience in startups and large companies. So that gives me the data to ask great questions that my listeners really want the answers to,” Guy said. Guy is undeniably brilliant, and his success is no accident. But still, he believes that luck has played a part in his success. In his words, “Basically, I’ve come to the conclusion that it’s better to be lucky than smart.” Maybe Guy is right. Or perhaps, the smartest people know when to take advantage of luck and act on the opportunities that present themselves. Whatever the case, it’s important to take calculated risks.


Should You Invest in a Digital Transformation Office?

With the digital transformation office comes a transformation team, who initiates organizational change. Laute says that it’s crucial that everyone inside the organization stand behind the transformation team if they truly want to see changes happening. “You need to have an environment where these people, the transformation lead and the transformation team, are allowed and are not afraid to speak up. These people shouldn't be biased, not just following what the executive board says, but really [being] able to challenge and to speak up. And they should have the freedom to call out if something is going in the wrong direction, may it be content or behavioral-wise,” she explains. And while clearly there can be technology-related challenges, Laute tells us that digital transformation is also a people problem, and calls for a change in culture and mindset in order to find success. The cultural shift, she explains, is truly where everything starts to come together in order to get the transformation going. “Digital [transformation] is not only technology. You need to change behaviors and you need to change processes. And most of the time, you change your target operating model, right?”



Quote for the day:

"Uncertainty is a permanent part of the leadership landscape. It never goes away." -- Andy Stanley

Daily Tech Digest - December 09, 2021

How should we regulate DeFi?

There is opportunity for the appropriate level of regulation to give DeFi enough breathing space to make a difference: boosting transparency, increasing financial inclusion and enabling credit to 8 billion people that will see the world take a tremendous jump toward prosperity. Yet there is also potential for overreach that would stifle innovation and growth and have unintended consequences. Unfortunately, we seem to be well down this path already. What is needed is the realization that DeFi shares many of the same goals as financial regulators: overhauling inflexible processes and delivering wider access, cheaper prices and more stability — all while ensuring these benefits are widely shared with all participants in the market. ... DeFi has the potential to create fairer, more transparent and more liquid markets through completely new mechanisms, helping everyone to reduce fraud and front-running, resolving fragmentation and creating markets that are efficient, resilient, fair and equally accessible to all — not just participants that have the right connections.


How to make agile actually work for analytics

The most striking difference between what we do and what software developers do is in our end products. In software, the goal is to get to a product that the end-user loves. In data, our goal is to help people make a decision they trust, and the journey the user takes to get there can be just as important as the end result. Most commonly we see this manifested in how we tell stories with our data. We use notebooks to capture context and process, and presentations to guide users to an understanding. It’s in this process that we establish trust, turn charts into insights, and make our data valuable. This is also the driver behind one of the greatest pains of our work: the follow-up questions, and ad-hoc requests. These questions and requests come from a place of curiosity and represent a desire to have that same intimate understanding of data that we get in crafted data stories. And yet, in practice, we try to eliminate these questions with processes that front-load requirements gathering and tools that have made no room for this way of working.


Cloudentity SaaS platform enables zero trust access control for APIs

Deployable in minutes, Cloudentity empowers businesses to deliver Open Banking, Embedded Finance and other innovative online services without changing identity providers or application code. Cloudentity delivers a declarative identity and authorization framework that works across any cloud to simplify access control and data governance. From Open Banking to eCommerce fraud prevention, Cloudentity makes it easier to deliver cloud-native applications and safer to extend your data to the customers and partners that matter most. A standout capability of the new SaaS platform is its drag and drop Data Lineage feature, which provides a simple and intuitive way of mapping identity and user context data to an application. For developers, Data Lineage solves the complexities of Single Sign On (SSO) and provides real-time control over who can access each element of your API data. For ITops, DevOps and SecurityOps, teams can rapidly validate controls and pinpoint areas that need to be updated or fixed to prevent API data leakage and meet personal data protection obligations.


SaaS DR/BC: If You Think Cloud Data is Forever, Think Again.

Humans and technology have always had co-dependent challenges. Let’s face it, it’s one of the main reasons my career exists! So it stands to reason that human inference, whether deliberate or not, is a common reason for losing information. This can be as innocuous as uploading a CSV file that corrupts data sets, accidentally deleting product listings, or overwriting code repositories with a forced push. There’s also intentional human interference. This means someone who has authorized access, nuking a bunch of stuff. It may sound far-fetched but we have seen terminated employees or third-party contractors cause major issues. It’s not very common, but it happens. Cyberthreats are next on the list, which are all issues that most technical operations teams are used to. Most of my peers are aware that the level of attacks increased during the global pandemic, but the rate of attacks had already been increasing prior to COVID-19. Ransomware, phishing, DDoS, and more are all being used to target and disrupt business operations. If this happens, data can be compromised or completely wiped out.


Starting an SRE Team? Stay Away From Uptime.

Why shouldn't you be too concerned about your uptime metrics? In reality SRE can mean different things to different teams but at its core, it’s about making sure your service is reliable. After all, it’s right there in the name. Because of this many people assume that uptime is the most valuable metric for SRE teams. That is flawed logic. For instance, an app can be “up” but if it’s incredibly slow or its users don’t find it to be practically useful, then the app might as well be down. Simply keeping the lights on isn’t good enough and uptime alone doesn’t take into account things like degradation or if your site’s pages aren’t loading. It may sound counterintuitive, but SRE teams are in the customer service business. Customer happiness is the most important metric to pay attention to. If your service is running well and your customers are happy, then your SRE team is doing a good job. If your service is up and your customers aren’t happy, then your SRE team needs to reevaluate. A more holistic approach is to view your service in terms of health.
 

An opportunity is coming to drive up the number of women in tech

Another key element is creating the right culture and environment for diversity to thrive. In a gender context, an important aspect here is male allyship. Men have a real role to play in supporting the ‘levelling up’ agenda. They need to see that increasing gender diversity and equity is not just an issue for women themselves – it’s for everyone. They can become active allies through their own behaviours and actions. This extends right up to board level and executive leadership. We need to continue to work to influence leader behaviour and build their understanding of people’s different styles. Instances of men talking over women in the boardroom or not listening to ideas are still all too common. Reporting is also critical. You can’t change what you don’t measure. Collating diversity statistics and reporting them to the board and more widely around the business is an essential part of raising awareness and stimulating action. Transparent reporting was in fact seen as the most effective lever for improving diversity and inclusion in this year’s survey.


Is the “great resignation” coming for you?

When employees feel their personal ambitions are too difficult to achieve, they start to think about leaving. Those ambitions might involve having a family while maintaining a career, gaining a range of professional experiences, or even accumulating personal experiences such as travel. People will ask: “I don’t mind making sacrifices, but are the trade-offs producing the benefits I expected?” When that question surfaces, employees are already halfway out the door. For example, young men and women who are working extremely hard and don’t have time for friends, exercise, or adventures may start to doubt that the company is the right place for them—even if the pay is fabulous. ... Managers often show great care about performance and little concern about the whole person who is delivering the results. Feeling uncared for is deadly for motivation and destructive to performance over the long run. Many managers rarely ask about other aspects of their team members’ lives, their personal interests, or their ambitions. Too few managers show genuine understanding and appreciation for what it took to deliver such great results.


DevSecOps jobs: 3 ways to get hired

Automation is a major part of DevSecOps, and this requires the use of multiple software applications and tools. For example, companies use a variety of different application security testing tools (ASTs), which are essential to ensure that the code being used in development is safe and to prevent malicious packages from being introduced. These tools can be static (SAST), dynamic (DAST), and interactive (IAST) and they can also be from different vendors. Some may include automated vulnerability detection, prioritization, and even remediation capabilities that can address issues without requiring IT staff to spend much time researching vulnerabilities. The lesson: Many different tools are used in DevSecOps, and these will likely change as new innovations are introduced. Stay informed and updated on industry trends, especially if you are early in your journey because the tools and needs of today might be very different in a few years’ time. The idea behind shifting left and DevSecOps is to break down the traditional separation between developers, security, and IT professionals.


Google TAG Disrupts Blockchain-Enabled Botnet

Google is skeptical about the complete disruption of Glupteba's operations. It says: "The operators of Glupteba are likely to attempt to regain control of the botnet using a backup command and control mechanism that uses data encoded on the Bitcoin blockchain." The botnet also has a feature that allows it to evade traditional takedowns. TAG says that a conventional botnet-infected device looks for predetermined domain addresses that point to the C2 server. The instructions to locate these domains are hard-coded in the malware installed on the victim's device. If the predetermined domains are taken down by law enforcement agencies or others, the infected devices can no longer receive instructions from the C2 servers and therefore can no longer be operated by the bot controller. The Glupteba botnet, however, does not rely solely on predetermined domains to ensure its survival, the TAG researchers. They say that when the botnet’s C2 server is interrupted, Glupteba malware is hard-coded to search the public Bitcoin blockchain for transactions involving three specific Bitcoin addresses that are controlled by the Glupteba botnet operators.


You’re Doing it Wrong: It’s Not About Data and Applications – It’s About Processes

We often model processes to document them, to validate them with stakeholders, to teach them to others – and most of all, to improve them. In far too many companies, what they do and why they do it is implicit, not communicated well, and invites plenty of competing points of view as to what it really is. You need to tackle the process first before you attempt to automate any of its tasks. Not doing so would be like digging holes with a crane instead of a shovel, but without thinking about whether the holes are being dug in the right places (or should be dug at all). It’s not enough to think about saving time and money. Automating a process (not just its activity) documents it, makes it teachable and scalable, and goes a long way to reducing or eliminating mistakes (high profile errors can be a major catalyst for process automation). It also makes a process easily audited and monitored And it’s a lot easier to figure out how to improve a process you can see. And improvement is a must; if there’s one thing to expect when it comes to process automation, it’s change.



Quote for the day:

"Great Groups need to know that the person at the top will fight like a tiger for them." -- Warren G. Bennis

Daily Tech Digest - April 23, 2020

Indian IT desperately needed a new business model and coronavirus gave it one

remote-working-jeonghwaryu0.jpg
Some IT companies have implemented "employee productivity trackers like webcam-based movement capture, hourly timesheet entry, tracking of keyboards, and so on, to ensure employees are working at home," Yugal Joshi, vice-president at Texas-based consultancy Everest Group, told Quartz. "This indicates a deep-rooted malaise in Indian IT/ITes industry where the senior management generally mistrusts people," he added. Two, unlike the retail or manufacturing sectors that cannot operate with current social distancing norms, the top-tier Indian IT companies and their mid-sized brethren are responsible for keeping the lights on for a large collection global companies -- some of whom are depended on people every second of the day. This includes banks, utility companies, retailers, and, of course, pharmaceuticals. With the ongoing coronavirus outbreak, all of these industries are now being serviced from the apartments and houses of India's IT workforce, which as you can imagine, is a supremely difficult and exasperating task for everyone involved. Most of IT's clients have ironclad regulatory and privacy riders that have needed to be tweaked considerably in light of coronavirus.



How a basic cross-training program can ease disruptions on the IT team

If the coronavirus hasn't disrupted your business operations yet, there's a good chance it will soon. This first wave of illness will not be the last time the coronavirus disrupts daily business operations. First companies had to adjust to remote work for all employees. The next challenge may be filling in for colleagues who are out sick or caring for family members or friends who are ill. A cross-training program can make this transition go smoothly. Sam Maley, an IT operations manager at Bailey & Associates, an IT consultancy, said cross-training can minimize disruptions and reduce stress levels due to absenteeism. "Cross-training programs are designed to build versatility and skill overlaps in your team members," he said. Jeff Fleischman, CMO at the consulting firm Altimetrik, said cross-training needs to be part of business continuity plans. "To receive buy-in from top management, quantify the impact disruption has on the business such as revenue loss, reputational risk, defaulting on contractual obligations, and failing to meet regulatory requirements, and then explain how cross-training would eliminate these risks," Fleischman said.


Kubernetes vs. VMware: Drive the choice with IT architecture


The choice to run either containers in VMs vs. VMs in containers is an architectural design decision. This is because there's a line of thought that containers are the ideal abstraction for multi-cloud application delivery. Though VMware assures admins containers and VMs are the same in vSphere, it's difficult to draw a similar comparison for Kubernetes and VMs. Kubernetes is an orchestration product that admins use primarily for containers. In theory, Kubernetes could manage compute resources other than containers. However, a container as the primary abstraction layer means that traditional VM management tools don't map directly. Though networking can help solve this issue, KubeVirt could be the answer. KubeVirt uses Kubernetes network architecture and plugins rather than hypervisor abstractions, such as vSwitches, to manage networking. As a result, products must switch to network management based on Kubernetes namespaces. That's not necessarily a bad thing; it's just an overall change in operations mode from a VM-centric operating model to a container-centric operating model.



Researchers Release Open Source Counterfactual Machine Learning Library

Three Counterfactuals for Loan Application Scenario
Exactly what machine learning counterfactuals are, and the reasons why they are important, are best explained by example. Suppose a loan company has a trained ML model that is used to approve or decline customers' loan applications. The predictor variables (often called features in ML terminology) are things like annual income, debt, sex, savings, and so on. A customer submits a loan application. Their income is $45,000 with debt = $11,000 and their age is 29 and their savings is $6,000. The application is declined. A counterfactual is change to one or more predictor values that results in the opposite result. For example, one possible counterfactual could be stated in words as, "If your income was increased to $60,000 then your application would have been approved." In general, there will be many possible counterfactuals for a given ML model and set of inputs. Two other counterfactuals might be, "If your income was increased by $50,000 and debt was decreased to $9,000 then your application would have been approved" and, "If your income was increased to $48,000 and your age was changed to 36 then your application would have been approved." Figure 1 illustrates three such counterfactuals for a loan scenario.


What is value stream mapping? A lean technique for improving business processes

What is value stream mapping? A lean technique for improving business processes
Before you can start building a value stream map, you need to objectively evaluate your organization’s business processes, products and systems. Start by talking to leadership, department heads and other key stakeholders who can give you more insight into what can be improved. You’ll need to get hands-on experience with the process, product or system yourself and have other employees walk you through their part. It’s important to collect as much data as possible — for example, any inefficiencies in the process, how many workers are involved, what resources are used and any downtime. Any potentially relevant or noteworthy data is helpful in fleshing out your final VSM flow chart and achieving insights into what can be refined or improved. You’ll then create two separate VSM flow charts — a current state value stream map and a future state value stream map. Your current state VSM will be used to establish how the process currently runs and functions in the business. This is where you will demonstrate issues, significant findings and establish key requirements. The future state VSM, on the other hand, focuses on what your process will look like once your organization has completed all of the necessary improvements.


Ethernet consortium announces completion of 800GbE spec 

Network Networking Ethernet
Based on many of the technologies used in the current top-end 400 Gigabit Ethernet protocol, the new spec is formally known as 800GBASE-R. The consortium that designed it (then known as the 25 Gigabit Ethernet Consortium) was also instrumental in developing the 25, 50, and 100 Gigabit Ethernet protocols and includes Broadcom, Cisco, Google, and Microsoft among its members. The 800GbE spec adds new media access control (MAC) and physical coding sublayer (PCS) methods, which tweaks these functions to distribute data across eight physical lanes running at a native 106.25Gbps. (A lane can be a copper twisted pair or in optical cables, a strand of fiber or a wavelength.) The 800GBASE-R specification is built on two 400 GbE 2xClause PCSs to create a single MAC which operates at a combined 800Gbps. And while the focus is on eight 106.25G lanes, it's not locked in. It is possible to run 16 lanes at half the speed, or 53.125Gbps. The new standard offers half the latency of 400G Ethernet specification, but the new spec also cuts the forward error correction (FEC) overhead on networks running at 50 Gbps, 100 Gbps, and 200 Gbps by half, thus reducing the packet-processing load on the NIC.


Application performance for remote workers becomes primary network issue for businesses


In addition to the top-line finding of dealing with complexity and performance, the study also highlighted that cost had become less of an issue for respondents, who also cited significant investment in automation, security, cloud connectivity and the potential of 5G. Drilling deeper into the pressing issues for firms, Aryaka found that as the number of remote workers increases across the globe, productivity and remote application performance have become more important for organisations across Europe, the Middle East and Africa (EMEA). Some 45% of UK businesses noted that slow application performance led to a poor user experience for remote and mobile users, and that it was a significant issue faced by IT and support teams. Accessing and integrating cloud and software-as-a-service (SaaS) applications was one of the most pressing issues for UK IT departments, cited by 39%.


Ransomware is now the biggest online menace you need to worry about - here's why


One of the reasons why ransomware attacks have risen so much is because cyber criminals are increasingly viewing it as the simplest and quickest means of making money from compromised networks. With ransomware, attackers can lockdown an organisation's entire network and demand a bitcoin payment in exchange for the decryption key. Ransomware attacks are often successful because organisations opt to pay the ransom demand, viewing it as the quickest and easiest way to restore functionality to the network, despite authorities warning never to give into the demand of extortionists. These ransomware demands commonly reach six-figure sums and, because the transfer is made in bitcoin, it's relatively simple for the criminals to launder it without it being traced back to them. "The 'beauty' of the ransomware model is you only need to write the ransomware once and its potential to infect is only limited by its reach, which with the internet is unlimited," Ed Williams, EMEA director of SpiderLabs, the research division at Trustwave, told ZDNet.


Remote business continuity techniques to implement now


This is not just an issue when facing a pandemic. If your business continuity plan addresses only short-term disruptions, such as those that last less than a month, it may not be prepared for an extended outage. Your technology disaster recovery plan may need to be activated, assuming outages occur due to insufficient IT staff available or technology disruptions that occur due to a shortage of vendor personnel. Fortunately, many data centers are designed to operate without human intervention or with remote access to system administration functions. Technology vendors frequently use managed IT resources such as cloud-based systems to support their service offerings. This reduces the likelihood of outages as long as the managed service providers are able to keep their systems operational. As many organizations use remotely hosted applications, users can keep using those systems, so long as their vendors are able to keep their operations working. The real challenge for organizations that have mostly locally hosted systems and databases is to remotely manage those assets.


New Enterprise Graph Framework for Data Scientists Leverages Machine Learning

The new Neo4j for Graph Data Science framework is designed to enable data scientists to operationalize better analytics and machine learning models that infer behavior based on connected data and network structures Frame described. The framework, she said in a statement announcing the product release, is intended to provide the most expeditious way to generate better predictions. "A common misconception in data science is that more data increases accuracy and reduces false positives," she explained. "In reality, many data science models overlook the most predictive elements within data -- the connections and structures that lie within. Neo4j for Graph Data Science was conceived for this purpose -- to improve the predictive accuracy of machine learning, or answer previously unanswerable analytics questions, using the relationships inherent within existing data." 



Quote for the day:


"Leadership is the wise use of power. Power is the capacity to translate intention into reality and sustain it." -- Warren Bennis


Daily Tech Digest - January 26, 2020

AI to play a greater role in Financial Services in 2020


One of the major threats to productivity is the inability for FS firms to connect and organise all of the data they have at their disposal, so that they can use it as the basis for improved and new customer services. Compared to newer industry challengers, established banks and FS providers have far richer data going back decades or longer. If institutions could tap into this considerable resource, it could be used to distil invaluable intelligence and insights into consumer trends, product performance, and relative account profitability. Although organisations have all of the underlying information stored within their legacy systems, it is typically very difficult for teams to access, combine and cross-analyse this data. This is because, too often, systems are unconnected, use incompatible data formats and feature considerable data duplication between applications. In our research, FS providers confirm that, on average, they store information and content across nine different systems. And these systems tend to operate in silos: almost three-quarters of respondents say their organisation’s systems are not fully connected with each other.



Tridash 0.8: Stateful Applications using Functional Programming

With imperative programming, a typical implementation, of the sum application, involves attaching event listeners to both fields, which are called whenever their values change. In the event listener, the value entered in the text field is read from memory, and stored in a variable, a reference to another memory location, which is accessible to the internal sum component. A procedure is called to recompute the sum. This procedure reads the values of the internal variables, which store the values entered in the text fields, and computes the new sum. Finally this new sum has to be written to the memory, in which the value displayed to the user, is stored. The problem with this approach is that the synchronization of the application state, across all its components, is left entirely up to the programmer. This quickly becomes repetitive and the application logic is buried under layers of state updating and synchronization code. This approach is also inflexible to changes in the application's specification.


Competing in the Age of AI


Oddly enough, the AI that can drive the explosive growth of a digital firm often isn’t even all that sophisticated. To bring about dramatic change, AI doesn’t need to be the stuff of science fiction—indistinguishable from human behavior or simulating human reasoning, a capability sometimes referred to as “strong AI.” You need only a computer system to be able to perform tasks traditionally handled by people—what is often referred to as “weak AI.” With weak AI, the AI factory can already take on a range of critical decisions. In some cases it might manage information businesses (such as Google and Facebook). In other cases it will guide how the company builds, delivers, or operates actual physical products (like Amazon’s warehouse robots or Waymo, Google’s self-driving car service). But in all cases digital decision factories handle some of the most critical processes and operating decisions. Software makes up the core of the firm, while humans are moved to the edge.


What are the Most Valued Skills of an Enterprise Architect?

Enterprise architecture is the process by which an organization (or enterprise) aligns its business objectives with IT infrastructure. The strategies needed to execute this powerful approach involve those at the highest level of the business. IT capabilities and investments are guided by their alignment with the needs of the business as a whole. Enterprise architects must understand the strategy and develop the best way to execute it. As the need to ensure legacy programs, procedures, and technology are carefully managed to align and transform towards modern practices – through digital transformation or IT modernization – the enterprise architect must possess the skills of a technical specialist as well as those of a technical leader. ... These technical skills are tablestakes when it comes to being valuable to prospective employers, but exhibiting emotional intelligence and other soft skills will give you a real competitive edge as an enterprise architect.


Why the perception of digital transformation needs to change image
Many organisations call on digital transformation for a single project, without understanding how to fully utilise the process to bring about transformative, long-term change. To maximise transformation, businesses and leaders need to question everything – their operations, processes and current ways of working – to really understand what is and isn’t working, gaining a clear insight into what needs to be changed and why. In understansding how damaging the phrase ‘but we’ve always worked this way’ can be, business leaders start to shift their perceptions and focus on what they want their business to look like and why. Business leaders believe conventional digital transformation is about technology – in replacing it with ‘outcome realisation’, they will understand it’s not just about digital. It’s about people, hearts and minds – everything. A core part of ‘outcome realisation’ is having objectives, goals and targets; knowing exactly what you want from transformation and change.


Trend Micro antivirus zero-day used in Mitsubishi Electric hack

trend micro
This week, Japanese media dug deeper into the hack. According to reports, the hack first originated at a Mitsubishi Electric Chinese affiliate, and then spread to 14 of the company's departments/networks. The intrusion was allegedly detected after Mitsubishi Electric staff found a suspicious file on one of the company's servers. None of this was confirmed by the Japanese company, but discovered by Japanese reporters. The only technical detail in relation to the hack Mitsubishi Electric disclosed was the fact that hackers exploited a vulnerability in one of the antivirus products the company was using. A source with knowledge of the attack told ZDNet that the hackers exploited CVE-2019-18187, a directory traversal and arbitrary file upload vulnerability in the Trend Micro OfficeScan antivirus. According to a security advisory Trend Micro sent out in October 2019, "affected versions of OfficeScan could be exploited by an attacker utilizing a directory traversal vulnerability to extract files from an arbitrary zip file to a specific folder on the OfficeScan server, which could potentially lead to remote code execution (RCE)."



Project management v. business process management: What you need to know

Multiethnic businesspeople develop business strategy on whiteboard
Business process management involves the redesign and management of a company's internal processes or workflows. It isn't necessarily a project but an ongoing initiative to ensure a company's processes are effectively working to meet company goals. A company can kick off a specific process improvement project. That project would have a defined start and end, but the company would establish an ongoing process monitoring and management phase that continues after the project is closed. Project management has a defined start and end; it doesn't have any ongoing stages or components like process management does. Projects accomplish specific objectives within a set timeline and follow five unique phases: initiation, planning, execution, monitoring and controlling, and close. Projects are managed by a project manager and his or her team. In contrast, business process management initiatives can be managed by a business analyst, business process improvement specialist, or other functional team leads. Now that we've looked at each as a separate discipline, it's essential to recognize how business process management and project management must work together to create organizational success.


How AI Is Improving Omnichannel CyberSecurity In 2020

How AI Is Improving Omnichannel CyberSecurity in 2020
The survey’s results are noteworthy because they reflect how AI and machine learning-based fraud prevention techniques are helping retailers, financial services, insurance and restaurants to reduce false positives that in turn reduces friction for their customers. All industries are in an arms race with fraudsters, many of whom are using machine learning to thwart fraud prevention systems. There are a series of fraud prevention providers countering fraud and helping industries stay ahead. A leader in this field is Kount, with its Omniscore that provides digital businesses with what they need to fight fraud while providing the best possible customer experience. ... The insurance industry has a friendly fraud problem that is hard to catch. Over half of the financial institutions interviewed, 52%, plan to invest in additional technologies to secure existing accounts, and 46% plan to invest in better identity-verification measures. Based on the survey banks appear to be early adopters of AI and machine learning for fraud prevention.


2020: Disruption, The Changing Workplace And The Future Of Automation

2020: Disruption, the changing workplace and the future of automation
The workplace in 2020 will see ‘augmented collaboration’, with humans and robots increasingly working together side-by-side. This amalgamation of human and robots is already visible on the shop floor, as Amazon Go-style stores begin to spring up, allowing for a completely cashier-less retail experience. This isn’t necessarily new: people have been working collaboratively with tech such as laptops and mobile phones for many years. However, what’s new is the advent of human-machine convergence. This goes hand-in-hand with advanced robotic technology, powering anything from ‘smart glasses’ to intelligent assistants. Furthermore, autonomous machines will be capable of taking on even more tasks, enabling humans to focus on the real value-add work. On the flip side, companies will need to prepare their employees for this shift, as Gen Z start to enter the workforce. With their own unique set of demands and expectations, the new generation’s life experiences affect the types of jobs they seek and define what’s most important to them. They’re naturally tech-savvy, for example, with a recent survey finding that technology offered by an employer would influence the job choice of 91% of respondents.


Internet Security- Get Ready for the "Splinternet"

The main defense against the hypothetical 2028 scenario I described earlier is an economic one–at least when it comes to America shutting its doors to the global web, says Professor Rajneesh Narula, the John H. Dunning Chair of International Business at Henley Business School. “America’s bargaining power vis-a-vis such unilateral actions has declined considerably over the last 50 years. This is because there are multiple economic poles of strength, and as the U.S. becomes more inward looking it is pushing others to discover that when America sneezes the rest of the world no longer catches a cold–although some may also sneeze,” says Narula. Yet he does concede parts of America’s internet may splinter off from the rest of the global web. “I think there will be two levels to this trend–one level that will be a world wide web for e-commerce, while sensitive matters will roll into regional webs–it is already happening,” says Narula. “Can this be used for leverage by the U.S.? Only to a point, because the large U.S. [technology] firms will resist this vehemently. "



Quote for the day:



"A leader takes people where they would never go on their own." - Hans Finzel


Daily Tech Digest - October 14, 2018


According to the sources, global fintech companies reportedly sought an extension of the October 15 deadline but it seems that the RBI is not inclined to relax the norms. Data localisation requires data about residents be collected, processed, and stored inside the country, often before being transferred internationally, and usually transferred only after meeting local privacy or data protection laws. Although domestic companies have welcomed the guidelines, global companies fear increase in their expenses for creation of local servers. To avoid this rise in cost, global companies in recent meeting with the RBI proposed to provide mirror data instead of original data to which the central bank did not agree, the sources said. Last week, Finance Minister Arun Jaitley met RBI Deputy Governor B P Kanungo to discuss RBI’s data localisation norms. The meeting was also attended by Economic Affairs Secretary Subhash Chandra Garg, Financial Services Secretary Rajiv Kumar and IT Secretary Ajay Prakash Sawhney.



The Data Quality Tipping Point

The Data Quality Tipping Point
It’s clear that data is no longer harvested and stored. Data isn’t left to rest any longer. It is the lifeblood that flows through every department in the business. It’s not just the result of a decision: it’s the driving force for your next move. Old, inaccurate and messy data can’t support the marketing department. If the data is old, it cannot be used as a concrete and reliable resource. And if you aren’t continually cleaning new data that comes in, you can’t capitalise on trends, or make decisions on what is and isn’t working. So we’re clear that data quality initiatives must run in parallel to business activities, rather than being carried out sporadically, and there needs to be a constant and attentive process to keep data clean. That means there’s a need for an ongoing investment in data governance, within the parameters of your budget. Few businesses have the budget to put extravagant data management processes in place. It would be wonderful to conduct data reviews every morning, or implement highly elaborate verification and enhancement programs.


Creating a Culture that Works for Data Science and Engineering


While both groups on the team are turning out great code, it’s challenging as a project manager to follow two different streams of work. Sometimes the two groups are working on similar things, but sometimes the data scientists are working on something in the very distant future for the engineers. The most important thing a cross-functional team can do is have everyone come to stand up every day. When we first told the data scientists about our daily “meetings,” they went pale in the face. “Every day?” they asked, with a look of panic in their eyes. I stood firm. It was the right call. Our daily meetings allow the engineers on our team to quickly start working from an informed place when R&D introduces a new project. Furthermore, we are benefiting from the best parts of agile with this approach; I love hearing everyone bounce ideas off each other in stand up. My favorite is when there’s a cross-functional “Ooo did you think about taking this approach?” We work better as a team and we have found a way to leverage everyone’s expertise.



The tech supply chain is more vulnerable than ever


It’s a great business model — especially when you consider that only 38 percent of companies are actively monitoring and managing their software supply chain hygiene. Today, the game has changed. Organizations now must contend with the fact that hackers are intentionally planting vulnerabilities directly into the supply of open source components. In one such example from February 2018, a core contributor to the conventional-changelog ecosystem (a common JavaScript code package) had his commit credentials compromised. A bad actor, using these credentials, published a malicious version of conventional-changelog (version 1.2.0) to npmjs.com. While the intentionally compromised component was only available in the supply chain for 35 hours, estimates are that it was downloaded and installed more than 28,000 times. Some percentage of these vulnerable components were then assembled into applications that were then released into production. The result is that these organizations then unwittingly released a Monero cryptocurrency miner into the wild — and the perpetrators of the supply chain hack profited handsomely.



How to use machine learning to build a predictive algorithm

You also have to make sure you're integrating not only data and platforms, but domain experts who bring invaluable information and skills to the data science team, according to David Ledbetter, a data scientist at Children's Hospital Los Angeles. "The machine learning community often isolates themselves and thinks they can solve all the problems, but domain experts bring value," Ledbetter said during a panel discussion at the AI World Conference & Expo in Boston in December. "Every time we meet with the clinical team, we learn something about what's going on with the data." The project team, with its mix of skills, needs to also identify good vs. bad outcomes based on the business problem you're trying to solve with a predictive algorithm. "It's important to set clear success criteria at the beginning of a project, and [to] pick something that has a reasonable likelihood of success," said William Mark, president of SRI International, aresearch and development firm that works on AI projects for customers, during the same panel discussion at AI World.


Cloud-agnostic container platforms – it’s all to play for

Steps into blue sky with clouds, sun © kraft2727 - Fotolia.com
Container-as-a-service (CaaS) products from the major cloud vendors, notably AWS EKS and Fargate, Azure AKS and Container Instances and Google Cloud Container Engine, present classic trade-offs between convenience and dependence. With their ability to tap into a plethora of cloud data, security and developer services that are unique in implementation if not conception, container products from the big three vendors can trap users in a maze of platform dependencies with no easy exit path. As container use in the enterprise moves from developer sandboxes to production systems, the desire for multi-environment portability presents an opportunity to devise standards, software, and automation systems that facilitate platform-agnostic container platforms. The idea is to ensure easy migration between private and public container environments. Recent announcements from Cisco, Google, and Pivotal Software are important milestones on the road to platform agnostic container infrastructure.


Welcome to Banking-as-a-Service

The underlying theme of this kind of disruption is the unbundling of supply and service. Banking has come late to the unbundling revolution. But now, the sector is ripe for it - for unbundling, or disaggregation - and ripe for its own Software-as-a-Service transformation that will allow customers to pick and choose and pay for applications as they use them. Software-as-a-Service (SaaS) businesses delivered by APIs have a low-touch sales model. These companies don’t sell; buyers help themselves. Low-touch sales combined with recurring revenues and lack of customer concentration are the three hallmarks of a SaaS business. In many cases these businesses are just better in all senses. But combining these three essential ingredients on their own will not be enough. The winners in this field are likely to be nimble specialists capable of creating plug-in-and-play APIs to allow anything to be processed anywhere, rather than the large - slow - generalists of the past. Starling is well-placed in this regard. We have built Starling with a set of public APIs that are freely available for anyone to use through our developer portal. 


5 Tips to Boost Your Company's Digital Transformation With BPM


With tools such as artificial intelligence and machine learning, reams of data can be processed in the blink of an eye, providing insights into how an organization can better meet customer needs. Often, this optimization is a product of changes in business process management, or BPM. Even the most basic organizations function through processes. There might be a process for acquiring leads, a process for vetting them, and a process for making a sale. After you convert a prospect, there's a process for invoicing the customer, one for fulfilling the order, and one for delivering the product. There are also strictly internal processes, such as those triggered when employees ask for time off or request tech support. BPM refers to the management of these procedures, such as ensuring they are effective and determining how to combine them in the most efficient way. When implemented effectively, BPM helps organizations streamline their day-to-day processes, making work more efficient. But implementing BPM or other digital transformations without full buy-in from your team can lead to a lack of teamwork or other disadvantages. 


APIs In Banking: Unlocking Business Value With Banking As A Platform (BaaP)

Banking as a Platform (BaaP), sometimes referred to as Banking as a Service (BaaS), occurs when a bank acts as an infrastructure provider to external third parties. Variations include other banks white-labeling the BaaP platform for faster time to market, fintech firms leveraging the BaaP provider’s banking license to provision bank accounts, and banks and fintechs using the BaaP platform for testing purposes. Banks like CBW, Fidor, JB Financial, solarisBank, and wirecard built their BaaP architecture from scratch, without the constraint of legacy systems, creating modular application stacks broken into discrete services. The modular banking services on a BaaP platform serve as building blocks, accessible to third parties through an API management layer, where they can be mixed and matched to create new products and services tailored to the third party’s business model


Life Is Dirty. So Is Your Data. Get Used to It.

As Dr. Hammond suggests, it's difficult to determine if data is ever clean. Even scientific constants have a degree of accuracy. They are "good enough," but not perfect. Data's ultimate purpose is to drive decisions. Bad data means bad decisions. As data professionals, it is up to us to help keep data "good enough" for use by others. We have to think of ourselves as data janitors. But nobody goes to school to become a data janitor. Let's talk about options for cleaning dirty data. Here's a handful of techniques that you should consider when working with data. Remember, all data is dirty, you won't be able to make it perfect. Your focus should be making it "good enough" to pass along to the next person. The first thing you should do when working with a dataset is to examine the data. Ask yourself, "does this data make sense?" That's what we did in the example above. We looked at the first few rows of data and found that both the city and country listed inside one column.



Quote for the day:


"Courage is more exhilarating than fear and in the long run it is easier." -- Eleanor Roosevelt