Showing posts with label JSON. Show all posts
Showing posts with label JSON. Show all posts

Daily Tech Digest - September 16, 2022

The AI-First Future of Open Source Data

If we take it one step further from the GPL for data, we begin to see the value equation of data, or “the data-in-to-data-out ratio” as Augustin calls it. He uses the example of why people are so willing to give up parts of their data and privacy to websites because the small amount of data they’re handing over returns greater value back to them. Augustin sees the data-in-to-data-out ratio as a tipping point in open source data. Calling it one of his application principles, Augustin suggests that data engineers should focus on providing users with more value but take less and less information from them. He also wants to figure out a way never to ask your users for anything. You’re only providing them an advantage. For example, new app users will always be asked for information. But how can we skip that step and collect data directly in exchange for providing value? “Most people are willing to [give up data] because they get a lot of utility back. Think about the ratio of how much you put in versus how much you get back. You get back an awful lot. People are willing to give up so much of their personal information because they get a lot back,” he says.


How User Interface Testing Can Fit into the CI/CD Pipeline

Reliance on manual testing is why organizations can’t successfully implement CI/CD. If CI/CD involves manual processes that cannot be sustained as it slows down the entire delivery cycle. Testing is no longer the sole responsibility of developers or testers only and it takes investment and integration in infrastructure. Developer teams need to focus on building the coverage that is essential. They should focus on testing workflows and not features to be more efficient. Additionally, manual testers who are not developers can still be part of the process, provided that they use a testing tool that gives them the required automation capabilities in a low code environment. For example, with Telerik Test Studio, a manual tester can create an automated test by interacting with the application’s UI in a browser. That test can be presented in a way without code and as a result, they can learn how the code behaves. Another best practice in making UI testing efficient is to be selective with what is included in the pipeline. 


Want to change a dysfunctional culture? Intel’s Israel Development Center shows how

Intel’s secret weapon, one that until recently it did not talk about much, is its Israel Development Center. It is the largest employer in Israel, a nation surrounded by hostile countries, and women and men are treated more equally than in most other countries I’ve studied. They are highly supportive of each other, making it an incredibly supportive country for women in a wide variety of industries. The facility itself is impressively large and well-built and eclipses Intel’s corporate office in both size and security. The work done there really defines Intel’s historic success in both product performance and quality, making it an example of how a company should be run. Surprisingly, the collaborative and supportive country culture overrode the hostile and self-destructive corporate culture that has defined the US tech industry. What Gelsinger has done is showcase the development center as a template for the rest of Intel, as a firm more tolerant of failure, more supportive of women and focused like a laser on product quality, performance and caring for Intel’s customers.


Uber security breach 'looks bad', potentially compromising all systems

While it was unclear what data the ride-sharing company retained, he noted that whatever it had most likely could be accessed by the hacker, including trip history and addresses. Given that everything had been compromised, he added that there also was no way for Uber to confirm if data had been accessed or altered since the hackers had access to logging systems. This meant they could delete or alter access logs, he said. In the 2016 breach, hackers infiltrated a private GitHub repository used by Uber software engineers and gained access to an AWS account that managed tasks handled by the ride-sharing service. It compromised data of 57 million Uber accounts worldwide, with hackers gaining access to names, email addresses, and phone numbers. Some 7 million drivers also were affected, including details of more than 600,000 driver licenses. Uber later was found to have concealed the breach for more than a year, even resorting to paying off hackers to delete the information and keep details of the breach quiet.


What Is GPS L5, and How Does It Improve GPS Accuracy?

L5 is the most advanced GPS signal available for civilian use. Although it’s primarily meant for life-critical and high-performance applications, such as helping aircraft navigate, it’s available for everyone, like the L1 signal. So the manufacturers of mass-market consumer devices such as smartphones, fitness trackers, in-car navigation systems, and smartwatches are integrating it into their devices to offer the best possible GPS experience. One of the key advantages that the L5 signal possesses is that it uses the 1176.45MHz radio frequency, which is reserved for aeronautical navigation worldwide. As such, it doesn’t have to worry about interference from any other radio wave traffic in this frequency, such as television broadcasts, radars, and any ground-based navigation aids. With L5 data, your device can access more advanced methods to determine which signals have less error and effectively pinpoint the location. It’s particularly helpful at areas where GPS signal can be received but is severely degraded.


Digital transformation: How to get buy-in

Today’s IT leader has to be much more than tech-savvy, they have to be business-savvy. IT leaders of today are expected to identify and build support for transformational growth, even when it’s not popular. At Clarios, I included “Challenge the Status Quo, Be a Respectful Activist” to our IT guiding principles, knowing that around any CEO or general manager’s table they need one or two disruptors – IT leaders should be one. However, once that activist IT leader sells their vision to the boss, now they have to drive change in their peers and the entire organization, without formal authority. ... Our IT leaders can gain buy-in on new ideas by actively listening to our business partners. Our focus is to understand from their perspective the challenges impeding their work by rounding in our hospital locations to see first-hand the issues. So when we propose solutions, it is from their perspective. Utilizing these practices, we can bring forth the vision of Marshfield Clinic Health System because we can implement technology that bridges human interaction between our patients and care teams, which is at the heart of healthcare.


How to Prepare for New PCI DSS 4.0 Requirements

There are several impactful changes to the requirements associated with DSS v4.0 compliance, ranging from policy development (all changes will require some level of policy changes), to Public Key Infrastructure (PKI), as there will be multiple changes related to how keys and certificates are managed. Carroll points out there will also be remote access issues, including defined changes to how systems may be accessed remotely, and risk assessments -- now required to multiple and regular “targeted risk assessments” to capture risk in a format specified by the PCI DSS. Dan Stocker, director at Coalfire, a provider of cybersecurity advisory services, points out fintech is growing rapidly, with innovative uses for credit card data. “Entities should realistically evaluate their obligations under PCI," he says. “Use of descoping techniques, such as tokenization, can reduce total cost of compliance, but also limit product development choices.” He explains modern enterprises have multiple compliance obligations across diverse topics, such as financial reporting, privacy, and in the case of service providers, many more.


Building Large-Scale Real-Time JSON Applications

A critical part of building large-scale JSON applications is to ensure the JSON objects are organized efficiently in the database for optimal storage and access. Documents may be organized in the database in one or more dedicated sets (tables), over one or more namespaces (databases) to reflect ingest, access and removal patterns. Multiple documents may be grouped and stored in one record either in separate bins (columns) or as sub-documents in a container group document. Record keys are constructed as a combination of the collection-id and the group-id to provide fast logical access as well as group-oriented enumeration of documents. For example, the ticker data for a stock can be organized in multiple records with keys consisting of the stock symbol (collection-id) + date (group-id). Multiple documents can be accessed using either a scan with a filter expression (predicate), a query on a secondary index, or both. A filter expression consists of the values and properties of the elements in JSON. For example, an array larger than a certain size or value is present in a sub-tree. A secondary index defined on a basic or collection type provides fast value-based queries described below.


Digital self defense: Is privacy tech killing AI?

AI needs data. Lots of it. The more data you can feed a machine learning algorithm, the better it can spot patterns, make decisions, predict behaviours, personalise content, diagnose medical conditions, power smart everything, detect cyber threats and fraud; indeed, AI and data make for a happy partnership: “The algorithm without data is blind. Data without algorithms is dumb.” Even so, some digital self defense maybe in order. But AI is at risk. Not everyone wants to share, at least, not under the current rules of digital engagement. Some individuals disengage entirely, becoming digital hermits. Others proceed with caution, using privacy-enhancing technologies (PETs) to plug the digital leak: a kind karate chop, digital self defense — they don’t trust website privacy notices, they verify them with tools like DuckDuckGo’s Privacy Grade extension and soon, machine-readable privacy notices. They don’t tell companies their preferences; they enforce them with dedicated tools, and search anonymously using AI-powered privacy-protective search engines and browsers like Duck Duck Go, Brave and Firefox. 


Why Mutability Is Essential for Real-Time Data Analytics

At Facebook, we built an ML model that scanned all-new calendar events as they were created and stored them in the event database. Then, in real-time, an ML algorithm would inspect this event and decide whether it is spam. If it is categorized as spam, then the ML model code would insert a new field into that existing event record to mark it as spam. Because so many events were flagged and immediately taken down, the data had to be mutable for efficiency and speed. Many modern ML-serving systems have emulated our example and chosen mutable databases. This level of performance would have been impossible with immutable data. A database using copy-on-write would quickly get bogged down by the number of flagged events it would have to update. If the database stored the original events in Partition A and appended flagged events to Partition B, this would require additional query logic and processing power, as every query would have to merge relevant records from both partitions. Both workarounds would have created an intolerable delay for our Facebook users, heightened the risk of data errors, and created more work for developers and/or data engineers.



Quote for the day:

"Leadership and learning are indispensable to each other." -- John F. Kennedy

April 02, 2016

Five Technologies That Will Disrupt Healthcare By 2020

AI is consistently improving the approach and access to reliable and accurate medical image analysis with help from digital image processing, pattern recognition and machine-learning AI platforms. ... Innovative, automated patient guidance and engagement solutions, such as AI-enabled medication adherence to observe patient devotion by using advanced facial recognition and motion-sensing software, have started to automate one of the major healthcare processes of directly observed therapy (DOT). New entrants with similar solutions are expected to rapidly capture this sub-segment of the market.


Which country is most prepared for tech disruption?

While less than half of those surveyed felt their education was boring or old fashioned, young people were twice as likely to say so. Confidence in entering the workplace was again a feeling shared mostly among those in middle-income economies. ... The need for so-called "soft skills" was, in the minds of many, the most crucial aspect of the modern workplace. Skills such as communications, relationship-building and problem-solving were prioritized between 86% (Australia) and 79% (Brazil), compared with academic achievement, which scored only between 50% (South Africa) and 36% (Germany). Employers expectations, as perceived by those surveyed, were also focused on soft skills. While technical skills were important, time management, people management and active learning were all considered to be either more important or of equal importance.


Are healthcare CIOs being cut out of the analytics loop?

“The best organizations are taking more of a dyad approach,” Weaver observes. “The operator and the technologist are both at the table, having that conversation, so you’ve got the right technology support to support the operator. A lot of times, the operator may be running the analytic shop. But one of the things we’ve found is that while the CIO may not be running the analytics shop, the CIO is a critical partner. Because to do the analytics, you have to both collect the data and then pull it out of the operational data warehouse and put it into an analytic capability to be able to analyze it.”  What happens in organizations where the analysts report to the operators and the CIO doesn’t have input? “Those places that have gone to the operator model find that begins to break if they don’t keep a consistent relationship with the technology folks,” he responds.


How Technology is Transforming Women-Owned Businesses in Africa

Technology is transforming the lives of women business owners in Africa as they are playing a significant role in the creation of jobs in their communities. Also, technology incubators dedicated to supporting entrepreneurs continue to populate the continent, and with increased access to the internet, entrepreneurs in emerging economies will continue to utilize various technological tools and resources to start, expand, and grow their businesses. Nigeria, in particular, leads the way in the number of women entrepreneurs that have developed. But, what else can be done to ensure that women are not just users of technological tools but also creators of them? How can we work to engage and increase accessibility in rural areas of the continent?


Is HyperContainer the Answer for Cloud Native Applications?

In a HyperContainer, the application process is still able to access what it needs: kernel and data. The difference is that the container does not run on the host kernel. Instead, every container gets its own, independent, guest kernel. By doing this, the application running inside is perfectly isolated from both other containers and the host. Performance wise, with the assistance of the super tiny guest kernel, a HyperContainer is able to finish booting in milliseconds (100-150ms), which is dramatically faster than a VM. Some may argue that this speed still lags behind a Linux container, but consider that an application usually takes longer to get started anyway meaning that, in practice, there is simply no difference.


The IT skills gap is a reality, but doesn’t have to be

Despite the popular conversation around big data in the business world, in 2014, the report notes that there was a decrease in the pay for these skills. According to the report, this can be attributed to the unrealistic expectations of business leaders, who reported being unsatisfied with the ROI on analytics and analytics professionals. Foote says that business leaders needed to temper their expectations around what big data and analytics could do for the business over time. And the attitude might have already started to shift, considering that as of 2015, the data shows that the market value of 74 noncertified and certified big data skills increased by six percent over the span of 12 months. One of the barrier around effective big data strategies at companies is about getting "decision makers to be more comfortable with data-driven decision making," according to the report.


Build this Raspberry Pi guardian robot and stave off intrusions!

Younger siblings -- gross! They sneak into your room and grime up your stuff. Sometimes you might also feel that way about your spouse. Babe, get your greasy mitts off my sunglasses. What you need is a sentinel, a guardian, a robot defender. This latest project comes to ZDNet via Dexter Industries, which makes cool components for DIY robotics builds. I have no affiliation to Dexter, but I dig what they do and I'm happy they've brought us a new build. Build and program this little GoPiGo to protect your wardrobe, your closet, or your whole room. Hide GoPiGo behind a closed door and when the door is opened it will attack, scaring intruders and snapping a picture as proof that your inner sanctum has been violated.


Why You Shouldn’t Enable “FIPS-compliant” Encryption on Windows

This setting does two things to Windows itself. It forces Windows and Windows services to use only FIPS-validated cryptography. For example, the Schannel service built into Windows won’t work with older SSL 2.0 and 3.0 protocols, and will require at least TLS 1.0 instead. Microsoft’s .NET framework will also block access to algorithms that aren’t FIPS-validated. The .NET framework offers several different algorithms for most cryptography algorithms, and not all of them have even been submitted for validation. As an example, Microsoft notes that there are three different versions of the SHA256 hashing algorithm in the .NET framework. The fastest one hasn’t been submitted for validation, but should be just as secure. So enabling FIPS mode will either break .NET applications that use the more efficient algorithm or force them to use the less efficient algorithm and be slower.


Is Artificial Intelligence Really Dangerous?

Ever since the beginning of time, we humans have had a desire for technological advancements and innovation. Through our vivid imaginations, we have been able to develop technologies that previously seemed impossible were just a part of our science fiction fantasies. Virtual reality, space tourism, self-driving cars and the much talked about artificial intelligence. Some of the most talented innovators have blurred the lines between fantasy and fiction for us. Artificial intelligence is now a very real prospect that companies are focusing on. Now, for those of you who are still new to this concept, Artificial intelligence is a field of science which focuses on how hardware and software components of a machine can exhibit intelligent behaviour. Instead of being fed information from the user himself, they learn over the course of time and become more intelligent.


How the New JSON Support Will Work in SQL Server 2016

"Someone might say -- this will not be fast enough, but we will see," Popovic said. "Built-in JSON parser is the fastest way to process JSON in database layer. You might use CLR type or CLR parsers as external assemblies, but this will not be better than the native code that parses JSON." Popovic said the JSON functionality will be rolled out over time in the SQL Server 2016 previews. SQL Server 2016 CTP2 is planned to include the ability to format and export data as JSON string, while SQL server 2016 CTP3 is expected to incorporate the ability to load JSON text in tables, extract values from JSON text, index properties in JSON text stored in columns, and more, he said. The SQL Server team will be publishing more details about the huge new release of SQL Server 2016 as the days count down to the first public preview, expected this summer.



Quote for the day:


“What high-performing companies should...create: A great place for great people to do great work.” -- Marilyn Carlson


March 01, 2014

Information Governance Can No Longer Be Confined to the IT Department
Historically, responsibility for data management is left primarily with the IT department. However, the growing complexity of information governance and the ramifications if it goes wrong mean that this narrow approach is no longer appropriate. Instead, responsibility for information governance should now be a boardroom level issue, with input from the compliance team and significant input from the legal team, whether internal or external and from other specialists.


Why “Big Data” Is a Big Deal
“The data themselves, unless they are actionable, aren’t relevant or interesting,” is Nathan Eagle’s view. “What is interesting,” he says, “is what we can now do with them to make people’s lives better.” John Quackenbush says simply: “From Copernicus using Tycho Brahe’s data to build a heliocentric model of the solar system, to the birth of statistical quantum mechanics, to Darwin’s theory of evolution, to the modern theory of the gene, every major scientific revolution has been driven by one thing, and that is data.”


Intranet Information Architecture (IA) Trends
A common pitfall with task-based IAs is difficult-to-scan category names. Organizations think that category names need to start with verbs or follow an “I need to...” pattern in order to be task based. This isn’t necessary. Sometimes trying to fit link or menu labels to a specified format makes them long and more difficult to scan, because the most meaningful words don't appear until the end of the label. Task-based IA doesn't require any particular grammatical structure for labels; it just means grouping information according to how employees use it, rather than by who creates and maintains it.


One third of Fortune 100 organisations will face an information crisis by 2017
"There is an overall lack of maturity when it comes to governing information as an enterprise asset," said Andrew White, research vice president at Gartner. "It is likely that a number of organisations, unable to organise themselves effectively for 2020, unwilling to focus on capabilities rather than tools, and not ready to revise their information strategy, will suffer the consequences." Business leaders need to manage information, rather than just maintain it. "When we say 'manage', we mean 'manage information for business advantage', as opposed to just maintaining data and its physical or virtual storage needs," said White.


Usability between information design and information architecture
A complete usability test has to consider several key criteria of a website: page identifier, transition elements, downloading time, and testing the pages on different browsers. Even all of these are taken into account, an information designer should be careful with the users’ reaction. During a usability test they might be impressed by spectacular graphic elements and their feedback is not always very relevant. Hackos and Redish describe a case when users rejected a product after the usability test.


Building a RESTful Web Service with Spring Boot to Access Data in an Aerospike Cluster
Spring Boot is a powerful jump start into Spring. It allows you to build Spring based applications with little effort on your part. Aerospike is a distributed and replicated in-memory database optimized to use both DRAM and native flash/SSDs. Aerospike also has high reliability and is ACID compliant. Developers can quickly scale their database cluster from two nodes to twenty nodes without bringing down the database service.


Big data, big business, Big Brother?
Berkman's Larry Lessig nails it when he says that we need norms, laws, technology and markets to deal with this tremendous power the '6 Memes' are giving us. Yet right now, most users are like kids toying with handguns, and BigDataCo's are acting like kids in a candy-store. Can we really trust those new data-oil companies, those behemoths of smart-data-mining to not fall prey to the temptation of instrumentalizing us, to not use their armies of servers and their powerful algorithms for the most nefarious 'monetization' purposes, and to not use that very same information to tacitly or otherwise support the creation of perfect surveillance states?


Facebook’s Plan to Conquer the World — With Crappy Phones and Bad Networks
As Facebook looked out across the globe it wanted to conquer, it saw a mish-mash of unreliable networks, low resolution screens, and shitty processors. There were all manner of various flavor of Android, problems with local language support, confusion over pricing, and unreliable or non-existent power grids. There’s the question of how you make social connections between people with no address books, no email address, no university affiliation, and who are perhaps the very first person in their village to sign up for Facebook. The challenges weren’t just difficult, they were epic.


Biggest of all data, Internet of Things
Teradata, a global analytic data platform, applications and services company, revealed that customers will be able to add Java Script Object Notation data to their data warehouse. This is a significant advancement, because JSON is the primary language that powers the Internet of Things, a global collection of millions of sensors and embedded microprocessors. Current Online Transaction Processing technology allows for transactional processing of JSON data. However, the OLTP technology does not allow for scalable analytics on massive data volumes, which is provided by Teradata’s parallel processing analytic engine.


Are You Too Old to Land a New IT Job?
"You have to be current. That is key, especially in IT," Gillis says. "I find it disturbing when I speak to clients who are older and they aren't spending time studying, staying hip and up-to-date on new technology advances," he says. "If you've been looking for a job for six months, you have to realize how much has happened in that time -- learn about emerging technology. Know the terminology. Be able to show that you've added to your knowledge and your skills," Gillis says, and be able to demonstrate how that knowledge and your skills have positively impacted previous employers.



Quote for the day:

"Big jobs usually go to the men who prove their ability to outgrow small ones." -- Theodore Roosevelt

July 19, 2012

Speed as a Feature, Part 1
When describing your application to users, peers, VCs or potential new hires, which features do you list? ... How about the API you built? Or maybe you can’t stop glowing over your Cloud-based real time local big data feed? But when was the last time you talked to someone about how fast your application is?


For BYOD Best Practices, Secure Data, Not Devices
"It's appropriate to manage the device if you own that device," says Alan Murray, senior vice president of products at Apperian, a provider of a cloud-based mobile application management (MAM) solution

Do You Have the Digital Leaders You Need?
Only nine companies — less than two percent of the Fortune 500 — are what we would call "highly digital." To be highly digital, by our definition a company must pass four tests: it generates a high percentage of revenues digitally; its leadership (both the CEO and the Board) has deep digital experience; it does business significantly enabled by digital channels; and it's recognized as transformational in its industry.

Three Steps to Avoid Getting Hacked Like Yahoo
It may seem like a wake-up call for protecting servers better, and improving network security, but the reality is that it’s just a reminder that common sense and basic security practices could probably prevent this—and most other—attacks. Where did Yahoo go wrong? Well, according to Jason Rhykerd, an IT security expert with SystemExperts, Yahoo made three serious mistakes.


I Don’t Mean to Be Offensive, But Your Employee Engagement Stinks
... Many organizations talk a good game when it comes to employee engagement, but how many of you actually walk the walk? According to the latest Towers Watson survey, not many. The study found that 63 percent of workers are not engaged and are struggling to cope with work. That means that only 37 percent of employees are giving their all to your organization! ...

Enterprise Risk Management & Regulatory Capital Guidelines
... In spite of that progress, a large number of those institutions are still muddling through capital and earnings pressures derived from significant loan losses and sharp declining values of selected securities portfolios. ...


Create and Consume JSON-Formatted OData
OData is a specification for ensuring that data service consumers can rely on a consistent experience from the services they consume. One of the rules of the spec is that OData results are output by default in ATOM format (which is a specific way of formatting XML), and that it can also output results in JSON format.


Building a private cloud with System Center 2012: Part 2
The next stage in our investigation of Microsoft's Private Cloud Evaluation Software bundle involves deploying and configuring a series of Integration Packs that allow the various System Center tools to work together.


YouTube launches face-blurring tool to hide identities
YouTube has added a tool which automatically blurs out the faces of people appearing in uploaded videos.

Malaysia, India next big data center hotspots
As costs of building and operating data centers in Asia increase in traditional hotspots such as Hong Kong, Singapore and Tokyo, other countries such as Malaysia and India have emerged as alternative sites for their improving infrastructure and lower costs.


How artificial intelligence will shape our lives
...“The creation of avatars will change everything in our societies: politics, economics, medicine, health care, food industry, construction methods, transportation, trade, banking, etc. The whole architecture of society will be transformed, there will be an increase in its self-organization, people will unite to fight the biggest and most universal problem of humankind — that of death.”...


Quote for the day:

"Years of management have taught me that giving someone a job title or role before he is actually doing the job is a recipe for failure."  --Eric V. Holtzclaw, CEO and founder of User Insight