Showing posts with label Telecom. Show all posts
Showing posts with label Telecom. Show all posts

Daily Tech Digest - December 10, 2023

'Move Fast And Break Things' Doesn’t Apply To AI

Given the urgency around generative AI, those looking for a first-mover advantage or those fearing being left behind may be tempted to adopt the "move fast and break things" mantra. After all, it has long been a staple of Silicon Valley culture. But following it would be a mistake in this instance. ... Consider the analogy of building a house—you wouldn’t just start digging immediately. You need to lay the groundwork first. You need to be planning, consulting structural engineers, involving site visitors, commissioning architectural drawings and building control. It is all essential work that needs to be completed before a brick is laid. But once it has been, confidence in the build skyrockets because there is a clear procedure to follow. Going slower to go faster also applies to AI. Developing a strategy for AI requires deep expertise and a first-class analysis of organizational data. This involves getting a holistic view of the data within an organization, understanding which elements could have inherent bias and lead to the wrong insights and building a picture of the level of automation that could improve operational efficiency.


Generative AI as a copilot for finance and other sectors

While advanced AI technologies such as quantum computing and blockchain have long been a part of Moody's Analytics' IT arsenal, generative AI has spun off many complex models. That can be challenging for a company with large data sets that is concerned about data privacy and security, said Caroline Casey, general manager for customer experience and innovation at the company, in an interview. Before releasing its Research Assistant product on Dec. 4, Moody's created an internal copilot product -- not to be confused with Microsoft Copilot. Research Assistant is a search and analytical tool built on Azure OpenAI and uses OpenAI's GPT-4. "We know that the purpose of this is not to replace a human," Casey said. "It's to take out the kind of mundane work -- the trying to find information, the retrieval, the searching -- and actually help them to focus on where they've got the best expertise." Moody's began its journey in the summer after the CEO encouraged all employees of Moody's Corp. to be innovators. 


World’s First Cybersecurity & AI Guidelines: Experts Weigh in

Speaking to Techopedia, Nic Chavez, Field Chief Information Officer at DataStax, noted that one of the important takeaways is the cautious and collaborative approach employed by the UK to develop the guideline. “I think it’s important to recognize the caution and collaboration with which NCSC approached this endeavor. By seeking feedback from the international community, including other NATO nations, NCSC was able to triangulate recommendations that were reasonable, swiftly actionable and strong.” In his reaction, Jeff Schwartzentruber, Senior Machine Learning Scientist at eSentire and Industry Research Fellow at Toronto Metropolitan University, told Techopedia that releasing these AI guidelines is a step in the right direction as it will help to expand international cooperation and accelerate commitments on the regulation and appropriate use of AI technologies. “I see this as a positive step forward in terms of expanding the international cooperation and discourse on the regulation and appropriate use of AI technologies. ...”


How the blockchain industry can adopt cybersecurity

While the theoretical underpinnings of blockchain offer unparalleled security benefits, the practical implementation introduces potential vulnerabilities. One such vulnerability lies in the exchange of data between blocks, where cybercriminals can intercept and manipulate information. To fortify blockchain systems against such attacks, the adoption of advanced encryption measures becomes paramount. Just as Distributed Denial of Service (DDoS) attacks are thwarted in traditional systems, blockchain must implement robust encryption to safeguard data exchange between blocks. Another challenge in blockchain security arises from censorship attacks, where malicious validators intentionally disrupt or halt the blockchain protocol. Additionally, attackers may masquerade as validators, gaining trust within the system and executing Trojan attacks. To address these threats, it is essential to employ traditional cybersecurity strategies, including encryption, key management, and DNS hygiene. By integrating artificial intelligence (AI) into the system, organizations can enhance their ability to detect consensus attacks, particularly in Proof of Stake (PoS) validation methods.


SLAM Attack: New Spectre-based Vulnerability Impacts Intel, AMD, and Arm CPUs

The attack is an end-to-end exploit for Spectre based on a new feature in Intel CPUs called Linear Address Masking (LAM) as well as its analogous counterparts from AMD (called Upper Address Ignore or UAI) and Arm (called Top Byte Ignore or TBI). "SLAM exploits unmasked gadgets to let a userland process leak arbitrary ASCII kernel data," VUSec researchers said, adding it could be leveraged to leak the root password hash within minutes from kernel memory. While LAM is presented as a security feature, the study found that it ironically degrades security and "dramatically" increases the Spectre attack surface, resulting in a transient execution attack, which exploits speculative execution to extract sensitive data via a cache covert channel. ... AMD has also pointed to current Spectre v2 mitigations to address the SLAM exploit. Intel, on the other hand, intends to provide software guidance prior to the future release of Intel processors that support LAM. In the interim, Linux maintainers have developed patches to disable LAM by default. 


Taking a strategic view of telecom networks in Indo-Pacific

The Indo-Pacific is home to some of the world’s fastest-growing digital economies harnessing technology for national governance and economic development. Telecommunications connectivity – the internet and mobile penetration base – forms the backbone for these economies. Unsurprisingly, the telecom market in the region is witnessing an upgrade. By 2030, telecom companies are expected to invest US$259 billion in the development of networks in the region. These investments will foster the expansion of the digital economy and act as catalysts for innovation, growth and prosperity, with 5G playing an indispensable role in this. 5G represents a generational shift in wireless telecommunications – anchored on higher data transfer speed and ultra-low latency. It holds the promise of revolutionising how people communicate and consume content on the internet and transforming edtech, telemedicine, precision agriculture, and the Internet of Things. However, 5G technology is not cheap, and developing economies have faced budgetary constraints in deploying it.


How to stop digital twins from being used against you

Beyond device optimization and prolonged lifecycles, however, there’s a dark side of digital twins that warrants careful consideration and mitigation strategies. First and foremost, digital twins offer hackers another chance at sensitive company information, particularly when the device data is stored in plain text in the cloud. Providing these models with up-to-date data means providing sensitive information. This goes beyond mere device information, it can sometimes include the personally identifiable data of employees and customers. Meanwhile, the use of international servers to run digital twin operations further complicates things. Different jurisdictions count different privacy requirements, meaning that cross-border data exchanges to run these simulations can bring regulatory and compliance headaches. Additionally, the connected devices themselves can cause security issues. For example, IoT sensors sometimes operate on outdated and vulnerable operating systems. Additionally, cheap devices are well-known for default credentials and unencrypted communications, an important concern as more than two billion devices come online next year. 


The Role of Non-Executive Directors in Driving Innovation

The agile nature of startups grants them an advantage in driving disruptive innovation. They have a greater appetite for risk and tend to be nimbler than their established counterparts. Free from the shackles of middle management’s confining layers and quarterly reporting pressures, these small entities are often seen as the leaders of innovation. On the other side of the spectrum, large companies, despite having the funds to finance innovation, tend to exhibit risk avoidance to protect individual reputations and the status quo. But the acquisition of innovative companies can be a strategic move for larger corporations, provided the innovative culture of the smaller entity is preserved in the process. ... NEDs play an important role in balancing the need for funding innovation against potential impacts on existing business practices. But conflict often emerges between securing immediate profits for shareholders and investing in long-term growth fueled by innovation. However, there is evidence that companies built for the future—those that prioritize innovation—can generate shareholder returns almost three times greater than those of the broader market reflected in the S&P 1200.


Surviving The Polycrisis Of Technological Singularity

First, let us agree on what a technological singularity would look like. It is an idea that puts us in an era where predictability ceases to exist and the conventional understanding of technological evolution is of little use. Historically, we as a society have failed to predict the effects of technological evolutions. Humans have usually underestimated the effects of technological disruptions in the long term. The fusion of various revolutionary technologies in this era, such as quantum computing, nanotechnology, superconductivity and AI, will surely propel us into a zone of immense possibilities and daunting uncertainties that are hard to grasp, let alone predict. One could argue that, if we have this stage today, then we are in the nascent stages of technological singularity. The open letter that was written by leaders from various areas of society calling for a pause in AI development for six months is, to me, one clear signal of the beginning of technological singularity. We can slow down its pace, but we may not be able to stop it. At the core of this discussion lies these profound questions: Can humanity harness the potential of these technologies and mitigate the corresponding risks simultaneously?


DevOps Strategies for Connected Car Development

The connected car is a complex ecosystem of software systems. These vehicles have numerous systems that communicate with each other, the driver and the outside world. Managing the development of these systems can be a daunting task, and this is where DevOps strategies come in. DevOps aims to shorten the system development life cycle and provide continuous delivery with high software quality. This methodology is particularly suited to the complex software systems of connected cars, as it encourages a holistic view of the development process, ensuring that all components work together seamlessly. Moreover, DevOps helps to manage the complexity of car software systems by automating tasks, reducing errors and improving efficiency. The use of automated tools for configuration management, deployment and monitoring means less manual work, fewer mistakes, and quicker problem resolution. One of the greatest challenges in connected car development is the need for speed. In this fast-paced industry, companies are under pressure to develop and deploy new features quickly to stay competitive. 



Quote for the day:

"If you genuinely want something, don't wait for it--teach yourself to be impatient." -- Gurbaksh Chahal

Daily Tech Digest - December 28, 2020

6 habits of successful IT leaders in 2021

“One of the many things we have learned from this crisis is how much improvement many of us need as IT leaders. Getting into the habit of working on developing our emotional intelligence daily will make us better leaders. This is often pointed out in others. However, we need to examine ourselves and find better ways to deal with the many emotions that arise from our current circumstances. IT leaders need to examine their own level of empathy as they manage folks they may no longer be able to walk over to and have a conversation with as you please. As we lead during this time of flexible schedules and distributed workforce, focus on developing more empathy and, honestly, just a bit more grace.”  “Be vulnerable and provide an atmosphere that will allow your team to feel supported to still do their best work even in this difficult time. Do not be that leader with a team that looks to get as far away from you following this crisis, or the leader whose team members throw in the towel before this crisis ends just to maintain their sanity.” – Cedric Wells, Director, IT Infrastructure Services, The Gorilla Glue Company ... Meditation is a powerful habit that can unlock this superpower. Many top business leaders like Ray Dalio, bestselling authors like Yuval Harari owe all their success to meditation.


SolarWinds Attack Gives Rise to New Runtime Security Models

A critical observation to make about this attack is that even though the attackers already had a digitally signed backdoor, they still needed to bring additional malicious code into the environment. The backdoor was a pretty big chunk of code and contained several C2 (command and control) functions compiled as part of the legitimate product. And yet, even this unusually big backdoor had no means to spread and perform sophisticated injection and theft scenarios. It required a post-deployment file-less malware (FireEye called it TEARDROP). It is thought that TEARDROP deployed a version of the Cobalt Strike BEACON payload, a penetration testing tool made for red teams that can also be used by attackers. This fact is critical since it is true to almost any attack and most of other backdoor cases. They look like tiny innocent coding oversights – basically, like any other vulnerabilities created as an honest mistake. From this point on, intentional backdoors and incidental vulnerabilities are used in very similar ways. Both are utilized to bring real malicious code – the exploit – into the target environment and perform the actual attack.


2021 will be the year open source projects overcome their diversity problems

In October 2020, the Linux Foundation announced a new Software Developer Diversity and Inclusion project to draw on science and research to deliver resources and best practices that increase diversity and inclusion in software engineering. Following the age-old tenet that “you cannot manage what you don’t measure”, the Hyperledger Diversity, Civility, and Inclusion (DCI) Working Group is focused on “measuring and improving the health of our open source community.”  In the OpenJS community, the Node+JS diversity scholarship program provides support to those from traditionally underrepresented or marginalized groups in the technology or open source communities who may not otherwise have the opportunity to attend the event for financial reasons. At KubeCon + CloudNativeCon this year, The Cloud Native Computing Foundation announced The Inclusive Naming Initiative to help remove harmful, racist, and unclear language in software development. At IBM, we had a similar program underway, and we have joined the CNCF initiative to further the cause. ... The AI Inclusive initiative seeks to increase the representation and participation of gender minority groups in AI. They offer offers events, tutorials, workshops, and discussions to guide community members in their AI careers.


Homomorphic Encryption: The 'Golden Age' of Cryptography

The origins of homomorphic encryption date back to 1978. That's when a trio of researchers at MIT developed a framework that could compute a single mathematical operation (usually addition or multiplication) under the cover of encryption. The concept gained life in 2009, when Craig Gentry, now a research fellow at the blockchain-focused Algorand Foundation, developed the first fully homomorphic encryption scheme for his doctoral dissertation at Stanford University in 2009. Gentry's initial proof was simply a starting point. Over the past decade, security concerns related to cloud computing, the Internet of Things (IoT), and the growing demand for shared and third-party data have all pushed the concept forward. Along the way, more powerful homomorphic algorithms have emerged. Today, the likes of IBM and Microsoft have entered the space, along with the US Defense Advanced Research Projects Agency (DARPA) and an array of startups. "There is a tremendous benefit to being able to perform computations directly on encrypted data," says Josh Benaloh, senior cryptographer at Microsoft Research. "This allows computations to be outsourced without risk of exposing the data."


How to securely hash and store passwords in your next application

A "salt" is a random piece of data that is often added to the data you want to hash before you actually hash it. Adding a salt to your data before hashing it will make the output of the hash function different than it would be if you had only hashed the data. When a user sets their password (often on signing up), a random salt should be generated and used to compute the password hash. The salt should then be stored with the password hash. When the user tries to log in, combine the salt with the supplied password, hash the combination of the two, and compare it to the hash in the database. Without going into too much detail, hackers commonly use rainbow table attacks, dictionary attacks, and brute-force attacks to try and crack password hashes. While hackers can't compute the original password given only a hash, they can take a long list of possible passwords and compute hashes for them to try and match them with the passwords in the database. This is effectively how these types of attacks work, although each of the above works somewhat differently. A salt makes it much more difficult for hackers to perform these types of attacks. Depending on the hash function, salted hashes take nearly exponentially more time to crack than unsalted ones. 


SaaS security in 2021

It’s clear to IT leaders that unvetted SaaS solutions (shadow IT) pose a variety of risks, including exposure of sensitive information, data ownership issues and regulatory compliance problems. The question is who is best suited to mitigate those risks, and in 2021, more companies will find that it takes a multidisciplinary strategy. A proactive governance approach requires a defined process involving a multidisciplinary team that ensures visibility and directly addresses risks to keep exposure within acceptable levels. Companies have to classify data in terms of integrity, confidentiality and availability to find the ideal balance between security and costs and determine acceptable risk levels. Cloud providers share responsibility to keep data secure along with the company, so it’s important to define exactly who is responsible for what. Companies typically manage user access, endpoint devices and data while SaaS vendors oversee apps, virtual machines, databases, etc. To fulfill their governance objectives, IT leaders will look for SaaS providers that offer multiple configuration options, including password settings/identity federations and authorization models, as well as availability plans to meet goals related to recovery time and recovery points.


Top five telecoms trends for 2021

5G has had many false starts, but 2021 could be the year when it really starts to take a predominant role in the telecoms space. With so many people now working remotely and using collaboration and messaging tools or video calls to communicate, we’ve started to see the demise of the traditional phone call. 5G is the ideal solution to replace landlines, using a SIM card as a fixed wireless access (FWA) to a cell tower, rather than having to install fibre cables physically into streets and homes. Investing in 5G infrastructure to give more workers around the country access to high quality, superfast connectivity is looking more and more like a political imperative to keep as much of the economy as possible working and productive. If it’s in the national interest, we might even see government support being provided to networks to deliver widespread 5G… or so networks will be hoping. ... Working from home has been a dominant theme of the coronavirus pandemic. Even if vaccination programmes soon return life to “normal” next year, some workplaces may not reopen their doors, on the basis that there is no longer a compelling commercial case to maintain a physical presence. All the necessary infrastructure businesses need to function, including telecoms, can be hosted in the public cloud. Remote connectivity is all they need.


The future of work is happening now thanks to Digital Workplace Services

It’s absolutely true that the pandemic elevated digital workplace technology from being a nice-to-have, or a luxury, to being an absolute must-have. We realized after the pandemic struck that public sector, education, and more parts of everyday work needed new and secure ways of working remotely. And it had to become instantaneously available for everyone. You had every C-level executive across every industry in the United States shifting to the remote model within two weeks to 30 days, and it was also needed globally. Who better than Dell on laptops and these other endpoint devices to partner with Unisys globally to securely deliver digital workspaces to our joint customers? Unisys provided the security capabilities and wrapped those services around the delivery, whereas we at Dell have the end-user devices. ... One of the big challenges in a merger or acquisition is how to quickly get the acquired employees working as first-class citizens as quickly as possible. That’s always been difficult. You either give them two laptops, or two desktops, and say, “Here’s how you do the work in the new company, and here’s where you do the work in the old company.” 


7 predictions for what lies ahead for health tech in 2021

The industry has heard about advances in AI for years, but in 2021, healthcare will start to see the benefits of machine learning in solutions that are highly scalable, predicts Tom Knight, CEO of Invistics. New technology funded by the National Institutes of Health (NIH), for example, can detect and fix many problems with medication administration, while helping to raise hospital revenues by millions of dollars annually, Knight said. Providers are increasingly accepting AI’s role in medicine and the capability to identify sequences and trends in data that humans cannot,” said Yann Fleureau, co-founder and CEO of Cardiologs. Kimberly Powell, vice president and general manager at NVIDIA Healthcare, predicts that hospitals will get “smarter.” Similar to the experience at home, smart speakers and smart cameras will help automate and inform activities. The technology, when used in hospitals, will help scale the work of nurses on the front lines, increase operational efficiency and provide virtual patient monitoring to predict and prevent adverse patient events, said Powell. ... John Matthews, managing director of healthcare and life sciences at Teradata, said the smart money is on leaders that recognize the difference between solutions that solve problems and trends that attract mob mentality and next-silver-bulletism.


Remote work: 10 ways to upgrade your working from home setup

Cybersecurity is more important than ever for this newly distributed and heterogeneously equipped workforce, for whom commuting is a fading memory (along with real-world interaction with colleagues and clients). Although there are obvious downsides to remote working, including work/life balance and long-term mental health, many of us are likely to continue working from home on a regular basis after the pandemic. That being so, it's obviously a good idea to have the best equipment for the job: there's a big difference between spending a couple of hours on your laptop at the kitchen table outside normal working hours and making this arrangement your primary workspace. To get an idea of the kind of setups that knowledge workers should be looking at in 2021 and beyond, it's worth examining the contents of ZDNet contributors' home offices, as featured on this site over recent weeks. These are journalists who have been working from home for years, and who are also, by definition, up-to-speed with the latest technology. This means that their gear is mostly at the power-user end of the knowledge worker spectrum, giving a good indication of what may become standard fare in the 'new normal'.



Quote for the day:

“People rarely succeed unless they have fun in what they are doing.” -- Dale Carnegie

September 18, 2016

Telecom APIs could increase African innovation

This has opened up a great avenue for developers to bring innovation into the hands of every African. However, this can only be achieved by companies opening up their APIs to the ecosystem. “Mobile operators already play a central role in nurturing the development of innovative solutions in Africa,” the GSMA report said. “They have traditionally supported various initiatives to identify and develop new talent and solutions, including incubators, accelerators and competitions, mostly through funding and mentorship.” The report also highlighted the interest that mobile firms have had in the tech industry. MTN, Millicom and Orange have acquired equity stakes in Africa Internet Group, the organisation that owns ecommerce giants Jumia and Kyamu.


How smart materials will literally reshape the world around us

Here’s how it would work: An airplane component (like the wing) is made out of a composite material that has been coated with a thin layer of nanosensors. This coating serves as a “nervous system,” allowing the component to “sense” everything that is happening around it — pressure, temperature and so on. When the wing’s nervous system senses damage, it sends a signal to microspheres of uncured material within the nanocrystal coating. This signal instructs the microspheres to release their contents in the damaged area and then start curing, much like putting glue on a crack and letting it harden. Airbus is already doing important research in this area at the University of Bristol’s National Composites Centre, moving us closer to an aviation industry shaped by smart materials.


What’s New in the Economics of Cybersecurity?

Policymakers’ choices can influence cybersecurity in various sectors. In “Economic Impacts of Rules- versus Risk-Based Cybersecurity Regulations for Critical Infrastructure Providers,” Fabio Massacci and his colleagues address the pressing issue of finding an optimal way to alert operators of critical infrastructures about cybersecurity risk. In particular, they compare the US’s rulebased model to the EU’s risk-based approach. A proposed cybersecurity model for public policy in the presence of strategic attackers is calibrated to the National Grid, which operates in the UK and the East Coast of the US. The model shows that, depending on the combination of incentives, operators will stop investing in risk assessment and care only about compliance, or vice versa. 

Now or never - India CEO Outlook 2016

Technology serves both as a trigger as well as an enabler of innovation. CEOs expect that over the next three years, technology is likely to have a huge impact on their growth, next only to global economic factors. They agree that almost every function of their businesses is bound to be influenced, with key focus areas for technology adoption in the near term likely to revolve around customer centricity, efficiency enhancement and employee satisfaction. ... Integration of basic automated business processes with artificial intelligence and cognitive processes remains an important concern for nearly 92 per cent of the surveyed CEOs. Key underlying causes could be the fact that planning for technology in many organisations takes place in silos, rather than at a unified organisational level, paired with a lack of ability to identify the right technology to meet organisational needs.


Bank of England wants next payment system to be blockchain-ready

It's not just about linking up with external blockchains, though: The bank will, it said, also continue to explore the use of distributed ledgers in its own systems, including through its own startup accelerator, which will shortly begin selecting a second round of participants. The first round includes a security assessment service, BitSight; a data anonymization tool, Privitar -- and a blockchain demonstration platform developed by the bank and PwC to explore the possibilities of smart contracts. "The resilience characteristics of the distributed ledger in particular are potentially highly attractive from a financial stability perspective," the bank noted. But it pretty much ruled out the possibility that the new RTGS would be blockchain-based.


Will Fog Computing Hide the Clouds of the Internet of Things?

The OpenFog Reference Architecture is an architectural evolution from traditional closed systems and the burgeoning cloud-only models to an approach that emphasizes computation nearest to the edge of the network when dictated by business concerns or critical application the functional requirements of the system. The OpenFog Reference Architecture consists of putting micro data centers or even small, purpose-built high-performance data analytics machines in remote offices and locations in order to gain real-time insights from the data collected, or to promote data thinning at the edge, by dramatically reducing the amount of data that needs to be transmitted to a central data center. Without having to move unnecessary data to a central data center, analytics at the edge can simplify and drastically speed analysis while also cutting costs.


The Top 5 Problems with Distributed Teams and How to Solve Them

It’s easy to put the problems in a list of 5. Putting the solutions in such list is a lot harder. Every setup, company and situation is different. I sometimes have people coming to my trainings expecting ‘cures’. The only thing I can deliver is a set of ideas, some of which may apply to their situation. It’s about turning a button here, tweaking a bit there and adjusting step by step. Agile, iterative. ... By creating a positive team spirit and addressing the cultural differences, we avoid the trap of ‘us versus them’ and we create awareness about how each team member behaves given the cultural context. We also define actions to organize around the differences and benefit from the similarities. Implementing a structure or tool to share the knowledge about the product or project we’re building, helps team members understand what they’re working on.


Singapore's cut-off from the internet is not so crazy

There are good reasons for Singapore's big disconnection, since Asian countries suffer a huge number of targeted attacks on their internet infrastructure. Those attacks are increasingly sophisticated in terms of both the technology employed and the psychological profiling of targets. In fact, Singapore's decision is more a question of philosophy than IT security. Actually, there are two questions: 1. Is it possible to completely secure a system that's connected to the internet?; 2. If not, what are the potential consequences if such a system is compromised? The answer to the first question is a resounding no. No operating system is exploit-free. The same applies for any mail client or web browser. Vulnerabilities may not be widely known yet, but they exist and will be discovered.


Bad migration experiences leave IT bosses gun-shy

IT shops don't think about the web of dependencies and connections between what they are upgrading and other systems, says Arnold. They don't look at storage subsystem compatibility, app dependency and true dependency of apps to servers. You might have to take down and replace several things all at the same time. But therein lays the challenge. Arnold spoke with one CIO who talked of wanting to solve the constant change in his environment but there were too many variables in these migrations to make a move. "There is no one particular issue because everyone has a different experience. I've had people plan these out and thought they knew how it would go and had a storage subsystem fail on them," he says.


This Is Why Securing Your Business Is More Important Than Ever

While attackers do continue to target large enterprises more frequently, small businesses are proving to be an emerging gold mine as they store the same valuable information, but have fewer resources to defend themselves against threats. In our most recent survey, we found that despite the majority of small businesses reporting being concerned about cyber attacks, a third were not taking any proactive measures at all to mitigate cyber risks, and only 12 percent had a breach preparedness plan in place. ... Awareness, education, monitoring and response, will all play a role in helping you safeguard your company information. There are a number of free, easily accessible resources, like the National Cyber Security Alliance and the Federal Communications Commission, for information on security best practices.



Quote for the day:


"Anticipation is the ultimate power. Losers react; leaders anticipate." -- Tony Robbins


December 16, 2014

Finding critical business data -- fast
"We used to call it ‘complex event processing,’" he adds. But that approach required proprietary software and expensive servers, which limited usage. In contrast, one of today’s technologies, Hadoop, "is linearly scalable, and you can throw lots of hardware at it and use memory very effectively," he says. Roll into that the lower cost of flash memory, adds Baer, and "now we can process data very fast, and do more sophisticated processing than when you were bound by I/O."


The 5 Elements of A Killer Mobile App
By 2015, more than 780 million people will be mobile users only. This means they won’t own a laptop or desk computer. These 780 million users will be your customers, partners, business stakeholders, suppliers, and other business associates. As organizations begin to align their mobile first strategy with this shift in users, it’s important to focus on what these mobile apps must do.


APIs should not be copyrightable
The story of SMB and Samba is a good example of how non-copyrightable APIs spurred competition. When Windows became a dominent desktop operating system, its SMB protocol dominated simple networks. If non-windows computers wanted to communicate effectively with the dominant windows platform, they needed to talk to SMB. Microsoft didn't provide any documentation to help competitors do this, since an inability to communicate with SMB was a barrier to their competitors. However, Andrew Tridgell was able to deduce the specification for SMB and build an implementation for Unix, called Samba. By using Samba non-windows computers could collaborate on a network, thus encouraging the competition from Mac and Linux based systems.


This Linux grinch could put a hole in your security stocking
The fundamental flaw resides in the Linux authorization system, which can inadvertently allow privilege escalation, granting a user "root," or full administrative access. With full root access, an attacker would be able to completely control a system, including the ability to install programs, read data and use the machine as a launching point for compromising other systems. To date, Alert Logic has not seen any exploits that harness this vulnerability, nor did the research team find any existing mention of this hole in the vulnerability database maintained by the Community Emergency Response Team (CERT), according to Stephen Coty, Alert Logic's director of threat research.


Frameworks and Leadership on Cyber-Risks
Just identifying and defining the risks is a daunting enough task. Stuart Levi, a partner with law firm Skadden, Arps, Slate, Meagher & Flom who focuses on cyber-security, warns that any company with even a single computer connected to the internet is vulnerable. “Every public company—regardless of their industry, what they do, what data and information they have —needs to be focused on this issue,” he says. ... Aaron Weller, a managing director in data protection and privacy with PwC, said at Compliance Week West that companies need to think beyond compliance to make their data and their systems secure. “Compliance is not security,” he said


How CIOs Can Prepare for Healthcare ‘Data Tsunami’
"Identify who owns the data and build consensus on data definitions," Dunbrack says in an email. "Understanding what the data means is key to making data governance and interoperability work, and is essential for analytics, big data initiatives and quality reporting initiatives, among other things." To be sure, ironing out data governance policies within a healthcare organization is anything but a black-and-white process. Complicating matters significantly are the diverse and growing sources of medical data, each raising distinctive ownership and compliance questions.


Defining a Major IT Transformation Now Happening in Telecoms
"One of the things I'm looking at as operators go through this journey is that this is a cycle that will take between 10 and 15 years," Kelly told eWEEK during a break at the conference. "Most operators have a high capital expenditure structure--they have a lot of high sum costs in the infrastructure--and they're not going to abandon that. What they are trying to do is take advantage of opportunities in the digital services economy to compete against the over-the-top providers, mostly because their core businesses are under attack."


2015 will be the year Linux takes over the enterprise
This rise of Linux in the world of big data will have serious trickle down over the rest of the business world. We already know how fond enterprise businesses are of Linux and big data. What we don't know is how this relationship will alter the course of Linux with regards to the rest of the business world. My prediction is that the success of Linux with big data will skyrocket the popularity of Linux throughout the business landscape. More contracts for SuSE and Red Hat will equate to more deployments of Linux servers that handle more tasks within the business world. This will especially apply to the cloud, where OpenStack should easily become an overwhelming leader.


The First Agile and Lean Open Source Method for Continuous Improvement
There are no silver bullets, we only move forward by learning, experimenting and sharing our discoveries with each other. That is the spirit of Open Kanban to keep those communications lines open, to help people innovate, and collaborate across the aisles of Lean and Agile, a method where innovation and people who think different are welcome. As wonderful as it is to have a few people who think different and collaborate from different sides of Agile and Lean today, this is not enough, especially when they get attacked simply becauase they are seen as the rebels, the non-conformants, the ones who dare to challenge the establishment in their respective camps of Agile or Lean.


QA & Testing Budgets Are Rising for Financial Services Firms
The survey found that as many as 52 percent of organizations are investing more in transformational projects rather than maintaining legacy systems (48 percent). This includes developing new mobile, cloud, and big-data applications and systems. With more development, comes more risk. One application failure can quickly turn into a business process disaster, consumer backlash, and reputational damage -- reiterating the importance of QA and testing today.



Quote for the day:

"My definition of agile is that you accept input from reality, and you respond to it." -- Kent Beck

March 18, 2014

Your next corporate computer might be a Chromebook
What's still missing? Skype or Lync for creating conference calls, that's what. Yes, I know about Google's Hangouts but I really like Skype. I also like Lync. At some point, I expect the two to merge into a single service, because they're both Microsoft properties now. Seriously, Chrome OS needs something other than Hangouts for making calls and conference calls. There are a few Hangout-related apps but I still want Skype. I use Skype on other devices and I really need it on my Chromebook. Lync access would also work for a lot of businesses because they've standardized on it for internal chat and audio conferencing as well.


How Stephen Wolfram plans to reinvent data science & make wearables useful (interview)
It’s a little bit generalized relative to that in the following ways. When data comes in, we have some really good technology for finding what’s interesting in the data. You can generate endless charts and graphs and tables, and things about the data. We have good ways of figuring out what is likely to be the thing where you say, “Oh, that’s an interesting feature of my data,” both because you know a lot about the world and because we have good algorithms for just dealing with the actual raw data. First step is automatic data analysis.


HIDAche - An Exercise in Hardware/Software Integration
The goal of this article is to provide information, by means of a fairly simple example, about how we can make a USB device that communicates with the computer and how we can create cool applications that utilize that communication. As this article is not meant to be an in-depth look at USB I will only cover the basics. ... So to create HIDAche we first need to know what functionality we will need from a hardware perspective. Pretty simple. We need to know the packet format for a HID mouse and keyboard so we can imitate them, USB communication to get that information to the computer, and a way to store our prank settings.


Quantum rewrites the rules of computing
Classic computers use bits -- ones and zeroes -- for processing instructions, and they work based on a series of instructions. Ask the computer a question, and it will move through the calculation in a linear, orderly way. A quantum computer combines computing with quantum mechanics, one of the most mysterious and complex branches of physics. The field was created to explain physical phenomena, like the odd actions of subatomic particles, that classical physics fails to do. One of the rules of quantum mechanics is that a quantum system can be in more than one state at once. But that concept goes against what's known of the world. Something can be green or red but it cannot be green and red at the same time.


With a carrier agnostic-SIM, a carmaker could attach your car to whatever carrier to you happen to have relationship with and change your connection whenever you switched carriers. Or it could run a managed service with multiple carriers, connecting to whomever’s network had the best capacity or coverage wherever you happened to be driving, said van der Berg, who is now with the Organisation for Economic Co-operation and Development (OECD).


Big data: Why IT departments mustn't be a drag on analytics
"Some banks have tried to do analytics on enterprise data warehouses. The tons of analytics we do, if we dared do that, you might actually stall because of the computation power that you're pulling. So we're very careful about doing that," Grogan said. "When I say we maintain our own analytics infrastructure, I mean exactly that. We maintain a pure, cerebral infrastructure that is only used for analytics and analytical processes." But that processing independence doesn't preclude Grogan for being a strong advocate of spreading access to analytics via a secure, governed, self-service portal where staff can research economic and portfolio data.


How to Use Social Media to Improve Your IT Recruiting Strategy
To attract the top quality talent, businesses must engage candidates through venues like social media to sell them on the merits of the company and its mission, Berkowitz says. And one way to do that is by developing an effective social media hiring strategy. "The goal should be to both make potential applicants aware that you have jobs available and to also show what it's like to work for your company -- showcasing the company's personality and culture," Berkowitz says, but that involves more than just posting an endless stream of want ads.


Cyberspying Targets Energy Secrets
“You finally wake up one day and you’re sitting in a world where this is a serious threat to the industry as a whole.” Attacks can go unnoticed for years, or are never reported. As a result, estimates of stolen intellectual property vary “so widely as to be meaningless,” according to a 2011 report on foreign cyberspying by the U.S. Director of National Intelligence, which cited calculations of between $2 billion and $400 billion a year. Companies say they worry most about state-sponsored attacks, which tend to be “incredibly well organized, incredibly sophisticated,” according to BP’s Deasy. Some of the hackers are looking for proprietary data about oil fields, painstakingly gathered using costly seismic surveys, which underpins a business worth $3 trillion a year.


6 Business Opportunities Banks Can Tap In Using Analytics
Thirty percent of banking customers transact with more than one bank with 2.4% of churn expected among primary bank customers within one year, according to a study by IBM. Private sector banks fare slightly better in customer penetration due to a larger portfolio of account offerings and their ability to leverage process capabilities to unlock higher revenue opportunities. The study shows that 87% of customers have only one account with their primary bank and only 58% of their investments lie with them. This provides potential business opportunities for other banks to take advantage of the remaining 42% of customer investments with the help of analytics backed personalization.


Ambitious IT pros seek COO role
With technology now the cornerstone of most companies' operations, there is a growing cross-industry push to connect the oversight of IT with operations. In some cases, like at Learning Ally, the answer is a blended CIO/COO position. At other companies, the CIO is now reporting to the COO or to a hands-on CEO instead of the CFO, which had been the prevalent organizational structure in recent years due to the focus on cost cutting. ... "It used to be that IT was a support function, making sure people had phones and computers. Now IT is in charge of everything from e-commerce applications to mobility. Since those things are the business ... it makes sense to have more overlapping roles."



Quote for the day:

"The most rewarding things you do in life are often the ones that look like they cannot be done. " -- Arnold Palmer

December 07, 2012

Enterprise Data Governance: A Practical Approach to Information Quality Management
It becomes difficult to maintain and manage data without policies, strategies and dedicated efforts by the team across business functions. Data governance seeks to solve these problems, through information policies, data rules, guidelines for managing key data elements and assigning roles for accountabilities and responsibilities.


Finding The Right Blend: Sometimes Pure Agile Isn’t The Way To Go
Agile project managers need to be prepared to work in cooperation with non-Agile project managers, teams that employ traditional methods, and organizations that have resources scattered around the globe. ... Agile adoption doesn’t need to be an all-or-nothing, either-or scenario. The very incremental, iterative concepts that Agile project managers (PMs) apply to their projects can also be applied to Agile adoption.


Gary Hamel On Innovating Innovation
Any innovation effort that doesn’t start by acknowledging that innovation itself is deeply counter-cultural. We’re never going to build a truly innovative company without a gene-replacement therapy. Without that you’re going fail.


SwiftKey Flow review: The Android keyboard you've been waiting for
The new beta version of the popular SwiftKey keyboard released this morning. SwiftKey Flow adds support for gesture-based typing, which means you can type by sliding your finger from one key to another without lifting it off the screen.


Three Examples of New Process Strategy
There are three fundamental ways that companies can improve their processes in the coming decade: (1) expand the scope of work managed by a company to include customers, suppliers, and partners; (2) target the increasing amount of knowledge work; and (3) reduce cycle times to durations previously considered impossible


Telecom NZ trials 4G services
The company announced yesterday that there will be a trial of 4G in the 2.6GHz spectrum band with Huawei in the North Shore, Auckland, while Alcatel-Lucent will run a trial in Lower Hutt, Wellington, on the same spectrum band. In Hawke's Bay, Alcatel-Lucent will also conduct a trial of LTE in the 700MHz spectrum, and in Rotorua, Huawei will trial LTE in the 1800MHz and 2.6GHz spectrum bands.


Don’t Let BYOD Backfire on Your Business
BYOD policies could easily backfire on businesses, unless closely monitored to maintain benefits for employees and the company. Jeff Jones recently wrote a 3-part series on the Microsoft Security Blog called Motivations, Risks and Rewards of the BYOD Trend that examined what the BYOD trend is and then looked at it from the perspective of employees and the perspective of organizations.


.NET 4.5 TypeInfo Reflection
The .NET 4.5 Framework includes some changes to the typical reflection use cases. Most importantly, the Type object has been split into two separate classes: Type and TypeInfo. A TypeInfo instance contains the definition for a Type, and a Type now contains only reference data.


Growth in Cloud Computing to Shape 2013 Security Trends
It's the time when predictions for the new year run high, and when it comes to IT security, Gartner analysts are predicting that 2013 is going to be about expansion of cloud computing and the struggle by the enterprise to achieve appropriate security for it.


Google kills off free Google Apps offering
In an announcement on the company's Google Enterprise blog today, Google Director of Product Management for Google Apps Clay Bavor said that businesses were too quickly outgrowing the free version of Google Apps, and asking for or moving to paid premium accounts. Instead of a free, limited-user version of Google Apps and the paid premium-based version, Google will now only offer the subscription version.



Quote for the day:

"Creativity is the greatest expression of liberty." -- Bryant H. McGill