Showing posts with label VMware. Show all posts
Showing posts with label VMware. Show all posts

Daily Tech Digest - July 12, 2025


Quote for the day:

"If you do what you’ve always done, you’ll get what you’ve always gotten." -- Tony Robbins


Why the Value of CVE Mitigation Outweighs the Costs

When it comes to CVEs and continuous monitoring, meeting compliance requirements can be daunting and confusing. Compliance isn’t just achieved; rather, it is a continuous maintenance process. Compliance frameworks might require additional standards, such as Federal Information Processing Standards (FIPS), Federal Risk and Authorization Management Program (FedRAMP), Security Technical Implementation Guides (STIGs) and more that add an extra layer of complexity and time spent. The findings are clear. Telecommunications and infrastructure companies reported an average of $3 million in new revenue annually by improving their container security enough to qualify for security-sensitive contracts. Healthcare organizations averaged $7.3 million in new revenue, often driven by unlocking expansion into compliance-heavy markets. ... The industry has long championed “shifting security left,” or embedding checks earlier in the pipeline to ensure security measures are incorporated throughout the entire software development life cycle. However, as CVE fatigue worsens, many teams are realizing they need to “start left.” That means: Using hardened, minimal container images by default; Automating CVE triage and patching through reproducible builds; Investing in secure-by-default infrastructure that makes vulnerability management invisible to most developers


Generative AI: A Self-Study Roadmap

Building generative AI applications requires comfort with Python programming and basic machine learning concepts, but you don't need deep expertise in neural network architecture or advanced mathematics. Most generative AI work happens at the application layer, using APIs and frameworks rather than implementing algorithms from scratch. ... Modern generative AI development centers around foundation models accessed through APIs. This API-first approach offers several advantages: you get access to cutting-edge capabilities without managing infrastructure, you can experiment with different models quickly, and you can focus on application logic rather than model implementation. ... Generative AI applications require different API design patterns than traditional web services. Streaming responses improve user experience for long-form generation, allowing users to see content as it's generated. Async processing handles variable generation times without blocking other operations. ... While foundation models provide impressive capabilities out of the box, some applications benefit from customization to specific domains or tasks. Consider fine-tuning when you have high-quality, domain-specific data that foundation models don't handle well—specialized technical writing, industry-specific terminology, or unique output formats requiring consistent structure.


Announcing GenAI Processors: Build powerful and flexible Gemini applications

At its core, GenAI Processors treat all input and output as asynchronous streams of ProcessorParts (i.e. two-way aka bidirectional streaming). Think of it as standardized data parts (e.g., a chunk of audio, a text transcription, an image frame) flowing through your pipeline along with associated metadata. This stream-based API allows for seamless chaining and composition of different operations, from low-level data manipulation to high-level model calls. ... We anticipate a growing need for proactive LLM applications where responsiveness is critical. Even for non-streaming use cases, processing data as soon as it is available can significantly reduce latency and time to first token (TTFT), which is essential for building a good user experience. While many LLM APIs prioritize synchronous, simplified interfaces, GenAI Processors – by leveraging native Python features – offer a way for writing responsive applications without making code more complex. ... GenAI Processors is currently in its early stages, and we believe it provides a solid foundation for tackling complex workflow and orchestration challenges in AI applications. While the Google GenAI SDK is available in multiple languages, GenAI Processors currently only support Python.


Scaling the 21st-century leadership factory

Identifying priority traits is critical; just as important, CEOs and their leadership teams must engage early and often with high-potential employees and unconventional thinkers in the organization, recognizing that innovation often comes from the edges of the business. Skip-level meetings are a powerful tool for this purpose. Most famously, Apple’s Steve Jobs would gather what he deemed the 100 most influential people at the company, including young engineers, to engage directly in strategy discussions—regardless of hierarchy or seniority. ... A culture of experimentation and learning is essential for leadership development—but it must be actively pursued. “Instillation of personal initiative, aggressiveness, and risk-taking doesn’t spring forward spontaneously,” General Jim Mattis explained in his 2019 book on leadership, Call Sign Chaos. “It must be cultivated for years and inculcated, even rewarded, in an organization’s culture. If the risk-takers are punished, then you will retain in your ranks only the risk averse,” he wrote. ... There are multiple ways to streamline decision-making, including redefining decision rights to focus on a handful of owners and distinguishing between different types of decisions, as not all choices are high stakes. 


Lessons learned from Siemens’ VMware licensing dispute

Siemens threatened to sue VMware if it didn’t provide ongoing support for the software and handed over a list of the software it was using that it wanted support for. Except that the list included software that it didn’t have any licenses for, perpetual or otherwise. Broadcom-owned VMware sued, Siemens countersued, and now the companies are battling over jurisdiction. Siemens wants the case to be heard in Germany, and VMware prefers the United States. Normally, if unlicensed copies of software are discovered during an audit, the customer pays the difference and maybe an additional penalty. After all, there are always minor mistakes. The vendors try to keep these costs at least somewhat reasonable, since at some point, customers will migrate from mission-critical software if the pain is high enough. ... For large companies, it can be hard to pivot quickly. Using open-source software can help reduce the risk of unexpected license changes, and, for many major tools there are third-party service providers that can offer ongoing support. Another option is SaaS software, Ringdahl says, because it does make license management a bit easier, since there’s usually transparency both for the customer and the vendor about how much usage the product is getting.


Microsoft says regulations and environmental issues are cramping its Euro expansion

One of the things that everyone needs to consider is how datacenter development in Europe is being enabled or impeded, Walsh said. "Because we have moratoriums coming at us. We have communities that don't want us there," she claimed, referring particularly to Ireland where local opposition to bit barns has been hardening because of the amount of electricity they consume and their environmental impact. Another area of discussion at the Datacloud keynote was the commercial models for acquiring datacenter capacity, which it was felt had become unfit for the new environment where large amounts are needed quickly. "From our perspective, time to market is essential. We've done a lot of leasing in the last two years, and that is all time for market pressure," Walsh said. "I also manage land acquisition and land development, which includes permitting. So the joy of doing that is that when my permits are late, I can lease so I can actually solve my own problems, which is amazing, but the way things are going, it's going to be very difficult to continue to lease the infrastructure using co-location style funding. It's just getting too big, and it's going to get harder and harder to get up the chain, for sure," she explained. ... "European regulations and planning are very slow, and things take 18 months longer than anywhere else," she told attendees at <>Bisnow's Datacenter Investment Conference and Expo (DICE) in Ireland.


350M Cars, 1B Devices Exposed to 1-Click Bluetooth RCE

The scope of affected systems is massive. The developer, OpenSynergy, proudly boasts on its homepage that Blue SDK — and RapidLaunch SDK, which is built on top of it and therefore also possibly vulnerable — has been shipped in 350 million cars. Those cars come from companies like Mercedes-Benz, Volkswagen, and Skoda, as well as a fourth known but unnamed company. Since Ford integrated Blue SDK into its Android-based in-vehicle infotainment (IVI) systems in November, Dark Reading has reached out to determine whether it too was exposed. ... Like any Bluetooth hack, the one major hurdle in actually exploiting these vulnerabilities is physical proximity. An attacker would likely have to position themselves within around 10 meters of a target device in order to pair with it, and the device would have to comply. Because Blue SDK is merely a framework, different devices might block pairing, limit the number of pairing requests an attacker could attempt, or at least require a click to accept a pairing. This is a point of contention between the researchers and Volkswagen. ... "Usually, in modern cars, an infotainment system can be turned on without activating the ignition. For example, in the Volkswagen ID.4 and Skoda Superb, it's not necessary," he says, though the case may vary vehicle to vehicle. 


Leaders will soon be managing AI agents – these are the skills they'll need, according to experts

An AI agent is essentially just "a piece of code", says Jarah Euston, CEO and Co-Founder of AI-powered labour platform WorkWhile, which connects frontline workers to shifts. "It may not have the same understanding, empathy, awareness of the politics of your organization, of the fears or concerns or ambitions of the people around that it is serving. "So managers have to be aware that the agent is only as good as how you've trained it. I don't think we're close yet to having agents that can operate without any human oversight. "As a manager, you want to leverage the AI to make you and your team more productive, but you constantly have to be checking, iterating and training your tools to get the most out of them."  ... Technological skills are expected to become increasingly vital over the next five years, outpacing the growth of all other skill categories. Leading the way are AI and big data, followed closely by networking, cybersecurity and overall technological literacy. The so-called 'soft skills' of creative thinking and resilience, flexibility and agility are also rising in importance, along with curiosity and lifelong learning. Empathy is one skill AI agents can't learn, says Women in Tech's Moore Aoki, and she believes this will advantage women.


Common Master Data Management (MDM) Pitfalls

In addition to failing to connect MDM’s value with business outcomes, “People start with MDM by jumping in with the technology,” Cooper said. “Then, they try to fit the people, processes, and master data into their selected technology.” Moreover, in the process of prioritizing technology first, organizations take for granted that they have good data quality, data that is clean and fit for purpose. Then, during a major initiative, such as migrating to a cloud environment, they discover their data is not so clean. ... Organizations fall into the pitfalls above and others because they try to do it alone, and most have never done MDM before. Instead, “Organizations have different capabilities with MDM,” said Cooper, “and you don’t know what you don’t know.” ... Connecting the MDM program to business objectives requires talking with the stakeholders across the organization, especially divisions with direct financial risks such as sales, marketing, procurement, and supply. Cooper said readers should learn the goals of each unit and how they measure success in growing revenue, reducing cost, mitigating risk, or operating more efficiently. ... Cooper advised focusing on data quality – e.g., through reference data – rather than technology. In the figure below, a company has data about a client, Emerson Electric, as shown on the left. 


Why Cloud Native Security Is More Complex Than You Think

Enterprise security tooling can help with more than just the monitoring of these vulnerabilities though. And, often older vulnerabilities that have been patched by the software vendor will offer “fix status” advice. This is where a specific package version is shown to the developer or analyst responsible for remediating the vulnerability. When they upgrade the current package to that later version, the vulnerability alert will be resolved. To confuse things further, the applications running in containers or serverless functions also need to be checked for non-compliance. Warnings that may be presented by security tooling when these applications are checked against recognised compliance standards, frameworks or benchmarks for noncompliance are wide and varied. For example, if a serverless function has overly permissive access to another cloud service and an attacker gets access to the serverless function’s code via a vulnerability, the attack’s blast radius could exponentially increase as a result. Or, often compliance checks reveal how containers are run with inappropriate network settings. ... At a high level, these components and importantly, how they interact with each other, is why applications running in the cloud require time, effort and specialist expertise to secure them.

Daily Tech Digest - June 01, 2025


Quote for the day:

"You are never too old to set another goal or to dream a new dream." -- C.S. Lewis


A wake-up call for real cloud ROI

To make cloud spending work for you, the first step is to stop, assess, and plan. Do not assume the cloud will save money automatically. Establish a meticulous strategy that matches workloads to the right environments, considering both current and future needs. Take the time to analyze which applications genuinely benefit from the public cloud versus alternative options. This is essential for achieving real savings and optimal performance. ... Enterprises should rigorously review their existing usage, streamline environments, and identify optimization opportunities. Invest in cloud management platforms that can automate the discovery of inefficiencies, recommend continuous improvements, and forecast future spending patterns with greater accuracy. Optimization isn’t a one-time exercise—it must be an ongoing process, with automation and accountability as central themes. Enterprises are facing mounting pressure to justify their escalating cloud spend and recapture true business value from their investments. Without decisive action, waste will continue to erode any promised benefits. ... In the end, cloud’s potential for delivering economic and business value is real, but only for organizations willing to put in the planning, discipline, and governance that cloud demands. 


Why IT-OT convergence is a gamechanger for cybersecurity

The combination of IT and OT is a powerful one. It promises real-time visibility into industrial systems, predictive maintenance that limits downtime and data-driven decision making that gives everything from supply chain efficiency to energy usage a boost. When IT systems communicate directly with OT devices, businesses gain a unified view of operations – leading to faster problem solving, fewer breakdowns, smarter automation and better resource planning. This convergence also supports cost reduction through more accurate forecasting, optimised maintenance and the elimination of redundant technologies. And with seamless collaboration, IT and OT teams can now innovate together, breaking down silos that once slowed progress. Cybersecurity maturity is another major win. OT systems, often built without security in mind, can benefit from established IT protections like centralised monitoring, zero-trust architectures and strong access controls. Concurrently, this integration lays the foundation for Industry 4.0 – where smart factories, autonomous systems and AI-driven insights thrive on seamless IT-OT collaboration. ... The convergence of IT and OT isn’t just a tech upgrade – it’s a transformation of how we operate, secure and grow in our interconnected world. But this new frontier demands a new playbook that combines industrial knowhow with cybersecurity discipline.


How To Measure AI Efficiency and Productivity Gains

Measuring AI efficiency is a little like a "chicken or the egg" discussion, says Tim Gaus, smart manufacturing business leader at Deloitte Consulting. "A prerequisite for AI adoption is access to quality data, but data is also needed to show the adoption’s success," he advises in an online interview. ... The challenge in measuring AI efficiency depends on the type of AI and how it's ultimately used, Gaus says. Manufacturers, for example, have long used AI for predictive maintenance and quality control. "This can be easier to measure, since you can simply look at changes in breakdown or product defect frequencies," he notes. "However, for more complex AI use cases -- including using GenAI to train workers or serve as a form of knowledge retention -- it can be harder to nail down impact metrics and how they can be obtained." ... Measuring any emerging technology's impact on efficiency and productivity often takes time, but impacts are always among the top priorities for business leaders when evaluating any new technology, says Dan Spurling, senior vice president of product management at multi-cloud data platform provider Teradata. "Businesses should continue to use proven frameworks for measurement rather than create net-new frameworks," he advises in an online interview. 


The discipline we never trained for: Why spiritual quotient is the missing link in leadership

Spiritual Quotient (SQ) is the intelligence that governs how we lead from within. Unlike IQ or EQ, SQ is not about skill—it is about state. It reflects a leader’s ability to operate from deep alignment with their values, to stay centred amid volatility and to make decisions rooted in clarity rather than compulsion. It shows up in moments when the metrics don’t tell the full story, when stakeholders pull in conflicting directions. When the team is watching not just what you decide, but who you are while deciding it. It’s not about belief systems or spirituality in a religious sense; it’s about coherence between who you are, what you value, and how you lead. At its core, SQ is composed of several interwoven capacities: deep self-awareness, alignment with purpose, the ability to remain still and present amid volatility, moral discernment when the right path isn’t obvious, and the maturity to lead beyond ego. ... The workplace in 2025 is not just hybrid—it is holographic. Layers of culture, technology, generational values and business expectations now converge in real time. AI challenges what humans should do. Global disruptions challenge why businesses exist. Employees are no longer looking for charismatic heroes. They’re looking for leaders who are real, reflective and rooted.


Microsoft Confirms Password Deletion—Now Just 8 Weeks Away

The company’s solution is to first move autofill and then any form of password management to Edge. “Your saved passwords (but not your generated password history) and addresses are securely synced to your Microsoft account, and you can continue to access them and enjoy seamless autofill functionality with Microsoft Edge.” Microsoft has added an Authenticator splash screen with a “Turn on Edge” button as its ongoing campaign to switch users to its own browser continues. It’s not just with passwords, of course, there are the endless warnings and nags within Windows and even pointers within security advisories to switch to Edge for safety and security. ... Microsoft wants users to delete passwords once that’s done, so no legacy vulnerability remains, albeit Google has not gone quite that far as yet. You do need to remove SMS 2FA though, and use an app or key-based code at a minimum. ... Notwithstanding these Authenticator changes, Microsoft users should use this as a prompt to delete passwords and replace them with passkeys, per the Windows-makers’ advice. This is especially true given increasing reports of two-factor authentication (2FA) bypasses that are increasingly rendering basics forms of 2FA redundant.


Sustainable cyber risk management emerges as industrial imperative as manufacturers face mounting threats

The ability of a business to adjust, absorb, and continue operating under pressure is becoming a performance metric in and of itself. It is measured not only in uptime or safety statistics. It’s not a technical checkbox; it’s a strategic commitment that is becoming the new baseline for industrial trust and continuity. At the heart of this change lies security by design. Organizations are working to integrate security into OT environments, working their way up from system architecture to vendor procurement and lifecycle management, rather than adding protections along the way and after deployment. ... The path is made more difficult by the acute lack of OT cyber skills, which could be overcome by employing specialists and establishing long-term pipelines through internal reskilling, knowledge transfer procedures, and partnerships with universities. Building sustainable industrial cyber risk management can be made more organized using the ISA/IEC 62443 industrial cybersecurity standards. Cyber defense is now a continuous, sustainable discipline rather than an after-the-fact response thanks to these widely recognized models, which also allow industries to link risk mitigation to real industrial processes, guarantee system interoperability, and measure progress against common benchmarks.


Design Sprint vs Design Thinking: When to Use Each Framework for Maximum Impact

The Design Sprint is a structured five-day process created by Jake Knapp during his time at Google Ventures. It condenses months of work into a single workweek, allowing teams to rapidly solve challenges, create prototypes, and test ideas with real users to get clear data and insights before committing to a full-scale development effort. Unlike the more flexible Design Thinking approach, a Design Sprint follows a precise schedule with specific activities allocated to each day ...
The Design Sprint operates on the principle of "together alone" – team members work collaboratively during discussions and decision-making, but do individual work during ideation phases to ensure diverse thinking and prevent groupthink. ... Design Thinking is well-suited for broadly exploring problem spaces, particularly when the challenge is complex, ill-defined, or requires extensive user research. It excels at uncovering unmet needs and generating innovative solutions for "wicked problems" that don't have obvious answers. The Design Sprint works best when there's a specific, well-defined challenge that needs rapid resolution. It's particularly effective when a team needs to validate a concept quickly, align stakeholders around a direction, or break through decision paralysis.


Broadcom’s VMware Financial Model Is ‘Ethically Flawed’: European Report

Some of the biggest issues VMware cloud partners and customers in Europe include the company increasing prices after Broadcom axed VMware’s former perpetual licenses and pay-as-you-go monthly pricing models. Another big issue was VMware cutting its product portfolio from thousands of offerings into just a few large bundles that are only available via subscription with a multi-year minimum commitment. “The current VMware licensing model appears to rely on practices that breach EU competition regulations which, in addition to imposing harm on its customers and the European cloud ecosystem, creates a material risk for the company,” said the ECCO in its report. “Their shareholders should investigate and challenge the legality of such model.” Additionally, the ECCO said Broadcom recently made changes to its partnership program that forced partners to choose between either being a cloud service provider or a reseller. “It is common in Europe for CSP to play both [service provider and reseller] roles, thus these new requirements are a further harmful restriction on European cloud service providers’ ability to compete and serve European customers,” the ECCO report said.


Protecting Supply Chains from AI-Driven Risks in Manufacturing

Cybercriminals are notorious for exploiting AI and have set their sights on supply chains. Supply chain attacks are surging, with current analyses indicating a 70% likelihood of cybersecurity incidents stemming from supplier vulnerabilities. Additionally, Gartner projects that by the end of 2025, nearly half of all global organizations will have faced software supply chain attacks. Attackers manipulate data inputs to mislead algorithms, disrupt operations or steal proprietary information. Hackers targeting AI-enabled inventory systems can compromise demand forecasting, causing significant production disruptions and financial losses. ... Continuous validation of AI-generated data and forecasts ensures that AI systems remain reliable and accurate. The “black-box” nature of most AI products, where internal processes remain hidden, demands innovative auditing approaches to guarantee reliable outputs. Organizations should implement continuous data validation, scenario-based testing and expert human review to mitigate the risks of bias and inaccuracies. While black-box methods like functional testing offer some evaluation, they are inherently limited compared to audits of transparent systems, highlighting the importance of open AI development.


What's the State of AI Costs in 2025?

This year's report revealed that 44% of respondents plan to invest in improving AI explainability. Their goals are to increase accountability and transparency in AI systems as well as to clarify how decisions are made so that AI models are more understandable to users. Juxtaposed with uncertainty around ROI, this statistic signals further disparity between organizations' usage of AI and accurate understanding of it. ... Of the companies that use third-party platforms, over 90% reported high awareness of AI-driven revenue. That awareness empowers them to confidently compare revenue and cost, leading to very reliable ROI calculations. Conversely, companies that don't have a formal cost-tracking system have much less confidence that they can correctly determine the ROI of their AI initiatives. ... Even the best-planned AI projects can become unexpectedly expensive if organizations lack effective cost governance. This report highlights the need for companies to not merely track AI spend but optimize it via real-time visibility, cost attribution, and useful insights. Cloud-based AI tools account for almost two-thirds of AI budgets, so cloud cost optimization is essential if companies want to stop overspending. Cost is more than a metric; it's the most strategic measure of whether AI growth is sustainable. As companies implement better cost management practices and tools, they will be able to scale AI in a fiscally responsible way, confidently measure ROI, and prevent financial waste.

Daily Tech Digest - February 12, 2025


Quote for the day:

“If you don’t have a competitive advantage, don’t compete.” -- Jack Welch


Security Is Blocking AI Adoption: Is BYOC the Answer?

Enterprises face unique hurdles in adopting AI at scale. Sensitive data must remain within secure, controlled environments, avoiding public networks or shared infrastructures. Traditional SaaS models often fail to meet these stringent data sovereignty and compliance demands. Beyond this, organizations require granular control, comprehensive auditing and full transparency to trace every AI decision and data access. This ensures vendors cannot interact with sensitive data without explicit approval and documentation. These unmet needs create a significant gap, preventing regulated industries from deploying AI solutions while maintaining compliance and security. ... The concept of Bring Your Own Cloud (BYOC) isn’t new. It emerged as a middle ground between traditional SaaS and on-premises deployments, promising to combine the best of both worlds: the convenience of managed services with the control and security of on-premises infrastructure. However, its history in the industry has been marked by both successes and cautionary tales. Early BYOC implementations often failed to live up to their promises. Some vendors merely deployed their software into customer cloud accounts without proper architectural planning, resulting in what was essentially remotely managed on-premises environments. 


The Importance of Continuing Education in Data and Tech

Continuing education plays a vital role in workforce development and career advancement within the tech industries, where rapid technological advancements and evolving market demands necessitate a culture of lifelong learning. As businesses increasingly rely on sophisticated data analytics, artificial intelligence (AI), and cloud technologies, professionals in these fields must continuously update their skills to remain competitive. Continuing education offers a pathway for individuals to acquire new capabilities, adapt to emerging technologies, and gain proficiency in specialized areas that are in high demand. By engaging in ongoing learning opportunities, tech professionals can enhance their expertise, making them more valuable to their current employers and more attractive to potential future ones. ... Professional certifications and competency-based education have become significant avenues for career advancement in the data and tech field. As the landscape of technology rapidly evolves, organizations increasingly seek professionals who possess validated skills and up-to-date knowledge. Professional certifications serve as tangible proof of one’s expertise in specific areas such as data governance, analytics, cybersecurity, or cloud computing. These certifications, offered by leading industry bodies and tech companies, are designed to align with current industry standards and demands.


Agents, shadow AI and AI factories: Making sense of it all in 2025

“Agentic AI” promises “digital agents” that learn from us, and can perceive, reason problems out in multiple steps and then make autonomous decisions on our behalf. They can solve multilayered questions that require them to interact with many other agents, formulate answers and take actions. Consider forecasting agents in the supply chain predicting customer needs by engaging customer service agents, and then proactively adjusting warehouse stock by engaging inventory agents. Every knowledge worker will find themselves gaining these superhuman capabilities backed by a team of domain-specific task agent workers helping them tackle large complex jobs with less expended effort. ... However, the proliferation of generative, and soon agentic AI, presents a growing problem for IT teams. Maybe you’re familiar with “shadow IT,” where individual departments or users procure their own resources, without IT knowing. In today’s world we have “shadow AI,” and it’s hitting businesses on two fronts. ... Today’s enterprises create value through insights and answers driven by intelligence, setting them apart from their competitors. Just as past industrial revolutions transformed industries — think about steam, electricity, internet and later computer software — the age of AI heralds a new era where the production of intelligence is the core engine of every business. 


Is VMware really becoming the new mainframe?

“CIOs can start to unwind their dependence on VMware,” he says. “But they need to know it may not have any material reduction in their spend with Broadcom over multiple renewals. They’re going to have to get completely off Broadcom.” Still, Warrilow recommends that CIOs running VMware consider alternatives over the long term. They should also look for exit strategies for other market-dominant IT products they use, given that Broadcom has seen early success with VMware, he says. “The cautionary tale for CIOs is that this is just the beginning,” he says. “Every tech investment firm is going to be saying, ‘I want what Broadcom has with their share price.’  ... “The comparison works a bit, maybe from a stickiness perspective, because customers have built their applications and workload using virtualization technology on VMware,” he says. “When they have to do a mass refactoring of applications, it’s very, very hard.” But the analogy has its limitations because many users think of mainframes as a legacy technology, while VMware’s cloud-based products address future challenges, he adds. “The cloud is the future for running your AI workload,” Shenoy says. “Customers have trusted us for the last 20 to 25 years to run their business-critical applications, and the interesting part right now is we are seeing a lot of growth of these AI workloads and container workloads running on VMware.”


Deep Learning – a Necessity

It is essential in architecture that we realize that a skill set is not an arbitrary thing. It isn’t learn one skill and you are done. It also isn’t learn any skill from any background and you’re in. It is the application of all of the identified and necessary skills combined that makes a distinguished architect. It is also important to understand the purpose and context of mastery. Working in a startup is very different from working in a large corporation. Industry can change things significantly as well. Always remember that the profession’s purpose has to be paramount in the learning. For example, both doctors and lawyers have to deal with clients and need human interaction skills to be successful. Yet, the nature and implementation of these differ drastically. We will explore this point in a further article. However, do not underestimate the impact of changing the meaning of the profession while claiming similar skills. The current environment is rife with this kind of co-opting of the terminology and tools to alter the whole purpose of architecture fundamentally. ... In medicine and other professions, an individual studies and practices for 7+ years to become fully independent, and they never stop learning. This learning is tracked by both mentors and the profession. Because medicine is so essential to humans it is important that professionals are measured and constantly update and hone their competencies.


Crawl, then walk, before you run with AI agents, experts recommend

The best bet for percolating AI agents throughout the organization is to keep things as simple as possible. "Companies and employees that have already found ways to operationalize intelligent agents for simple tasks are best placed to exploit the next wave with agentic AI," said Benjamin Lee, professor of computer and information science at the University of Pennsylvania. "These employees would already be engaging generative AI for simple tasks and they would be manually breaking complex tasks into simpler tasks for the AI. Such employees would already be seeing productivity gains from using generative AI for these simple tasks." Rowan agreed that enterprises should adopt a crawl, walk, run approach: "Begin with a pilot program to explore the potential of multiagent systems in a controlled, measurable environment." "Most people say AI is at the toddler stage, whereas agentic AI is like a tween," said Ben Sapp, global practice lead of intelligence at Digital.ai. "It's functional and knows how to execute certain functions." Enterprises and their technology teams "should socialize the use of generative AI for simple tasks within their organizations," Lee continued. "They should have strategies for breaking complex tasks into simpler ones so that, when intelligent agents become a reality, the sources of productivity gains are transparent, easily understood, and trusted."


Growth of digital wallet use shaking up payment regulations and benefits delivery

Australian banks are calling on the government to pass legislation that accommodates payments with digital wallets within the country’s regulatory framework. A release from the Australian Banking Association (ABA) argues that with the country’s residents making $20 billion worth of payments across 500 million transactions each month with mobile wallets, all players within the payment ecosystem should be under the remit of the Reserve Bank of Australia. ... Digital wallets are by far the most popular method of making cross-border payments, according to a new report from Payments Cards & Mobile. The How Digital Wallets Are Transforming Cross-Border Transactions report shows digital wallets are chosen for international transactions by 42.1 percent. That makes them more people than the next two most popular methods, money transfer services (16.8 percent) and bank accounts (14.8 percent) combined. Transactions with digital wallets are much faster than wire transfers, are available to people who don’t possess bank accounts, and have lower fees than bank transfers, the report says. Interoperability remains a challenge, and regulations and infrastructure limitations could pose barriers to adoption, but the report authors only expect the dominance of digital wallets to increase in the years ahead.


My vision is to create a digital twin of our entire operations, from design and manufacturing to products and customers

We approach this transformation from three dimensions. First is empathy – truly understanding not just who our customers are, but their emotions. This is where the concept of creating a ‘digital twin’ of the customer comes in. Second is innovation – not just adopting new technologies but ensuring that our processes are lean, digitised, and seamless throughout the customer journey, from research to purchase, service, and brand loyalty. The goal is to provide a consistent and empathetic experience across all touchpoints.  ... The first challenge is identifying our customers. For example, if a distributor in one business also buys from another or if a consumer connects with one of our industrial projects, it’s hard to track. To address this, we launched a customer UID project, which has been in progress for months. It helps us identify customers across channels while keeping an eye on privacy and adhering to upcoming data protection regulations. The second part involves gathering all customer-related data in one place. Over the past three years, we unified all customer interactions into a single platform with a one CRM strategy, which was complex but essential. Now, with AI solutions like social listening combined with sentiment analysis, we can understand what our customers are saying about us and where we need to improve, both in India and globally. 


Will AI Chip Supply Dry Up and Turn Your Project Into a Costly Monster?

CIOs and other IT leaders face tremendous pressure to quickly develop GenAI strategies in the face of a potential supply shortage. With the cost of individual units, spending can easily reach into the multi-million-dollar range. But it wouldn’t be the first time companies have dealt with semiconductor shortages. During the COVID-19 pandemic, a spike in PC demand for remote work met with global shipping disruptions to create a chip drought that impacted everything from refrigerators to automobiles and PCs. “One thing we learned was the importance of supply chain resiliency, not being overly dependent on any one supplier and understanding what your alternatives are,” Hoecker says. “When we work with clients to make sure they have a more resilient supply chain, we consider a few things … One is making sure they rethink how much inventory do they want to keep for their most critical components so they can survive any potential shocks.” She adds, “Another is geographic resiliency, or understanding where your components come from and do you feel like you’re overly exposed to any one supplier or any one geography.” Nvidia’s GPUs, she notes, are harder to find alternatives for -- but other chips do have alternatives. “There are other places where you can dual-source or find more resiliency in your marketplace.”


WTF? Why the cybersecurity sector is overrun with acronyms

Imagine an organization is in the midst of a massive hack or security breach, and employees or clients are having to Google frantically to translate company emails, memos or crisis plans, slowing down the response. When these acronyms inevitably migrate into a cybersecurity company’s external marketing or communications efforts, they’re almost guaranteed to cause the general public to tune out news about issues and innovations that could have a far-reaching impact on how people live their lives and conduct their businesses. This is especially true as artificial intelligence (AI!) and machine learning (ML!) technologies expand and new acronyms emerge to keep pace with developments. Acronyms can also have unfortunate real-life connotations — point of sale, to name just one example. When shortened to POS, it can suggest something is… well, crappy. ... So, what’s behind the tendency to shorten terms to a jumble of often incomprehensible acronyms and abbreviations? “On the one hand, acronyms, abbreviations and jargon are used to achieve brevity, standardization and efficiency in communication, so if a profession is steeped in complex and technical language, it will likely be flowing with acronyms,” says Ian P. McCarthy, a professor of innovation and operations management at Simon Fraser University in Burnaby, British Columbia.

Daily Tech Digest - February 09, 2025


Quote for the day:

“Be patient with yourself. Self-growth is tender; it’s holy ground. There’s no greater investment.” -- Stephen Covey


Quantum Artificial Intelligence

Classical AI faces limitations related to computational efficiency, data processing capabilities, and pattern recognition in highly complex systems. Quantum computing, leveraging superposition and entanglement, offers promising solutions to overcome these challenges. ... Deep learning models form the backbone of modern AI, but training them requires enormous computing power and time. Quantum Deep Learning (QDL) introduces quantum-based algorithms, such as Grover’s Algorithm and Shor’s Algorithm, which can significantly accelerate deep learning processes, allowing for more sophisticated and efficient AI models. ... Traditional AI systems rely on sequential or limited parallel processing. However, quantum computers can process multiple possibilities simultaneously due to quantum superposition, enabling AI models to analyze vast amounts of data exponentially faster than classical systems. ... Physicist Roger Penrose and neuroscientist Stuart Hameroff proposed the “Orch-OR” (Orchestrated Objective Reduction) theory, suggesting that human consciousness arises from quantum processes within microtubules in brain neurons.If true, this raises the possibility that an AI system powered by quantum computing could simulate or even replicate aspects of human consciousness.


Life After VMware: Which Alternative Is Right For You?

Despite an unhappy VMware customer base, Broadcom is thriving. In its most recent earnings, the company posted record revenues of $51.6 billion, with $2.7 billion coming from software sales. Broadcom is betting that, despite rising costs, enterprises will still choose VMware over competing solutions. However, that gamble is far from certain, with mounting competition from alternative hypervisors, open-source platforms, and public-cloud specific solutions. ... However, moving away from VMware is no simple task. Enterprises must weigh migration complexity, integration challenges, and the long-term viability of their chosen alternative. The decision isn’t just about cost savings — it’s about aligning IT strategy with the future of hybrid cloud, containerization, and AI-driven workloads. ... This shift is already creating winners. Nutanix, Microsoft Hyper-V, Azure Stack HCI, and Red Hat OpenShift Virtualization are emerging as viable competitors. Each of these offer distinct advantages based on business needs and strategic direction, with Nutanix leading the pack. The time to act is now. Enterprises that proactively navigate this transition will mitigate the uncertainties of VMware's new ownership and position themselves for long-term success. 


AI Agents Are Now Trading IP Rights With Each Other—And Earning Crypto for Their Owners

Since Story Protocol functions as an IP market, everything revolves around that idea, and the mechanics are straightforward. I agents register their work on Story's blockchain, and then other agents purchase those assets using crypto. The system handles licensing, rights management, and revenue distribution automatically through smart contracts. Humans can use the system instead of agents, but that’s not nearly as cool. In fact, some agents are already negotiating the IP with other agents—not just humans. “There's a lot of agentic commerce happening on Story because Story is a permissionless, programmable IP system," Lee said. ... Lee described a system where AI-generated content based on Goyer's universe would automatically split revenue between the AI creator and the original IP holder. This model ensures creators are compensated when AI builds on their work. He emphasized that the universe is entirely original, with all characters, ships, and storylines registered on Story. Users can expand on those elements, create side stories, contribute to the canon, and share in the financial benefits. This approach, he said, represents a new way for AI to collaborate with creators, extending and monetizing their work while distributing the rewards. ... Story’s value proposition has also been interesting enough to attract other significant AI projects.


Finally, I Found The Best AI IDE!

Let's be honest. Traditional coding can be... tedious. We spend countless hours wrestling with syntax, debugging obscure errors, and searching Stack Overflow for that one line of code that'll fix everything. ... But the reality, until now, has often fallen short. Many "AI" tools felt like glorified autocomplete, offering suggestions that were more distracting than helpful. Others were locked behind hefty paywalls, making them inaccessible to many developers. ... After extensive testing, my personal winning combination is Aide + Theia.Aide for day-to-day coding. The AI pair-programming features are simply unmatched for productivity. And the fact that it's fully open-source and free is the icing on the cake. Theia IDE for larger projects, collaborative work, or when I need the flexibility of a cloud-based environment. Its compatibility with VS Code extensions and LSP makes it a future-proof choice. Why not Windsurf or Cursor? While Windsurf offers a compelling free tier, its closed-source nature is a dealbreaker. Cursor is fantastic, but the price tag puts it out of reach for many developers. ... The world of AI-powered IDEs is evolving at lightning speed. But for me, the combination of Aide and Theia represents the sweet spot: powerful, flexible, and accessible to everyone. 


Rewiring maintenance with gen AI

As the problems pile up, forward-thinking maintenance functions are searching for new ways to address cost, productivity, and skills challenges. Gen AI is emerging as a transformative solution for these challenges. Gen AI tools use advanced machine learning models to accelerate data analysis, predict potential failures, automate routine tasks, and retain critical knowledge.  ... Armed with the gen AI tool, frontline maintenance teams are now evolving their maintenance strategies, adopting best practices from across the organization. The system continuously updates its library of recommended strategies based on the effectiveness of maintenance interventions elsewhere, helping the organization collaboratively improve overall maintenance performance. Since implementing the gen AI FMEA tool, the company has seen a significant reduction in equipment downtime. Employee capacity has also increased because less time is spent manually creating FMEAs and related work orders. ... Realizing the full potential of gen AI in maintenance is challenging for several reasons. These technologies are novel, requiring maintenance organizations to understand new technologies and avoid unfamiliar pitfalls. And gen AI is advancing extremely rapidly, requiring an agile approach to use-case selection, tool development, and continuous evolution.


Chain-of-Associated-Thoughts (CoAT): An AI Framework to Enhance LLM Reasoning

Unlike static RAG approaches that retrieve information upfront, CoAT activates knowledge retrieval in response to specific reasoning steps—equivalent to a mathematician recalling relevant theorems only when needed in a proof. Second, an optimized MCTS algorithm incorporates this associative process through a novel four-stage cycle: selection, expansion with knowledge association, quality evaluation, and value backpropagation. This creates a feedback loop where each reasoning step can trigger targeted knowledge updates, as shown in Figure 4 of the original implementation. ... For retrieval-augmented generation (RAG) tasks, CoAT was compared against NativeRAG, IRCoT, HippoRAG, LATS, and KAG on the HotpotQA and 2WikiMultiHopQA datasets. Metrics such as Exact Match (EM) and F1 scores confirmed CoAT’s superior performance, demonstrating its ability to generate precise and contextually relevant answers. In code generation, CoAT-enhanced models outperformed fine-tuned counterparts (Qwen2.5-Coder-7B-Instruct, Qwen2.5-Coder-14B-Instruct) on datasets like HumanEval, MBPP, and HumanEval-X, underscoring its adaptability to domain-specific reasoning tasks. This work establishes a new paradigm for LLM reasoning by integrating dynamic knowledge association with structured search. 


Begin with problems, sandbox, identify trustworth vendors — a quick guide to getting started with AI

The most valuable testing uses a framework connecting to crucial key performance indicators (KPIs). According to Google Cloud: “KPIs are essential in gen AI deployments for a number of reasons: Objectively assessing performance, aligning with business goals, enabling data-driven adjustments, enhancing adaptability, facilitating clear stakeholder communication and demonstrating the AI project’s ROI. They are critical for measuring success and guiding improvements in AI initiatives.” In other words, your testing framework could be based on accuracy, coverage, risk or whichever KPI is most important to you. You just need to have clear KPIs. Once you do, gather five to 15 people to perform the testing. Two teams of seven people are ideal for this. As those experienced individuals begin testing those tools, you will be able to gather enough input to determine whether this system is worth scaling. Leaders often ask what they should do if a vendor isn’t willing to do a pilot program with them. This is a valid question, but the answer is simple. If you find yourself in this situation, do not engage further with the company. Any worthy vendor will consider it an honor to create a pilot program for you. ... 


Meta has an AI for brain typing, but it’s stuck in the lab

Facebook’s original quest for a consumer brain-reading cap or headband ran into technical obstacles, and after four years, the company scrapped the idea. But Meta never stopped supporting basic research on neuroscience, something it now sees as an important pathway to more powerful AIs that learn and reason like humans. King says his group, based in Paris, is specifically tasked with figuring out “the principles of intelligence” from the human brain. “Trying to understand the precise architecture or principles of the human brain could be a way to inform the development of machine intelligence," says King. “That’s the path.” The typing system is definitely not a commercial product, nor is it on the way to becoming one. The magnetoencephalography scanner used in the new research collects magnetic signals produced in the cortex as brain neurons fire. But it is large and expensive and needs to be operated in a shielded room, since Earth’s magnetic field is a trillion times stronger than the one in your brain. Norman likens the device to “an MRI machine tipped on its side and suspended above the user’s head.” What’s more, says King, the second a subject’s head moves, the signal is lost. “Our effort is not at all toward products,” he says. 


Enterprise Architecture: How AI and Distributed Systems are Transforming Business

Predictive scaling represents the next frontier in enterprise architecture. By analyzing patterns across historical usage, seasonal variations and user behavior, modern systems can anticipate resource needs before demand spikes occur. This proactive approach marks a significant departure from traditional reactive scaling methods, dramatically improving both performance and cost efficiency. The implementation of AI in enterprise systems demands careful consideration of broader organizational goals. Technical teams must build robust data pipelines while maintaining clear communication channels across departments. System architecture should accommodate current needs while remaining adaptable enough to incorporate emerging technologies and methodologies. Predictive scaling is revolutionizing enterprise architecture by enabling systems to anticipate resource needs before demand spikes occur. At Cisco, we implemented predictive scaling in IoT networks managing millions of connected devices. Machine learning algorithms analyzed patterns in device usage and system load, dynamically adjusting server capacity to ensure seamless operations. This 


Building a Culture of Cyber Resiliency with AI

It makes sense that the top concern for cybersecurity leaders is vulnerabilities associated with unpatched software and systems in their current tech stack (54%). Close behind are concerns around vulnerabilities brought on by misconfiguration (48%), and end-of-life systems (43%). Despite recognizing the need to address these exposures, nearly half of organizations surveyed scan for vulnerabilities only once a week, or less frequently, signaling a lack of adequate resources to identify and address potential threats in a timely manner. The Verizon DBIR suggests that organizations took almost two months to patch and remediate 50% of critical vulnerabilities, while these same vulnerabilities became mass-exploitable in five days. This makes it a perilous situation for enterprises. To top it all, threat actors and their methods, powered by AI, are becoming increasingly difficult to detect and prevent. Recent data found that 95% of IT leaders believe that cyber-attacks are more sophisticated than ever before, with AI-powered attacks being the most serious emerging threat. Over 80% of those respondents agreed that scams like phishing have become more difficult to detect with the rise in actors using AI maliciously. 

March 10, 2016

Designing a modern enterprise architecture

The reason enterprise architectures must change is the confluence of high-speed connectivity and decades of exponential Moore's Law improvements in computing power. This has enabled cheap smartphones to saturate the market and utility-scale IT service providers to create cloud services. Together, these technologies have catalyzed dramatic changes in business. Whether you call it the New Economics of Connections (Gartner) or the Unbounded Enterprise (AT&T Bell Labs), it means businesses, and consequently IT systems and applications, will increasingly interact not just with people, but devices, virtual objects, and other software in the form of automated business processes and intelligent devices.


Biggest-Ever Blockchain Trial is Only the Beginning

Grant described the trial in similarly ambitious terms, indicating that it sent four technology providers specifications for the test – Chain, IBM, Intel and Eris (which delivered versions of the concept on its platform and Ethereum) – that included design specs for three specific trading scenarios. "We had [banks] issuing, trading and redeeming commercial paper, and we had every one of those banks do that in the platform," Grant said. He explained that all banks were encouraged to transact with at least one other bank over the course of the trial, with Grant suggesting that "at least 60 trades" were completed in the simulations. No real funds were exchanged as part of the test. Grant suggested that two of R3’s partners declined to participate due to what he called a "significant resource requirement".


Is DevOps good or bad for security?

Miller views that as one of the benefits of DevOps. “Because CD emphasizes having a code review process, small check-ins and rapid mitigation come with it. If you can deploy four or five times a day, you can mitigate something within hours.” The same applies to spotting breaches, says Sam Guckenheimer from Microsoft’s developer tools team. “With DevOps, you're worried about things like mean time to detect, mean time to remediate, how quickly can I find indicators of compromise. If something anomalous happens on a configuration, you have telemetry that helps you detect, and you keep improving your telemetry – so you get better detection, you get better at spotting indicators of compromise and you get better at remediation.” Continuous deployment makes life harder for attackers in two ways, Guckenheimer explains.


Context is king: Aruba founder talks about future of wireless

Speaking about upcoming wireless standards, Melkote said that 802.11ad would rise to prominence within the next two years. The 60GHz technology doesn’t propagate over great distances or through thick barriers, but offers the possibility of very high throughput. “Initially, it was envisioned as a high-speed replacement for cable,” he said. “If you’re trying for coverage, it’s not the right technology, but if you’re trying to provide capacity, it can be a good technology.” But he cautioned that it is still very early in the game where 802.11ad is concerned, and that there aren’t even chipsets yet available. “The big thing that I look for here is the economics – can you get to a price point that is palatable for the end user?” Melkote said.


The Data Science Puzzle, Explained

While one may not agree entirely (or even minimally) with my opinion on much of this terminology, there may still be something one can get out of this. Several concepts central to data science will be examined. Or, at least, central in my opinion. I will do my best to put forth how they relate to one another and how they fit together as individual pieces of a larger puzzle. As an example of somewhat divergent opinions, and prior to considering any of the concepts individually, KDnuggets' Gregory Piatetsky-Shapiro has put together the following Venn diagram which outlines the relationship between the very same data science terminology we will be considering herein. The reader is encouraged to compare this Venn diagram with Drew Conway's now famous data science Venn diagram, as well as my own discussion below and modified process/relationship diagram near the bottom of the post.


The Benefits of Hiring Freelance Big Data Experts

One of the major benefits gained from going the freelance route is flexibility. Instead of hiring a full time data scientist to oversee all big data projects within an organization, the company instead hires on a per project basis. This is especially important for smaller businesses, since the time between big data projects at that level can often be lengthy. Passing over the full time option means a business wouldn’t have to worry about paying a big data expert when they have nothing for them to do. Hiring based on the project means a smarter use of limited resources. This added flexibility also leads to choosing data experts based off of their individual talents. For example, if a big data project requires hiring a data scientist with expertise in sales, the small business can do so. Their fees aren’t based off of a salary but rather on the milestones reached in the project.


Digital Hijackers – the rising threat of ransomware

Ransomware is a cyber version of kidnapping, with the same motives: money. It works like a virus that secretly encrypts files. Victims don’t get the key until paying the ransom. It’s as if instead of a thief stealing your car, they took the car keys and put them in a safe left in your garage. You don’t get the combination to the safe, and use of your car unless you pay up. ... As the attacks have gotten more advanced and correspondingly expensive to develop, they have also become more costly, with an average ransom of about $300 per infected host. What is an extortionate annoyance to someone trying to get their family photo library back can be a significant business expense, both in the ransom itself and the indirect costs of operational disruption and cleanup, when faced with a data center full of affected systems.


Defining 'reachability' on the global Internet

Each geographic market has Internet Service Providers (ISPs) that connect customers to the Internet, and those local ISPs connect to larger ISPs that ultimately connect to geographies all over the world. Your website sits in data centers or in the cloud with its own Internet connectivity. This combined connection path between your website and these ISPs is how you get to different markets. These days, every business is Internet based, which means your customer can come from any market. Even a North American-focused company is still concerned about dozens of important markets. Global companies can be connecting to customers in up to 800 markets. Knowing how well your web assets can reach a market allows you to plan business expansion, plan cloud, CDN and hosting investments, and tune your application and performance metrics by market.


VMware Virtual SAN: The Technology And Its Future

The economics of storage are skewed in favor of all-flash for an increasing number of use cases. For me, our experience with the Virtual SAN cluster deployed as part of the Hands-On Lab (HOL) infrastructure in VMworld 2014 was an eye opener. The storage workload generated by 100s of concurrent, constantly churning Labs is not very cache friendly (no surprise here). As such, the VMware IT team used a large number of spindles for the capacity tier of Virtual SAN to deal with the workload “escaping” the cache. In other words, the spindles were needed for performance, not capacity. We realized that an all-flash hardware would require fewer capacity devices and it would cost less! And that was already the case back in 2014. The main challenge with the high-capacity, low cost SSDs is their low endurance (typically below 1 device-write per day guaranteed for 5 years).


What is IT Service Brokering? Find out in this recent paper

In a very simple and easy-to-understand way, Moore explains the differences between cloud service brokering and service brokering, and why brokerage in IT is needed. He analyzes what makes up a service broker and what parts are IT’s responsibility, such as APIs, micro-services and application services. Moore discusses where to start to become a service broker as well as some initial challenges that IT needs to overcome. Service broker is a new operating model for IT and multiple steps, some substantial and time consuming, are needed. Moore talks about navigating this transition throughout the automation, orchestration and transformation phases. Digital disruption is real, and for IT, among many other aspects, it brings a new type of integration delivery.



Quote for the day:


"There is only one thing that makes a dream impossible to achieve: the fear of failure." -- Paulo Coelho


February 19, 2016

An absolute beginner’s guide to setting up Google Analytics for your website

Google Analytics is a free service that tracks and reports website traffic. Providing insight into the demographics of site visitors, the performance of a specific campaign, and how long people are staying on your site for, are just a few of the many things the program is capable of.  This data gives you an all round better view of how your site is doing and allows you to understand what improvements can be made to make sure you’re optimizing different areas for maximum conversion.  In the below tutorial, we will walk you through some basics of Google Analytics and what you need to do in order to get started.


VMware aims for thought leadership with new releases

The major new sizzle here though is VMware Horizon Air with Hybrid-Mode, a new cloud-scale architecture which offers a new approach to building, delivering and managing virtual workspaces through giving customers the choice of a full cloud-hosted service or hybrid service. It will consist of two main components – a unified Cloud Control Plane and Horizon Node technology that works with VMware Horizon Air ready infrastructure. “Hybrid Mode lets you run in the desktop, but also spin VMs up and down in a third party cloud, and that’s new here,” Rosemarin said. VMware Horizon Air-enabled hyper-converged appliances will let IT administrators create up to 2,000 virtual desktops in under 20 minutes.


People in CIO positions should stay off this list

The main requirement of CIO positions is to deliver and safeguard the IT systems that keep businesses running; being perceived as untrustworthy is unthinkable for CIOs. Yet, if their IT organizations have a history of failures in delivering bread-and-butter service, the business side is going to have a hard time trusting the CIO to deliver the more advanced capabilities that can provide a competitive advantage, such as big data analytics or cloud computing. A CIO also won't be trusted, Cameron explained in the report, if the IT department doesn't build systems that are "end-to-end" -- integrated into all the other applications a business uses on a daily basis. At Home Depot, Cameron told me, a checkout clerk can ring you up, of course, but he can also let you know about a sale the store is having that day or check on the availability of another item you might need.


Africa’s big banks are betting on fintech startups and bitcoin to beat disruption

There’s good reason for banks to be afraid, says Vinny Lingham, a South African serial entrepreneur whose current blockchain startup, Civic, is based in Silicon Valley. “I think the banking sector in Africa is going to be disrupted faster than anywhere else in the world. What you have with bitcoin and blockchain is a trustless method of operating. You don’t need third parties like banks operating as trust brokers anymore. It’s all built into the code. The way mobile leapfrogged fixed lines communications in Africa, blockchain will leapfrog a lot of the financial infrastructure that exists today.” In order to get ahead of that, Barclays opened the first African branch of Rise, its global network of innovation spaces, in December 2015.


Video Conferencing on Mobile Platforms: Promises, Expectations, Challenges

Technically, if device manufacturers could find common grounds with each other and stop placing frontal cameras in random places, it would not cause major discomfort at such a distance. If only we could count out the view angle from the given equation! Our reflexes tell us to hold the screen at the chest level so we could still be able to see objects in front of us if necessary. Alas, at this angle the camera will capture us from underneath, showing only the beautiful scenery of our chin. We certainly will project an impression of professional directness by looking at our partner face-on. But is it always appropriate? For one thing, it is uncomfortable and dangerous to hold a mobile device at eye level with your hands stretched out for long periods. It would be a different story if we were seated at a table: in this case, the optimal screen position is slightly below the eye level with a slight tilt.


Dwolla is Back, But Focused on Blockchain, Not Bitcoin

"Dwolla has a very interesting asset in [its] alternative payment network which they’ve had before bitcoin and Ripple," says Gil Luria, an analyst focusing on bitcoin at Wedbush Securities. Dwolla launched in 2010 and from its meager start in Des Moines, Iowa, with just a few small bank and retailer clients and two employees, it has grown to 15 employees and 20,000 customers processing more than $1m a week. Over the past few years, the company has built relationships with government entities in Iowa, speeding up the payment of cigarette stamp tax, vehicle registration and fuel tax. In October 2014, BBVA Compass partnered with Dwolla for its FiSync real-time payments platform.



Negotiating cloud contracts: A new era for CIOs

Many cloud providers will say, "Our terms and conditions are what's on our website." But providers have been known to revise terms without notice, said Colin Whiteneck, senior manager, Deloitte Consulting, who helps CIOs with cloud contracts. "You need to get them to negotiate so they give you specific Ts and Cs," Whiteneck said. "If they're not willing to negotiate, you tell them you don't even want to see their proposal." Even if a provider insists on sticking to standard terms, it's important for a contract to spell out that those terms should apply through the length of the contract to avoid having to swallow any future changes that might be unfavorable to the business.


Researchers devise method to detect location spoofing by calculating network delays

CPV relies on the strong correlation between geographic distance and network delays. With the widespread use of cloud computing, a given user would likely be connected to a geographically nearby server (particularly in bandwidth-intensive cases such as streaming video). Users cloaking their geographic location with a VPN typically experience slower performance than users in the "correct" location, connecting directly to the service provider. CPV uses a new, custom protocol to verify the forward and reverse one-way delays between two hosts on the internet. To ensure reliability, heuristics are used to improve the accuracy of delay-to-distance mapping., and reduce the impact of variable network performance on this calculation.


What Bendable Screens Mean For The Future Of UI

Called the Reflex, Vertegaal's deforming smartphone features a flexible plastic screen, coupled with some haptic motors for feedback. By bending the screen, the Reflex allows users to do things such as quickly flip through pages in an e-book. The more you bend the Reflex, the faster the pages flip, providing a navigation experience more in tune with a physical book. The same affordance can be used to pull back a slingshot in Angry Birds, allowing you to actually feel the resistance growing as you bend the Reflex. And because the screen is flexible and made of plastic, it's harder to break than your average smartphone, which generally consists of a glass screen, a rigid circuit board, and batteries.


Cybersecurity Whistleblowers: Get Ready For More

And while legal protections may not be explicit for cybersecurity whistleblowers, they exist by implication, experts say. Lance Hayden, managing director at the Berkeley Research Group and a CSO contributor, is one of several who have cited a settlement last September between the SEC and R.T. Jones Capital Equities Management over charges that the firm’s violation of the “safeguards rule” led to a breach that compromised the information of about 100,000 people. While the firm did not have to admit to the charges, it agreed to a censure by the SEC and to pay a $75,000 fine. There was no documented evidence of whistleblower involvement in the case, but Hayden wrote that it became, “a sort of catalyst,” for the SEC to focus on cybersecurity.



Quote for the day:


"One cool judgment is worth a thousand hasty counsels. The thing to do is to supply light and not heat." -- Woodrow Wilson