Showing posts with label consumerization. Show all posts
Showing posts with label consumerization. Show all posts

Daily Tech Digest - April 17, 2017

Has Retail Security Technology Gone Too Far?

The most common and highly visible form of retail security technology that shoppers will encounter is radio-frequency identification (RFID). As explained by OCS Retail Support, RFID tags and scanners work by having individual items give off unique frequencies embedded with information, and having scanners (often in the doorway) pick up this information. If an item leaves the store without being paid for, an alarm will sound, alerting shop staff to the shoplifter (or accidental shoplifter). Amazon Go have already announced that they will be using a variant of this technology to facilitate their checkout-less payments, with purchases being registered when customers leave the store. Other retailers may follow suit. Though perhaps a little intrusive by nature, this form of technology has not caused indignation amongst privacy campaigners.


Honesty is not the best privacy policy

For starters, it's probably a good idea to create fake Facebook and Twitter accounts now so they can have a history by the time you need them. Best practices around this deception haven't been fully developed by security experts, but it probably begins with using your real picture for the fake accounts and a picture of something other than your face for the real ones. When border agents demand the passwords to your social accounts, you can give them access to the fake accounts. Increasingly, people with business or other secrets may buy a second phone to carry while traveling, and leave the real one behind — or at least in checked luggage. And finally, there's the pollution solution, as demonstrated by MIT's Steven Smith. You probably won't have to roll your own. I expect to see an emerging industry of traffic-spoofing browser plug-ins and something similar for messaging apps.


How will future cars stay up-to-date? Make them open like a PC

“There’s going to be pressure to keep the software up-to-date, and not to use hardware beyond an expiration date,” Perens said. He himself has gone through at least six mobile phones over the course of owning his 2007 Toyota Prius, and wonders how future cars will keep up with rapid technological changes. “We haven’t seen much discussion about it, so we thought this might kick things off,” Determann said. Their open car idea may sound like a threat to the auto industry. But every car vendor has a vision for their future business, Determann said. And for some, it may include a degree of openness. He can imagine partnerships between automakers and software vendors to support the tech features in next-generation cars. In that way, “we might see more open and closed cars competing on the road,” he said.


Debating IoT security at MIT Connected Things

The first is to think about security systematically in those situations (typically industrial and other commercial uses) where devices are managed and the manufacturer presumably has a formal responsibility for ongoing updates and patches and maintains some sort of control. Brandon Freeman of Leidos said that there are two questions that he always asks suppliers, “What’s your lifecycle update process? When have you pen [penetration] tested the device?” The second is to acknowledge that low-cost, whether consumer or industrial, endpoint devices are going to be problematic to secure. I made this point recently and it was echoed by a number of speakers throughout the day; it’s just not viable economically to expect updates of essentially disposable devices. ... As United Technologies’ Isaac Chute put it, “Should we be doing some things differently? It comes down to having a different trust model. Things are too complex for the average person.”


Why So Many Businesses Mess Up Employee Development

Good leaders know how to listen, but strong listening skills are rare. Focus some managerial training on active listening, which is crucial to communication. Active listening is a technique that requires the listener to fully concentrate on the content being shared and to develop a strong understanding of it. This helps the listener gain insight into the employee’s perspective and provide effective input. Training management on this skill is pretty simple. The basic tips to emphasize may sound like common sense, but they need to translate into a practice they use daily. They should pay attention, acknowledge the message and look at the speaker directly. Body language such as nodding, smiling and maintaining an upright posture show they are listening and are engaged in the discussion. After the employee voices their perspective, managers should follow up by paraphrasing to reflect back their points and ask for clarification when needed.


How Accountants Can Help Clients Avoid Data Breaches

Because there are a lot of similarities in different types of data breach scenarios, Verizon has opened up the cyber case files in our second annual Data Breach Digest (DBD) so that industries can strengthen their network security processes. The DBD details 16 real-world data breach scenarios based on their prevalence and/or lethality in the field. It is important for organizations to understand how to identify signs of a data breach and important sources of evidence so they can investigate, contain and recover from a breach as fast as possible. Given today’s highly charged cybercrime environment, CPAs can play a vital role in helping their clients become aware of commonly used tactics to better protect financial assets. It’s important to understand that timing is critical when it comes to incident response. The reality is, cybercriminals can break in and steal data in a matter of minutes.


Low-Code Platforms: The Ultimate In Consumerization Of Enterprise Tech

Not only are low-code platforms easy to use, they also follow rapid application development methodologies, which helps in building a prototype quickly. Citizen developers can create a minimum viable product, ready to be used, 4-7 times faster than that created using traditional coding. Citizen developers are typically business managers who are closer to the problem and are best suited to develop a solution. So instead of creating and maintaining multiple apps for each and every department, an IT department can just train people from each department to use low-code platforms, and enable them to fulfil their own app demands. In fact, Gartner predicts that IT will evolve into bimodal IT, where the department primarily focuses on strategy with stability and efficiency in mind, while shifting the development portion to the business units that need it.


Microchip implants help employees access data

The practice, in which employees at Epicenter, a Swedish innovation house, become chip-enabled, has been widely reported on—but the headlines have been somewhat misleading. A party, like the one held in 2014, is held there about once a quarter. The employees are not quite "cyborgs," and they are not asked to implant chips against their will. The company does not pay the cost, and there is no HR policy that encourages it. Epicenter has a member base of about 2000 people from over 300 companies, and only about six of the employees at Epicenter have had chips implanted. The technology, it must be noted, is not new. These kinds of chips have been used to track pets, or deliveries. But having them implanted in humans raises concerns about privacy risks.


How self-driving cars can change your cloud strategy

Every enterprise of any size is now or soon will become a cloud-based company. The issue then is not whether to use the cloud but how to extract the best value from it. Alongside that cloud subscription comes a wave of bits from the exponential growth of devices: from cars to wall widgets returning environmental data, all that information needs to be stored and analysed if it is to add value. For manufacturers and resellers of technology such as IoT devices, this looks like an extension of existing business models, as such companies already offer services on the back of hardware and software sales. However, this may not be a familiar business model to companies not involved in the tech industry. Yet, because of today's reliance by all enterprises on technology, exploiting the data for which the company has already paid makes a lot of sense.


Cars and the IoT: The lane lines are blurring

Of course you can argue that the IoT in some form has existed for decades, but we're talking about what the progression of Moore's Law has wrought in the modern day. Moore's Law is salient because in the majority of organizations that have an IoT business practice, division, subsidiary, product or service line, etc., the origins often came from something to do with semiconductors. This is understandable since the modern era of IoT, literally from the time the term first began floating around, started with devices, a.k.a., things. That were connected to the internet. For a long while, it's been about getting things out there and connected.  In concert with the IoT showing up in non-mobile form, in environments and instances ranging from home thermostats to enormous factories, there's been a gradual introduction of connected, microprocessor-based devices that are mobile.



Quote for the day:


"Technology has become as ubiquitous as the air we breathe, so we are no longer conscious of its presence." -- Godfrey Reggio


August 16, 2015

Visa to Deploy Blockchain Research Team in Bangalore, India

Considered the innovation hub of India, Bangalore, which was selected in November to host Visa’s technology center in that country, offers Visa the ability to attract world-class talent in a thriving community with world-class innovation centers and technology facilities. Other Indian technology companies, such as Tata Consultancy Services and Infosys, have invested in blockchain technology. In fact, almost a third of the work done by Indian IT firms is for global banks, and many global banks are trying to jump on the blockchain bandwagon before it’s too late. Visa itself, which outsources part of its technology development to Infosys and other Indian firms, said it is open to working with some of them on blockchain-related developments.


Andrew Duguay, Prevedere on Economic Intelligence from Integrating Public Datasets

The sheer volume of analysis would have taken a detrimentally long time to do with traditional tools such as Excel or legacy statistical packages, making this a new and unique way of harnessing and finding analytical value in Big Data. Our patent pending software uniquely provides any company a competitive advantage. ... Prevedere is a gathering place for publicly available data that is structured, time series, and could possibly relate to businesses.  Businesses are using Prevedere to see how their internal metrics are relating to common economic indicators such as Gross Domestic Product, Housing Starts, Consumer Sentiment, Disposable Personal Income and the Purchasing Managers Index.


How Big Data is Driving the Consumerization of Health Care

In conjunction with mobility, big data is changing the way patients engage with their doctors and experience their treatment. Research has found that three out of five patients would choose telehealth visits over in-person appointments for minor check-ups and follow-ups. In PwC's survey, more than 50 percent of respondents would feel comfortable sending a digital photo of a rash or skin problem to a dermatologist for an opinion. Not only is the technology for "virtual treatment" available, but 64 percent of surveyed patients expressed their willingness to adopt new, non-traditional ways of seeking medical attention. In a world where services are available in an instant, doctors must start treating their patients as a customer to continue to meet their needs.


3 Business Alignment Opportunities for CIOs

Most CIOs agree that they need to focus most intently on aligning with the line of business. “While CEOs can have a strategic plan, they do not operationalize it into strategic objectives. It filters down and becomes operationalized by the line of business.” However, CEOs and CIOs need to connect what IT is doing better to their business strategy. This is exciting because it is a new window of opportunity for the CIO to get IT’s priorities right and thereby, secure a better relationship with their CEO. This matters because the CIOs that I am talking to see a strong CEO relationship as being critical to having IT viewed as a strategic business unit.


Bruce McConnell Interviewed by The Open Group

There’s also a reflection of the lack of trust between the major cyber powers these days. How do you build trust? You build trust by working together on easy projects first, and then working your way up to more difficult topics. EWI has been promoting conversations between governments about how to respond if there’s a server in one country that’s been captured by a bot and is attacking machines in another country. You have to say, ‘Could you take a look at that?’ But what are the procedures for reducing the impact of an incident in one country caused by malware coming from a server in of another country? This assumes, of course, that the country itself is not doing it deliberately. In a lot of these attacks people are spoofing servers so it looks like they’re coming from one place but it’s actually originating someplace else.


Secure or not, IoT is everywhere. Get used to it.

One of the ways we can avoid IoT security paranoia -- in addition to standardizing on better authentication mechanisms is to move to the IPv6 stack for all IoT devices and to have IPSec be a requirement for device to device and device to cloud communication. And to use much stronger and longer encryption keys. This is really a necessity because we've effectively run out of IPv4 address space and device proliferation is going to make IPv6 a virtual requirement. But that means broadband and wireless service providers as well as consumer and carrier network equipment manufacturers and the IoT vendors need to get on board with this quickly. And yes, longer/stronger encryption keys for Wi-Fi networks as well as standardizing devices on the current WPA2+AES+CCMP implementation and using end-to end,


Clearing Pathways for Entrepreneurial Innovation - Introduction

Disruptive, transformative innovation is by definition unchartered. Entrepreneurs who propagate revolutionary ideas have the power to reshape markets. This can unseat incumbents and have a short-term, negative impact on jobs. It is no surprise that policy-makers and regulators in many cases have an uneasy relationship with this kind of innovation. ... This report is part of a larger effort by the World Economic Forum to understand entrepreneurship and how policy-makers can best support it. The report focuses on disruptive entrepreneurs, due to their outsized impact on industry transformation and the current scarcity of an effective policy discourse regarding disruptive innovation.


Biometric security: Authentication for a more secure IoT

Consumers are becoming more familiar with, and comfortable with, on-device biometrics. The latest Apple and Samsung mobile phones, as well as many new desktop and laptop computers, contain embedded biometric sensors. These devices also include a Trusted Platform Module, or Trusted Execution Environment, that handles the validation of biometric information separately from the device’s core operating system. This is an important distinction, as those core operating systems are susceptible to malware. When it comes to verifying identity, the IoT has another important distinction. When authenticating to a smart lock, or even a smart car it is important that authentication take place on the smart device rather than on the user’s end.


Seven sins – 4: The Meaning Mistake

Once again, though, don’t laugh at other people’s mistakes, because the enterprise-architecture field is barely any better. If you ask for a standard definition of obviously-important terms such as process or service or capability – let alone enterprise or architecture – you’ll discover very quickly why the collective-noun for people in our trade is ‘an argument of architects’. It’s possible, with some care, to build definition-sets that are consistent within themselves for some aspects of architecture: but there’s still no consistency across the overall space at all – and, by the nature of what we’re dealing with, probably never will be, either.


5 things only disruptors know about the future

There is no “common thread because disruption can come from different directions”, believes Bill Gurley, investor in Uber, Zillow and OpenTable. “Industries get disrupted for different reasons. Technology can disrupt an industry” but so can other things, as explained by Clay Christensen’s Innovator’s Dilemma. To identify opportunities for disruption Gurley proposes to ask, “Where does technology have the opportunity to materially change the user proposition or the user experience? There is so much venture capital available today that you’ll see “Uber for this, Uber for that” but I’m not a believer that every industry needs disruption. ...”



Quote for the day:

"The quality of the company?s board has now become an important evaluation factor for institutional investors." -- Russel Reynolds 

July 01, 2015

Trusted Technology, Procurement Paradigms, and Cyber Insurance
From the customer's perspective, they need to be considering how they actually apply techniques to ensure that they are sourcing from authorized channels, that they are also applying the same techniques that we use for secure engineering when they are doing the integration of their IT infrastructure.  But from a development perspective, it’s ensuring that we're applying secure engineering techniques, that we have a well-defined baseline for our life cycle, and that we're controlling our assets effectively. We understand who our partners are and we're able to score them and ensure that we're tracking their integrity and that we're applying new techniques around secure engineering, like threat analysis and risk analysis to the supply chain.


10 things CIOs need to know about agile development
The full benefits of agile cannot be achieved without engaging with business leaders, management and the user community. If the rest of the business does not have an immediate appetite for working in a new way, careful planning and communication will be needed to bring different communities of managers and users on board. ... The basic organisational unit of delivery in agile development is a small team, typically expressed as "seven, plus or minus two" people — both developers and quality assurance. ... If people are moved too frequently, the teams fail to develop into highly productive units; if people are not moved between teams enough, then each team starts to become isolated and diverges from the other teams. It is important to note that physical location of teams is much more important with agile methods than with conventional approaches to development.


When the Toaster Shares Your Data With the Refrigerator, the Bathroom Scale ...
Everything will be connected, including cars, street lighting, jet engines, medical scanners, and household appliances. Rather than throwing appliances away when a new model comes out, we will just download new features. That is how the Tesla electric cars already work — they get software updates every few weeks that provide new features. Tesla’s latest software upgrades are enabling the cars to begin to drive themselves. But the existence of all these sensors will create many new challenges. Businesses have not yet figured out how to use the data they already have. According to McKinsey, for example, oil rigs have as many as 30,000 sensors, but their owners examine only one percent of the data they collect.


It’s not just the weather: Southern Europe’s startup ecosystem is heating up
Getting down to the nitty-gritty of growth metrics, each startup has shown tangible returns on investment. Bluemove has between 15 and 20 thousand active users compared to 9 thousand about a year ago. According to González-Iglesias, “Each month we are triplicating what we did last year. We expect to close our year on a stand-alone basis between 1.5 and 2 million euros in revenues. Last year we closed a bit under 1 million in revenues.” ...  COO Christian Picard expects the revenue “coefficient will be tripled or multiplied by four” as they expand beyond Barcelona and Madrid into bigger cities with more business travellers like London, Paris and Berlin.


Not So Fast: Questioning Deep Learning IQ Results
If the work truly shows that computers can now pass the written IQ exam with stronger scores than humans, it is definitely interesting. ... This system is hand-engineered to identify the specific patterns in formulaic standardized tests. It's hard-wired to know the types of questions that exist. This system may be a powerful demonstration of word2vec style distributed representations for words, but it is hardly a display of true human intelligence. If the format of the question were changed significantly, or were not formulaic, it would seem that this system couldn't cope. As with many standardized tests, the verbal reasoning section tests the breadth of a participant's vocabulary more than anything else, and it would hardly come as a surprise that the computer can maintain a larger vocabulary than a human.


Big data in financial services begets chief data officer
If you look at the innovation side of things, it is very confusing. If you look at all the Hadoop distributions, all the ETL tools, all the SQL tools and all the data visualization tools, it is very confusing. In the traditional relational space, it was simpler. It's confusing and some people are scared away with all these choices. What I see on the ground is that the financial industries, for several different reasons, is behind in the adoption of the new big data revolution. The first reason for that is most of the companies have yet to find a killer app -- one that would move the dial. Other reasons are that there are lots of regulatory changes and lots of pressure on cost savings. The focus is not on the innovation.


8 High Performance Apps You Never Knew Were Hybrid
Some of the topmost brands have recently ditched native and gone the hybrid way. With the new hybrid frameworks like Ionic, Phonegap etc becoming more mature, one cannot assume that hybrid apps perform worse anymore. In fact, a recent Gartner report says that by next year more developers will be going the hybrid way and by another account, the average end user ratings of hybrid apps are already 12 percent better than native apps. So where are all the hybrid apps? You use them a lot, probably without even realizing that you’re actually on “the web”. Well, that’s the beauty of it! Here are 8 very popular hybrid apps that you could never have imagined to be, hybrid:


Rebooting the Automobile
Cars are far more computerized than they might seem. Automakers began using integrated circuits to monitor and control basic engine functions in the late 1970s; computerization accelerated in the 1980s as regulations on fuel efficiency and emissions were put in place, requiring even better engine control. In 1982, for instance, computers began taking full control of the automatic transmission in some models. New cars now have between 50 and 100 computers and run millions of lines of code. An internal network connects these computers, allowing a mechanic or dealer to assess a car’s health through a diagnostic port just below the steering wheel. Some carmakers diagnose problems with vehicles remotely, through a wireless link, and it’s possible to plug a gadget into your car’s diagnostic port to identify engine problems or track driving habits via a smartphone app.


The end of IT consumerization
Now cloud vendors are driving IT evolution. When Google realized that inefficient power supplies were costing it millions, its suppliers quickly fixed that problem. The rest of us, who never cared, and enterprises - who lacked Google's clout - benefited.Other web-scale technology is moving into the enterprise. The commodity scale-out compute and storage architectures that Google and Amazon pioneered are now being offered by companies such as Nutanix and Scality, and in open source software like OpenStack. Now networking giant Cisco is under attack because their costly, complex switches have thousands of features that cloud vendors don't need. So they're building their own, at much lower cost, and enterprise IT pros are noticing.


Enterprise network disaggregation is inevitable
“Disaggregation will make incremental, steady progress within the broader Fortune 500, though that progress will by no means be immediate,” states IDC analyst Brad Casemore in an as-yet-unreleased report on network disaggregation. “Just as with software-defined networking, not everybody is ready to embrace change and be an early adopter.” The IDC report, though, also states that disaggregation is an inevitability in the enterprise -- more specifically, large enterprises -- because it offers a means of standardizing network resources while allowing for continuous software innovation “beyond the confines of vendor-specific product release schedules.” This is in addition to the capital and operational cost reduction often viewed as the primary driver of the trend.



Quote for the day:

“God uses imperfect people for impossible tasks” -- John Paul Warren