Showing posts with label digital currency. Show all posts
Showing posts with label digital currency. Show all posts

Daily Tech Digest - October 14, 2023

What is tokenization?

Tokenization is the process of issuing a digital representation of an asset on a (typically private) blockchain. These assets can include physical assets like real estate or art, financial assets like equities or bonds, nontangible assets like intellectual property, or even identity and data. Tokenization can create several types of tokens. Stablecoins, a type of cryptocurrency pegged to real-world money designed to be fungible, or replicable, are one example. Another type of token is an NFT—a nonfungible token, or a token that can’t be replicated—which is a digital proof of ownership people can buy and sell. Tokenization is potentially a big deal. Industry experts have forecast up to $5 trillion in tokenized digital-securities trade volume by 2030. There’s been hype around digital-asset tokenization for years, since its introduction back in 2017. But despite the big predictions, it hasn’t yet caught on in a meaningful way. We are seeing slow movement: US-based fintech infrastructure firm Broadridge now facilitates more than $1 trillion monthly on its distributed ledger platform.


MVP or TVP? Why Your Internal Developer Platform Needs Both

“TVP is about ‘thinness’ to try and avoid a massive platform. TVP is something that remains throughout an organizational evolution — it should always be the thinnest viable — whereas MVP is normally the first stage of something larger.” This shift toward investment in long-term thinness is extremely important. Gregor Hohpe calls this a “sinking platform” in his 2022 PlatformCon talk “The Magic of Platforms.” ... You can leave your platform the same because you invested all this kind of money, and we call this a sinking platform as the water level rises, right; it might be justified from investment, but you are kind of duplicating things that are now available in the base platform.” Hohpe goes on to describe how platform teams need to intentionally decide on their philosophy when it comes to supporting their platform: “Or you build a ‘floating platform’ where, when the base platform gains the capabilities you have built, you say ‘Oh, perfect! I don’t need my part anymore. I can let the base platform handle that, and I can innovate further on top. I build new things.'”


7 Blockchain Technology Mistakes You Should Watch Out For

The application of Blockchain for secure information exchange and storing records leads to many wrong beliefs. CIOs get confused between Data Base Management Systems (DBMS) and blockchain. The existing blockchain platforms cannot provide support for complex data models and do not provide assurance of high throughput or low latency. They were built to provide an immutable, authoritative, and trusted record of events among a dynamic assortment of unrelated stakeholders. ... Smart Contract is a code that automatically executes legally relevant events and actions that are part of the agreement. The main utility of Smart Contracts is to reduce the need for trusted intermediaries, prevent fraud and reduce arbitration costs. They are commonly associated with cryptocurrencies like Bitcoin and are fundamental building blocks of Decentralized Finance (DeFi) applications. Although, at present Smart Contracts are not necessarily an agreement that has been approved by law, with some countries being an exception.


Practicing Good Green Governance Leads to Profits

Let’s begin by defining green governance. It refers to a set of principles and practices aimed at promoting environmental sustainability and responsible management of natural resources within a clear governance and decision-making framework. A green-minded corporation should integrate environmental considerations into policies, regulations, and actions throughout all divisions of its business. Green governance aims to balance economic and environmental practices to create a profitable and sustainable future. ... Practicing green governance requires a holistic approach that considers the interconnectedness of environmental, operational, and economic systems to balance human needs and the health of the planet with the company’s bottom line and valuation. That balance is what helps ensure a sustainable and prosperous future for all stakeholders. ... Many companies want to showcase their greenness in a credible and trustworthy way but find the current system of backward-looking, voluntary standards and the myriad of ESG metrics to be daunting, arduous, and costly.


The Future is Now: IoT and the Evolution of Business Computing

The proliferation of IoT devices and sensors is generating massive amounts of data that provides invaluable insights for business decision-making. However, organizations need talent to properly analyze and derive meaning from these huge IoT datasets. A business management and accounting online degree is valuable in helping to develop the analytics skills needed to fully capitalize on IoT capabilities. These programs prepare the next generation of data-driven business leaders who will drive transformative change through IoT adoption. With access to real-time data from across the enterprise, managers can gain unprecedented visibility into operations. Marketers can analyze IoT data to understand customer behavior patterns and rapidly adjust campaigns. Supply chain personnel can identify and resolve bottlenecks as they occur. Executives can track core business metrics in real time to guide strategic decisions. The sheer volume of IoT data brings a paradigm shift in business computing where decisions are proactive, not reactive.


Psychological safety at the workplace

People show up at work with different states of mental well-being. So, empathy is absolutely non-negotiable. A meaningful way to be empathetic is to be mindful of our language and its impact on the other person. For instance, instead of the confrontational approach where one might say, “Your code is quite bad and not what I expected” say, “I know that you are capable of writing great code. Let’s figure out what happened this time.” This manner of checking in with each other on their state of mind and creating a space for team members to discuss their mental health without fear of judgment is a move in the right direction. ... Welcome different perspectives, and when people offer them, disagree with respect. People tend to cushion their ideas when they fear judgment. For instance, they might say, “this is probably a silly idea,” or “this may be a dumb question.” Reassure them that all ideas are welcome. Watch out for groupthink — the tendency of the minority to stay silent in order not to upset the majority. Invite opinions from everyone. 


The future of augmented reality is AI

Whenever we in the tech media or tech industry think or talk about AR, we tend to focus on what kind of holographic imagery we might see superimposed on the real world through our AR glasses. We imagine hands-free Pokémon Go, or radically better versions of Google Glass. But since the generative AI/LLM-based chatbot revolution struck late last year, it has become increasingly clear that of all the pieces that make up an AR experience, holographic digital virtual objects is the least important. The glasses are necessary. Android phones and iPhones have had “augmented reality” capabilities for years, and nobody cares because looking at your phone doesn’t compare to just seeing the world hands-free through glasses. The cameras and other sensors are necessary. It’s impossible to augment reality if your device has no way to perceive reality. The AI is necessary. We need AI to interpret and make sense of arbitrary people, objects, and activity in our fields of view.


How to maintain a harmonious workplace atmosphere in multigenerational firms

Ensuring the well-being of a multigenerational workforce is crucial for any organisation. HR can play a key role in this by implementing policies and programs that cater to the unique needs and preferences of different generations. For instance, offering flexible work arrangements, mentoring programs, and personalised professional development opportunities can help employees of all ages feel valued and supported. Additionally, providing access to resources and benefits that address specific health and wellness concerns can help ensure that employees stay healthy and productive throughout their careers. “By prioritising the well-being of all employees, regardless of age or background, organisations can create a more inclusive and supportive workplace environment that promotes work-life balance. Creating a diverse, equitable, and inclusive workplace is essential for fostering a positive and productive work environment. 


Oh No, the Software Consultants Are Coming!

Sadly, consultants are still used to back up a decision that has already been made by management. So a sudden presence of consultants is often viewed as positively as the arrival of sharks around a stalled boat. But in most cases, consultants are just hired to see why an area is not performing in some way. It is perfectly common for them to tell management that they are the problem. That might shorten the engagement, but you can do that sort of thing when you are not an employee. More realistically, consultants might need to explain to staff why systematic changes will improve the company’s prospects, which still leaves the unspoken threat about what happens if things don’t change. And yet, many developers do fall into ruts and moving on may truly be the best thing to do. And of course, escaping a death march project is not always the worst thing that can happen. By the way, if you are staff, always ask consultants for career advice. Not only is it free, but it won’t be biased by your background or colored by employer motives.


CBDC and stablecoins: Early coexistence on an uncertain road

It is too early to confidently forecast the trajectory and endgame for CBDCs and stablecoins, given the multitude of unresolved design factors still in play. For instance, will central banks focus first on retail or wholesale use cases, and emphasize domestic or cross-border applications? And how rapidly will national agencies pursue regulation of stablecoins prior to issuing their own CBDCs? To begin to understand some of the potential scenarios, we need to appreciate the variety and applications of CBDCs and stablecoins. There is no single CBDC issuance model, but rather a continuum of approaches being piloted in various countries. ... At the opposite end of the spectrum, China’s CBDC pilot relies on private-sector banks to distribute and maintain eCNY (digital yuan) accounts for their customers. The ECB approach under consideration involves licensed financial institutions each operating a permissioned node of the blockchain network as a conduit for distribution of a digital euro.



Quote for the day:

"Anything is possible when you have the right people there to support you." -- Misty Copeland

Daily Tech Digest - March 22, 2020

How Is AI Helping To Commercialize Space?

AI Helping to commercialize space
The power of deep learning and AI-enabled recognition provides significant power in analyzing images and providing ability to review the millions of images produced by spacecraft. Artificial intelligence on the other end can analyze the images as they are being taken and determine if there are any issues with the images. Unlike humans, AI does not need to sleep or take breaks so it can rapidly process a lot of data. Using AI to capture images of Earth also prevents the need for large amounts of communication to and from Earth to analyze photos and determine whether a new photo needs to be taken. By cutting back on communication, the AI is saving processing power, reducing battery usage, and speeding up the image gathering process. Satellites are also being used to analyze natural disasters from space. Detailed imagery from a satellite can help those on the ground to see victims, determine the course of the disaster, and more. Artificial intelligence is being used to help speed up the response of satellites to natural disasters. With the help of the onboard AI, satellites are able to determine where a natural disaster is located and navigate to that location.


COVID-19: How to Adjust Business Continuity Plans

The COVID-19 pandemic present new challenges to healthcare IT and security teams, including the need to reassess and adjust business continuity plans, says Christopher Frenz, who leads information security at New York's Interfaith Medical Center. He's chair of an industry committee that has developed new guidance for dealing with those challenges. ... "Business continuity is something organizations should constantly test, particularly in healthcare," he says in an interview with Information Security Media Group. "Testing your backup and disaster recovery plans is something we should always be doing. But at a time like this where we're seeing an upswing in malware attacks against hospitals related to coronavirus, and you're going to have influxes of patients ... that puts additional stresses on systems. So it's definitely a good idea to test and verify that all this stuff works ahead of time," he says.


Once hailed as unhackable, blockchains are now getting hacked


Susceptibility to 51% attacks is inherent to most cryptocurrencies. That’s because most are based on blockchains that use proof of work as their protocol for verifying transactions. In this process, also known as mining, nodes spend vast amounts of computing power to prove themselves trustworthy enough to add information about new transactions to the database. A miner who somehow gains control of a majority of the network's mining power can defraud other users by sending them payments and then creating an alternative version of the blockchain in which the payments never happened. This new version is called a fork. The attacker, who controls most of the mining power, can make the fork the authoritative version of the chain and proceed to spend the same cryptocurrency again. For popular blockchains, attempting this sort of heist is likely to be extremely expensive. According to the website Crypto51, renting enough mining power to attack Bitcoin would currently cost more than $260,000 per hour. But it gets much cheaper quickly as you move down the list of the more than 1,500 cryptocurrencies out there.



Cyber crooks continue to exploit COVID-19 for their malicious schemes

“BEC attacks are often delivered in stages. The first email sent is typically innocuous, meaning that they do not contain the attacker’s end goal. The attackers craft plausible scenarios in hopes the recipient will reply. Once they’re on the hook, the attacker will send their true ask. (I need you to buy gift cards, wire transfer funds, etc.),” the researchers explained. “These coronavirus-themed BEC attacks often come with spoofed display names, which are likely real people known to the recipient. In the body of this message, the actor attempts to eliminate the possibility of voice-verification, in hopes of ensuring a higher success rate, by saying their phone is ‘faulty at the moment.'” They’ve also spotted an assortment of fake notices impersonating doctors and local health agencies and institutions (aimed at the general population), as well as more targeted emails aimed at enterprises (employees), such as fake internal emails for credential phishing attacks impersonating the organization’s president, IT staff, risk manager, and so on.


CIOs say personal disruption comes before digital disruption

cio to ceo man with briefcase on skateboard career growth speed blur career path
CIOs suggest personal disruption should be part and parcel to the overall disruptions that their organizations are making. At the same time, they say transformation needs to happen at many levels these days including the personal level. With this said, if an organization has been comfortable with the status quo for too time, CIOs say they need to start by driving the organizational change needed to be receptive to change and to perceive changes the organization needs. A key part of this, CIOs say is that IT leaders should resolve to be open to new ideas and ways of thinking this year and in the coming decade. Part of this involves getting out of the natural comfort zone and being open to thinking differently about how to impact the organization. CIOs suggest in 2020 IT leaders need to have increased awareness of the social and cultural impacts occurring from technology. CIOs say, for this reason, it makes sense to encourage the entire team to self-disrupt itself. To fix businesses, CIOs should get the business out of its comfort zone too.


4 Reasons Central Banks Should Launch Retail Digital Currencies

While domestic retail payments in many OECD countries are now free, cross border payments remain a minefield of pain, cost and delays for consumers. If I send money to my mum in India, she has no digital identity in the UK and I have no digital identity in India. So my bank in the UK verifies that I sent the money, my mum’s bank verifies that she’s the person the money is for and both the banks verify (or at least hope) that neither I nor my mum is a nefarious character. Then the banks wait until they have compared their respective spreadsheets and make me wait for this reconciliation. Only after that, both the banks take a nice cut on the FX and send the rest to my mum. If the bank was in rural Ghana instead of Delhi, there’d probably be two more banks in this bank-chain, which’d quadruple the delay and the pain. This whole process of cross border payments is not only a pain for consumers, it also makes the global AML regime ineffective and unenforceable. Instead, if the Bank of England and the Reserve Bank of India both were to rely on a shared set of data standards for their respective digital currencies and for the corresponding digital identity infrastructure


Exploring the risky behavior of IT security professionals

risky behavior security professionals
Almost 65% of the nearly 300 international cybersecurity professionals canvased by Gurucul at RSA Conference 2020 said they access documents that have nothing to do with their jobs. Meanwhile, nearly 40% of respondents who experienced bad performance reviews also admitted to abusing their privileged access, which is double the overall rate (19%). “We knew insider privilege abuse was rampant in most enterprises, but these survey results demonstrate that the infosecurity department is not immune to this practice,” said Saryu Nayyar, CEO of Gurucul. “Detecting impermissible access to resources by authorized users, whether it is malicious or not, is virtually impossible with traditional monitoring tools. That’s why many organizations are turning to security and risk analytics that look at both employee and entity behaviors to identify anomalies indicative of insider threats.” ... This showcases the problems organizations have with employees behaving outside of the bounds of practical and published security policies.


Covid-19: NHS tackles coronavirus crisis with the help of tech

NHS Digital’s website states: “Patients should be enabled to get advice and care without attending the practice unless in-person care is clinically required.” But although phone appointments are great, they won’t cover everything. This is where video appointments are invaluable – not just for patients who may be displaying coronavirus symptoms, but for anyone who needs to be seen by a GP. Some GPs already have online systems and video consultations in place, but many of those who have the service available have not yet begun to use it. EMIS is one of the biggest GP IT system providers in England, with nearly 4,000 GP practices using its EMIS Web service. In 2017, it launched its Video Consult service, but uptake has been limited. This echoes throughout GP practices in the UK – suppliers often offer the service, but few GP practices use it. EMIS, which normally charges GPs for the use of video consultations, has now decided to offer it free for the next few months.


To succeed in DevOps these days, go hybrid

building-observation-deck-world-trade-center-one-photo-by-joe-mckendrick.jpg
DevOps is not just a technical undertaking, it's a business proposition. This calls for hybrid skills that enable a more holistic view of the entire software development and deployment process. With a majority of enterprises (52%) intending to ramp up their recruiting of DevOps skills. close to two-thirds, 65%, reported having difficulties with finding these combinations of skills. DevOps is not just a technical undertaking, it's a business proposition. This calls for hybrid skills that enable a more holistic view of the entire software development and deployment process. With a majority of enterprises (52%) intending to ramp up their recruiting of DevOps skills. close to two-thirds, 65%, reported having difficulties with finding these combinations of skills. The DevOps journey is still very difficult for more than 50% of respondents. "DevOps is a fundamental change in the traditional structure of IT. It not only represents the adoption of new technology, but also an organizational transformation challenge with all that it implies with the 'evangelization of the existing responsibility silos.


The Anatomy of a Microservice, One Service, Multiple Servers

In addition to supporting multiple transport mechanisms that can improve performance and efficiency, when providing more than one API Server, there’s an architectural benefit. That is helping to enforce separation of concerns. While the high-level architecture diagram presented in Microservice Definition and Architecture depicts a clear separation of concerns, like any other development effort, implementing this pattern does require diligence. In a previous article in this series, I stated that I believe developers have the best intentions in mind. Of course, there are exceptions, but individuals do want to do a good job. The problem comes in when deadlines loom. Things start to get thrown off the back of the truck. Shortcuts are taken. Non-functional requirements such as metrics gathering and reporting are missed. The more an architecture helps guide a team, the less likely these things will happen. Specifically, in the case of having two API Servers, business logic remains where it’s supposed to remain: in the business service.



Quote for the day:


"Leadership is the other side of the coin of loneliness, and he who is a leader must always act alone. And acting alone, accept everything alone." -- Ferdinand Marcos


Daily Tech Digest - April 01, 2018

Roubini States That Blockchain Is Pure Hype

Roubini States That Blockchain Is Pure Hype
To begin with, blockchain technology is less efficient than existing databases. When someone says that their project is working on blockchain, in reality, as a rule, the operation of a program reproduced on a variety of other devices is implied. In this case, the storage space requirements and processing power are much higher, and the transaction speed is much lower than when using a centralized program. Blockchain with the technologies of proof-of-stake or zero-knowledge require that all transactions be verified cryptographically, and this slows down their work. A blockchain with the technologies of proof-of-work, used in many popular cryptocurrencies, raises another problem as they require huge amounts of energy to ensure their work. That is why operations for the mining of Bitcoins in Iceland this year already can begin to consume more electricity than all Icelandic households put together. Blockchain can make sense only in cases where the exchange of speed for the quality of verification is really needed, but this technology is rarely promoted in this capacity.



Blockchain will make AI smarter by feeding it better data


The current challenge to smaller businesses isn’t the cost of AI systems — they’re increasingly more affordable and accessible. The barrier is gaining access to enough high quality data about customers to adequately power those systems. Few retailers can recognize their customers across multiple channels and devices, and they often rely on third-party, behavioral data that doesn’t give them a complete understanding of what products customers want to buy. Moreover, most retailers handle only a small slice of each of their customer’s purchases, hardly enough to make these AI systems work well. That’s why blockchain technology is so transformative. Its key innovation is to create a database that is open and decentralized, yet with strict controls over privacy. Shoppers could authorize all the stores they patronize to contribute data about their purchases to a blockchain ledger that protects the privacy of both consumers and retailers.



Dividing frontend from backend is an antipattern

Contemporary frontend work has evolved in complexity to the extent that we should no longer separate frontend from backend roles. Frontend engineers now solve the same kinds of problems as their backend counterparts, using the same kinds of solutions, and it is harmful to continue arbitrarily dividing us. To be clear, I’m not saying that we all need to be experts in everything. That would be impossible. Today’s technology stack goes down a long way, so being a genuinely balanced full-stack dev is probably not the most realistic of goals — but staying open-minded is. While it is perfectly valid to dislike a particular technology, such as CSS, the industry's culture of contempt for frontend work feeds into the outdated divide between frontend and backend, and detracts from building fast-moving, competitive teams and companies. Think of yourself as a developer first. Investigate frontend technologies, pair with UI specialists, evangelize your colleagues.


Man vs machine: How each responds to deception defenses

Russian hackers are targeting a number of political organizations.
If you use the same password for multiple systems, this analysis shows you should avoid this practice. Migrate to unique long pass phrases with less rotation and always consider multi-factor authentication when available. In general, human attackers are attracted to files that may contain configuration instructions for an application with a username and password for a specific individual or a shared account. Another popular file example is technical documents such as those providing information on how to use a corporate VPN service. Personal files with confidential information, IT/Corporate files, logs, databases, and reviewing recent files for Windows or Office are popular with human attackers and make good breadcrumbs and traps. Poisoned data within files including fake, planted credentials provides a valuable lure to detect attackers as they reuse them. On the other hand, malware due to its machine automation prefers structured data found in applications. Examples include session apps, web browsers, and uninstall information for applications.


Big Blue Is Finally Getting Serious About Cryptocurrency

Lund breaks down the demand IBM is seeing into three main kinds of tokens: securities tokens that give owners a stake in the issuing company, utility tokens that give users access to a service such as phone minutes and commodities tokens that represent precious metals and other physical assets. "We're actually seeing a move toward the issuance of tokens that have a higher velocity that represent, for example, a claim on a portion of gold bullion sitting in a vault somewhere," he said. Beyond the obvious potential interest in this work from commodities exchanges, Lund said IBM is being approached by retail companies, beverage providers and energy companies looking to tokenize various aspects of their business offerings. A fourth category of companies Lund said is approaching IBM are startups looking to raise capital, though he admits these opportunities have proved less enticing.


Artificial Intelligence: Optimising Your Recruitment & Avoiding Bias

AI diversity recruitment bias
The machine learning technology at the heart of Textio means that the more it is used, the better its analysis becomes. Conclusions drawn from previous job adverts enable the algorithms to give posts a score based on the tone and gendered nature of language used. Textio can predict if a post is likely to attract female or male respondents, and even how long it will take for the position to be filled. It can offer guidance on how to improve writing, enabling businesses to attract better qualified and more diverse talent in less time. It seems to be a win-win for HR. Critics of this kind of system may point out the potentially homogenising effect it could have upon the written word. Will technology like Textio make all job adverts the same? Could it lead to a process of levelling down, where only the most vanilla of workers are able to gain employment? Hesitancy around this technology is understandable: writing is a fundamental part of human expression, and it’s not clear that we want machines to start meddling in it. In fact, job adverts provide a unique opportunity for businesses to convey their ethos to potential employees.


Microsoft inches closer to commercially-viable quantum computing

quantum.jpg
Microsoft is slowly making headway in the race toward commercially-viable quantum computing, tapping into the unique properties of a certain particle to address issues engineers at many tech companies have been struggling with for decades. Alphabet, IBM, and a number of smaller companies are all competing for "quantum supremacy," a disputed term referring to the point at which quantum computers will be able to handle calculations beyond the capacity of the world's best supercomputers. "[Quantum supremacy] is very catchy, but it's a bit confusing and oversells what quantum computers will be able to do," Simon Benjamin, a quantum expert at Oxford University, told MIT's Technology Review. He added that even as the abilities of quantum computers improve, classic computers will still be faster and cheaper. "Using a quantum computer would be like chartering a jumbo jet to cross the road," Benjamin said.


How Nvidia is helping autonomous cars simulate their way to safety

how nvidia is helping autonomous cars simulate their way to safety gtc path billions of miles
To further improve simulations, Nvidia, and some of its partners, are using data from the sensors of autonomous vehicles to build higher definition maps. When autonomous vehicles hit the road, these machines will not only rely on the data that is available through training, but also contribute to data collection by sharing the data that it has captured from its LIDAR, IR, radar, and camera arrays. When this newly captured data is combined through deep learning with existing low-quality data sets, it will make streets and roads look more photo-realistic. Cognata claims that its algorithms can process the data in a way to bring out details in shadows and highlights, much like an HDR photo from your smartphone’s camera, to create a high-quality scene. While simulation is an excellent tool, Atsmon noted it has its own flaws. It’s too simple, and for autonomous driving to be realistic, it must learn from edge cases. Cognata claims that it only takes a few clicks to program in an edge case to validate autonomous vehicles for more unusual driving scenarios.


Disruption vs. Innovation: Defining Success

Disruption vs. Innovation: Defining Success
Innovation or rapid evolutionary innovation, as I define it, is turning your dreams into reality, or manifesting what you envision. Disruptive companies are those whose innovations or innovative processes completely change the market they serve. They might use an innovation to accomplish their goals, but not all innovations are disruptive. In other words, not all innovations cause a business or market to rapidly evolve. I firmly believe that all businesses must evolve over time in order to stay competitive in the marketplace, and that has shown to be true when it comes to disruption. Companies need appreciable time for their services to evolve and react to the needs of the market. Disruption does not happen overnight; neither does success. There are many so-called "overnight successes" that have actually been around for decades before finally reaching the tipping point and having mass appeal or nationwide/worldwide recognition.


5 Things You Should Know About the Cloud, But Were Afraid to Ask

tower disappearing into the clouds
Depending on whom you believe, cloud computing goes back as far as the early 1960s, with J.C.R. Licklider and the introduction of the Advanced Research Projects Agency Network (a.k.a. ARPANET) or as recent as 2006, when former Google CEO Eric Schmidt purportedly coined the term “cloud computing” at an industry conference. Whichever origin story you buy into, the cloud has clearly taken off and with it, business, IT and marketing leaders are clamoring to assess where things are now and where they may be headed. What follows are five fundamental observations about the cloud today (in no particular order). I hope these thoughts from the front line are useful and maybe even a bit of a provocative look at the cloud. ... The good news is the agility that comes with being on the cloud pays off in the intermediate to long-run. What’s more, it’s becoming clear in the urgent communication we see from organizations not yet on the cloud that if you don’t do it, you’ll fall behind — which creates its own kind of costs.



Quote for the day:


"Change is the end result of all true learning." -- Leo Buscaglia


Daily Tech Digest - March 31, 2018

visa.jpg
Under the new proposal, individuals would be required to disclose social media usernames (though not passwords) when applying for a visa to enter the United States, which would affect nearly 15 million people per year, according to the AP report. The proposal would require applicants to disclose five years worth of social media usernames on platforms identified in the application form (Facebook, Twitter, etc.) while providing a separate field for applicants to volunteer the usernames of platforms not specifically identified in the form. Previous implementations of this rule applied only to people individually identified for additional background checks, which the AP report indicates is about 65,000 people annually. The idea of collecting social media information of visa applicants started during the Obama administration following the 2015 San Bernardino attack. 


Everything You Were Afraid to Ask About Crypto Taxes

Many cryptocurrency investors have made a fortune the past several years selling high-flying bitcoin and other cryptocurrencies for cash. Unfortunately, far too many of them in the U.S. did not report this taxable income to the IRS. The agency figures hundreds of thousands of U.S. residents did not report income from sales or exchanges of cryptocurrency and it might be able to collect several billion dollars in back taxes, penalties, and interest. ... The character of the gain or loss generally depends on whether the virtual currency is a capital asset in the hands of the taxpayer. If it is, a taxpayer generally realizes a capital gain or loss on the sale. If not, the taxpayer realizes an ordinary gain or loss. The distinction is more than academic. ... When a taxpayer successfully mines virtual currency, the fair market value of the virtual currency generated as of the date of receipt is includable in gross income.


Don’t get surprised by the cloud’s data-egress fees

Don’t get surprised by the cloud’s data-egress fees
Keep this in mind: Most companies that use public clouds pay these fees for day-to-day transactions, such as moving data from cloud-based storage to on-premises storage. Those just starting out with cloud won’t feel the sting of these fees, but advanced users could end up pushing and pulling terabytes of data from their cloud provider and end up with a significant egress bill.  It’s not major money that will break the budget, but egress fees are often overlooked when doing business planning and when considering the ROI of cloud hosting. Indeed, for at least the next few years, IT organizations will be making their cloud-based applications and data work and play well with on-premises data. That means a lot of data will move back and forth, and that means higher egress fees. My best advice is to put automated cost usage and cost governance tools in place to make sure you understand what’s being charged, and for what services.


Agile’s dark secret? IT has little need for the usual methodologies

Buy-when-you-can/build-when-you-have-to is profoundly different. When IT implements multiple COTS/SaaS packages, existing databases make the job harder, not easier. Each package comes with its own database, and when the software vendors design their databases they don’t take the ones you already have into account because they can’t. They also don’t take the ones other vendors have already designed into account because why would they? So when IT implements a COTS package it has to track down all the existing databases that store the same data the new application manages too — not to take advantage of it, but to figure out how to keep the overlapping data synchronized. When it comes to managing data, internal development and package implementations are completely different.


Cyber threat to energy infrastructure, Kapersky Lab research finds

Cyber threat to energy infrastructure, Kapersky Lab research finds
Cyber security incidents and targeted attacks over the past couple of years, along with regulatory initiatives make a strong case for the power and energy companies to start adopting cyber security products and measures for their operational technology (OT) systems. Moreover, the modern power grid is one of the most extensive systems of interconnected industrial objects, with a large number of computers connected to the network and a relatively high degree of exposure to cyber threats, as demonstrated by Kaspersky Lab ICS CERT statistics. In turn, the high percentage of attacked ICS computers in engineering and ICS Integration businesses is another serious problem given the fact that the supply chain attack vector has been used in some devastating attacks in recent years.


ICS cybersecurity: The missing ingredient in the IoT growth equation

There’s a lot to be gained by adopting connected IoT or IIoT technologies within OT networks and industrial control systems (ICS) environments. By using common internet protocols combined with the cost-savings of using connected terminals, industrial operations can utilize real-time analytics and multisite connectivity to improve efficiencies across numerous industrial verticals. So, why have ICS practitioners and stakeholders not adopted these new technologies? One word: security. As OT networks begin to integrate more intelligence, such as intelligent human-machine interface and cloud SCADA, ICS practitioners are now unable to reconcile the new security risks that have been created as a result. Since OT networks control critical infrastructure and processes, network failure inherently comes at a greater consequence than in typical IT networks. The potential for substantial financial loss, environmental damage and even loss of human life resulting from a security breach is a real possibility in the industrial realm.


Why Blockchain adoption has stalled in financial services and banking

blcokchaimn.jpg
To be sure, there's no shortage of hype and hope about what blockchain could do for banks and other financial services firms. As The Financial Times detailed, banks could use blockchain technology for everything from the recording and updating of customer identities to the clearing and settlement of lands and securities. ... The reality of blockchain, however, is that they aren't. While there are patches of blockchain activity—Northern Trust using a distributed ledger to manage private equity deals in Guernsey, and ING attempting to build a blockchain for agricultural commodities—Penny Crosman, reporting for American Banker, has declared that adoption has "stalled" for a variety of reasons. The first, ironically, is that most banks still don't have a clear business case for using it. Beyond confusion as to why the banks should be using blockchain at all, there are also concerns about security, legal issues, and the immaturity of the technology itself.


Data theft is the foremost threat for an insurance company

For an insurance company the data theft is the major threat. “For example, whenever a policy comes for renewal, the policy holders start receiving the calls from multiple companies, mostly your competitors. Here, despite ensuring all the security measures, the human factor remains the weakest link,” Dhanodkar explains. Its imperative to enrich people including employees, customers & third-party vendors with the adequate awareness on latest threats associated with the digitized economy. Mere Bbasic security awareness will not be effective unless the knowledge is upgraded. Aadhaar Act has also got lot of implementations for security framework and we are planning to have series of workshops on Aadhaar Act compliance requirements s for executives” he said. The CISO’s role demands sound understanding of “Technology and business. Being a CISO I cannot keep blocking everything but must act as an enabler, he added.


Should software developers have a code of ethics?

Should software developers have a code of ethics?
Teaching people to ask the right questions involves understanding what the questions are, says Burton, and that everyone’s values are different; some individuals have no problem working on software that runs nuclear reactors, or developing targeting systems for drones, or smart bombs, or military craft. “The truth is, we’ve been here before, and we’re already making strides toward mitigating risks and unintended consequences. We know we have to be really careful about how we’re using some of these technologies. It’s not even a question of can we build it anymore, because we know the technology and capability is out there to build whatever we can think of. The questions should be around should it be built, what are the fail safes, and what can we do to make sure we’re having the least harmful impact we can?” he says. Burton believes, despite the naysayers, that AI, machine learning and automation can actually help solve these ethical problems by freeing up humans to contemplate more fully the impacts of the technology they’re building.


How utility industries can leverage location data, AI and IoT

Organizations are looking at how AI and IoT can reduce cost, drive efficiencies, and enhance competitive advantage and support emerging business models. It is also clearly observed that some technical innovations from the mainstream of the IT world, or from other industries, are creating opportunities to leverage technology that did not exist previously in the industry. The industry has, in the past, pursued a siloed approach to applications and technologies. This is characterized by the separation of the engineering and operations groups from IT, and the use of stand-alone, best-of-breed applications within the overall scope of IT. As ubiquitous connectivity continues to permeate technology sectors, an increasing need to unite energy technologies, operational technologies (such as sensors and smart devices) and IT (such as big data, advanced analytics and asset performance management [APM]) with consumer technologies is observed in the industry.



Quote for the Day:


"If you're not failing once in a while, it probably means you're not stretching yourself." -- Lewis Pugh


Daily Tech Digest - March 25, 2018

The Top 10 IoT Trends


In what might be the most obvious prediction of the decade, the IoT will continue to expand next year, with more and more devices coming online every single day. What isn’t so obvious about this prediction: where that growth will occur. The retail, healthcare, and industrial/supply chain industries will likely see the greatest growth. Forrester Research has predicted the IoT will become “the backbone” of customer value as it continues to grow. It is no surprise that retail is jumping aboard, hoping to harness the power of the IoT to connect with customers, grow their brands, and improve the customer journey in deeply personal ways. But industries like healthcare and supply are not far behind. They’re using the technology to connect with patients via wearable devices, and track products from factory to floor. In many ways, the full potential of the IoT is still being realized; we’ll likely see more of that in 2018.



Securing the Operational Technology (OT) - The Challenges

The increasing connectivity of previously isolated manufacturing systems, together with a reliance on remote supporting services for operational maintenance, has introduced new vulnerabilities for cyber attack. Not only is the number of attacks growing, but so is their sophistication. As OT security becomes a widely discussed topic, the awareness of OT operators is rising, but so is the knowledge and understanding of OT-specific problems and vulnerabilities in the hacker community. It’s true that the systems and devices involved in OT are often based on the same technologies as that of IT and as such many of the threats they face are exactly the same. However, it is an open secret that OT security is not the same as IT security. While securing OT systems requires an integrated approach similar to IT, its objectives are inverted, with availability being the primary requirement, followed by integrity and confidentiality. There are certain other important differences as well that mean that the OT infrastucture can not be managed as an extension of the IT infrastructure


How Blockchain Is Replacing Branding As A Source Of Trust


It's not difficult to see why we're heading towards brandless trust. If you think about a supply chain that's obsessed with finding a more efficient way of doing things, you see why we have a system that's always adding more agencies in between the beginning and the end points. And why there's a decreasing visibility of what's really going on. Where Molly was a single agency brand, her modern counterparts would be adding agencies everywhere to make things work cheaper, better and faster. If you can turn one link of the chain into two sub-links and bring an economy in here or there, you've 'improved' the system. Sure, you've opened it up to a greater risk of fraud, but that will be someone else's problem, higher up the chain. What we're witnessing isn't an accident of occasional fraud, it's an unavoidable consequence of our desire for cheaper, better and faster.


MIT researchers find that graphene can function as a superconductor


Due to its high conductivity, graphene could be used in semiconductors to greatly increase the speed at which information travels. Recently the Department of Energy conducted tests which demonstrated that semiconductive polymers conduct electricity much faster when placed atop a layer of graphene than a layer of silicon. This holds true even if the polymer is thicker. A polymer 50-nanometers thick, when placed on top of a graphene layer, conducted a charge better than a 10 nm thick layer of the polymer. This flew in the face of previous wisdom which held that the thinner a polymer is, the better it can conduct charge. Yet another example of graphene’s remarkable properties. The biggest obstacle to graphene’s use in electronics is its lack of a band gap, the gap between valence and conduction bands in a material that, when crossed, allows for a flow of electrical current. The band gap is what allows semiconductive materials such as silicon to function as transistors; they can switch between insulating or conducting an electric current, depending on whether their electrons are pushed across the band gap or not.


The importance of integrating legacy enterprises

gear turn industry machine motion integration
CIOs feel as well that the inability to integrate can be a source of competitive disadvantage. How many strategic planners have this in their SWOTT analysis? CIOs are clear, however, that integration alone isn’t sufficient to drive a competitive advantage. They say it is people collaborating on market driven priorities backed by integrated practices that drives competitive advantage. Jack Gold concluded this discussion by saying “the organizations that win in the future are the ones that can make best use of ALL of their data and apps – legacy or otherwise.” It seems clear that legacy organizations that are built and integrated like the famed Winchester House will find themselves at a distinct disadvantage in an era of digital disruption. The speed and agility of integrating applications, data, and business capabilities matters today. Here, CIOs need to build internal competency versus perpetuating “duct tape” integrations. How well they do this can be a source of competitive advantage or competitive disadvantage.


What kind of AI future do we want?

"What will the role of humans be, if machines can do everything better and cheaper than us?" asked Max Tegmark, a professor of physics at the Massachusetts Institute of Technology and the author of Life 3.0: Being Human in the Age of Artificial Intelligence. He was speaking at the Beyond Impact summit on artificial intelligence Friday at The Globe and Mail in Toronto, presented in conjunction with the University of Waterloo. The assumption in such questions is that artificial intelligence is trying to progress to AGI, or artificial general intelligence, in which a machine will basically think a thought, or at least do an intellectual task on its own, as a human can. Some believe we may never reach true AGI, Dr. Tegmark noted. Machines may never have the consciousness of a living entity or show true creativity. Yet, "the future development of AI might go faster than typical human development, and there is a very controversial possibility of an intelligence explosion, where self-improving AI might rapidly leave human intelligence far behind," he said.


5 Blockchain Innovations Wall Street Is Watching in 2018

5 Blockchain Innovations Wall Street Is Watching in 2018
The biggest upside for using blockchain is system integrity. Cryptocurrencies and blockchain technology eliminate the need for middlemen. Hence, it's these middlemen that tend to overcomplicate payments and charge expensive fees on top of large transactions. As such, the very design of blockchain lends itself to security. Blockchain is a decentralized ledger. Therefore, transactions are not visible to any person besides the two parties engaging in the asset transfer. Also, crypto wallets are essentially immune to fraud due to their complexity and uniqueness. Hence, it's difficult to steal assets. The assets become invulnerable to forgery. For example, the Internet of Services Foundation has created a scalable blockchain infrastructure for the future of online business. Its high throughput processing and security offer an intriguing alternative from cryptocurrency mainstays like Bitcoin and Ethereum. To date, these cryptocurrencies have been unable to scale for mass adoption.


UK launches the world’s first crypto assets task force

UK launches the world’s first crypto assets task force
The initiative is part of a larger collective fintech sector strategy; one which will “help the UK to manage the risks around crypto assets, as well as harnessing the potential benefits of the underlying technology,” as per Hammond. Philip Hammond is expected to announce the task force — which will comprise of Bank of England, the Financial Conduct Authority, and the Treasury itself — on Thursday, at the government’s second International Fintech Conference. The statement also announced the government’s interest in creating a UK-Australia ‘fintech bridge’, which will aim to connect the countries’ respective markets and help UK firms expand internationally. The British government has been mostly supportive of cryptocurrencies and blockchain technology, only sporadically calling for increased regulations in the industry. British Prime Minister Theresa May, speaking at the World Economic Forum in January, shared her concerns about potential criminal usage of cryptocurrencies.


J.P.Morgan’s massive guide to machine learning and big data jobs in finance

Machine learning banking
Before machine learning strategies can be implemented, data scientists and quantitative researchers need to acquire and analyze the data with the aim of deriving tradable signals and insights. J.P. Morgan notes that data analysis is complex. Today’s datasets are often bigger than yesterday’s. They can include anything from data generated by individuals (social media posts, product reviews, search trends, etc.), to data generated by business processes (company exhaust data, commercial transaction, credit card data, etc.) and data generated by sensors (satellite image data, foot and car traffic, ship locations, etc.). These new forms of data need to be analyzed before they can be used in a trading strategy. They also need to be assessed for ‘alpha content’ – their ability to generate alpha. Alpha content will be partially dependent upon the cost of the data, the amount of processing required and how well-used the dataset is already.


8 questions to ask about your industrial control systems security

supply chain management logistics - ERP - Enterprise Resource Planning
An ICS is any device, instrumentation, and associated software and networks used to operate or automate industrial processes. Industrial control systems are commonly used in manufacturing, but they are also vital to critical infrastructure such as energy, communications, and transportation. Many of these systems connect to sensors and other devices over the internet—the industrial Internet of things (IIoT), which increases the potential ICS attack surface. "It is important that organizations leverage lessons learned securing enterprise IT but adapt those lessons to the unique characteristics of OT," says Eddie Habibi, CEO and founder of ICS security vendor PAS Global. "This includes moving beyond perimeter-based security in a facility and adding security controls to the assets that matter most – the proprietary control systems, which have primary responsibility for process safety and reliability," he says. The following are some of the key questions that plant operators, process control engineers, manufacturing IT specialists, and security personnel need to be asking when planning for ICS security, according to several experts.



Quote for the day:


"Acknowledging what you don't know is the dawning of wisdom." -- Charlie Munger


Daily Tech Digest - February 21, 2018

The New Era Of Artificial Intelligence


AI will soon become commoditized and democratized, just as electricity was in its time. Today we use computers, smartphones, other connected devices, and, mostly, apps. Whilst access to internet technologies has constantly improved over the past decades, very few people are able to program these and generate income by intelligently exploiting consumer data, which, in theory, is not theirs. GAFA (Google, Amazon, Facebook and Apple) and the Chinese BAT (Baidu, Alibaba and Tencent,) are among the most prominent players in these fields. Tomorrow’s world would be different with the emergence of relatively simple, portable AI devices, which might not necessarily be connected to each other by the internet, but would feature completely new protocols and peer-to-peer technologies. This will significantly re-empower consumers. Because it is decentralized, portable AI will be available for the masses within a decade or so. Its use will be intuitive; just as driving a car is today. Portable AI will also be less expensive than motorized vehicles, 


What is DevSecOps and Vulnerabilities?

The principles of security and communications should be introduced every step of the way when building applications. The philosophy of DevSecOps was created by security practitioners who seek to “work and contribute value with less friction”. These practitioners run a web site that details an approach to improving security, explaining that “the goal of DevSecOps is to bring individuals of all capabilities to a high level of security efficiency in a short period of time. Security is everyone responsibility.” DevSecOps statement includes principles such as building a lower access platform, focusing on science, avoiding fear, uncertainty and doubt, collaboration, continuous security monitoring and cutting edge intelligence. Community DevSecOps promotes action directed at detecting potential issues or exploiting weaknesses. In other words, think like an enemy and perform similar tactics such as trying to penetrate to identify gaps that can be exploited and that need to be treated.


7 essential technologies for a modern data architecture

7 essential technologies for a modern data architecture
At the center of this digital transformation is data, which has become the most valuable currency in business. Organizations have long been hamstrung in their use of data by incompatible formats, limitations of traditional databases, and the inability to flexibly combine data from multiple sources. New technologies promise to change all that. Improving the deployment model of software is one major facet to removing barriers to data usage. Greater “data agility” also requires more flexible databases and more scalable real-time streaming platforms. In fact no fewer than seven foundational technologies are combining to deliver a flexible, real-time “data fabric” to the enterprise. Unlike the technologies they are replacing, these seven software innovations are able to scale to meet the needs of both many users and many use cases. For businesses, they have the power to enable faster and more intelligent decisions and to create better customer experiences.


Tesla cloud systems exploited by hackers to mine cryptocurrency

Researchers from the RedLock Cloud Security Intelligence (CSI) team discovered that cryptocurrency mining scripts, used for cryptojacking -- the unauthorized use of computing power to mine cryptocurrency -- were operating on Tesla's unsecured Kubernetes instances, which allowed the attackers to steal the Tesla AWS compute resources to line their own pockets. Tesla's AWS system also contained sensitive data including vehicle telemetry, which was exposed due to the unsecured credentials theft. "In Tesla's case, the cyber thieves gained access to Tesla's Kubernetes administrative console, which exposed access credentials to Tesla's AWS environment," RedLock says. "Those credentials provided unfettered access to non-public Tesla information stored in Amazon Simple Storage Service (S3) buckets." The unknown hackers also employed a number of techniques to avoid detection. Rather than using typical public mining pools in their scheme


Micron sets its sights on quad-cell storage

Micron sets its sights on quad-cell storage
The first single-level cell, with one bit per cell, first emerged in the late 1980s when flash drives first appeared for mainframes. In the late 1990s came multi-level cell (MLC) drives capable of storing two bits per cell. Triple-level cell (TLC) didn't come out until 2013 when Samsung introduced its 840 series of SSDs. So, these advances take a long time, although they are being sped up by a massive increase in R&D dollars in recent years. Multi-bit flash memory chips store data by managing the number of electronic charges in each individual cell. With each new cell, the number of voltage states doubles. SLC NAND tracks only two voltage states, while MLC has four voltage states, TLC has eight voltage states, and QLC has 16 voltage states. This translates to much lower tolerance for voltage fluctuations. As density goes up, the computer housing the SSD must be rock-stable electrically because without it, you risk damaging cells. This means supporting electronics around the SSD to protect it from fluctuations.



When it comes to cyber risk, execute or be executed!

Accountability must be clearly defined, especially in strategies, plans and procedures. Leaders at all levels need to maintain vigilance and hold themselves and their charges accountable to execute established best practices and other due care and due diligence mechanisms. Organizations should include independent third-party auditing and pen-testing to better understand their risk exposure and compliance posture. Top organizations don’t use auditing and pen-testing for punitive measures, but rather, to find weaknesses that should be addressed. Often, they find that personnel need more training, and regular cyber drills and exercises to get to a level of proficiency commensurate with their goals. Those organizations that fail are those that do not actively seek to find weaknesses or fail to address known weaknesses properly. Sound execution of cyber best practices buys down your overall risk. With today’s national prosperity and national security reliant on information technology, the stakes have never been higher.


Hack the CIO

CIOs have known for a long time that smart processes win. Whether they were installing enterprise resource planning systems or working with the business to imagine the customer’s journey, they always had to think in holistic ways that crossed traditional departmental, functional, and operational boundaries. Unlike other business leaders, CIOs spend their careers looking across systems. Why did our supply chain go down? How can we support this new business initiative beyond a single department or function? Now supported by end-to-end process methodologies such as design thinking, good CIOs have developed a way of looking at the company that can lead to radical simplifications that can reduce cost and improve performance at the same time. They are also used to thinking beyond temporal boundaries. “This idea that the power of technology doubles every two years means that as you’re planning ahead you can’t think in terms of a linear process, you have to think in terms of huge jumps,” says Jay Ferro, CIO of TransPerfect, a New York–based global translation firm.


Taking cybersecurity beyond a compliance-first approach

Stack of legal documents with compliance and regulatory stamp
With high profile security breaches continuing to hit the headlines, organizations are clearly struggling to lock down data against the continuously evolving threat landscape. Yet these breaches are not occurring at companies that have failed to recognize the risk to customer data; many have occurred at organizations that are meeting regulatory compliance requirements to protect customer data.  Given the huge investment companies in every market are making in order to comply with the raft of regulation that has been introduced over the past couple of decades, this continued vulnerability is – or should be – a massive concern. Regulatory compliance is clearly no safeguard against data breach. Should this really be a surprise, however? With new threats emerging weekly, the time lag inherent within the regulatory creation and implementation process is an obvious problem. It can take over 24 months for the regulators to understand and identify weaknesses within existing guidelines, update and publish requirements, and then set a viable timeline for compliance.


Three sectors being transformed by artificial intelligence


While these industries will see significant AI adoption this year, the AI platforms and products that scale to mainstream adoption won’t necessarily be the household names you may expect. As the “Frightful Five” continue to grow and expand their reach across industries, they have designed powerful AI products. However, these platforms present challenges for smaller companies looking to implement AI solutions, as well as larger companies in competitive industries such as retail, online gaming, shipping, and travel to name a few. How can an advertiser on Facebook feel comfortable entrusting its data to a tech behemoth that may sell a product that competes with its business? Should a big data company using a Google AI feature be concerned about the privacy of its data? These risks are very real, yet businesses have options. They can instead choose to host data on independent platforms with independent providers, guarding their intellectual property while also supercharging the advancement of AI technology.


What the ‘versatilist’ trend means for IT staffing

IT staff who once only focused on systems in the datacenter now focus on systems in the public cloud as well. This means that while they understand how to operate the LAMP stacks in their enterprise datacenters, as well as virtualization, they also understand how to do the same things in a pubic cloud. As a result, they have moved from one role to two roles, or even more roles. However, the intention is that eventually that the traditional systems will go away completely, and they will just be focused on the cloud-based systems. I agree with Gartner on that, too. While I understand where Gartner is coming from, the more automation that sits between us and the latest technology means we need more technology specialists, not less. So, I’m not convinced that IT versatilists will gain new business roles to replace the loss of of the traditional datacenter roles, as Gartner suggests will happen.



Quote for the day:


"We're so busy watching out for what's just ahead of us that we don't take time to enjoy where we are." -- Bill Watterson