Showing posts with label gaming. Show all posts
Showing posts with label gaming. Show all posts

Daily Tech Digest - October 07, 2020

Tips To Strengthen API Security

Plugging these above holes is a good start. However, these are only defensive measures against known patterns; they aren’t helping you keep guard for nuanced attack types. Ideally, security systems should stop cyberattacks before they even get started. Yet, Eliyahu recognizes a big gap in how APIs are monitored. Organizations “don’t have proper tools to know who is looking for vulnerabilities,” he said. “Tools are typically not that advanced. They mainly look for injections and known patterns.” Imagine a hacker probing an API. They will likely do so by trial and error, testing undocumented endpoints, sending malformed requests and so on. “They need to probe for hours or days before they find something,” said Eliyahu. If an AI could detect these odd attempts in minutes or seconds, IT could significantly reduce risk. Security solutions should thus leverage big data and AI to create baselines of typical behavior, then deter malicious activity the millisecond any nefarious probing begins. Eliyahu said such a security AI must consider dozens of behaviors such as, How is the API being accessed? What parameters are being used? What are the relationships between parameters? What is the flow of API calls? What type of data can be exposed?


UK, French, Belgian blanket spying systems ruled illegal by Europe’s top court

In layman’s terms that means that a government can’t build a massive database of what everyone does and then query it later while investigating a case. Instead, they will need to carry out targeted surveillance and data retention - identifying specific people or accounts or phone numbers - and have a court review those requests to make sure they are not overly broad. The ruling is significant because it directly addresses the issue of national security - something that has been used for years to bypass existing personal data protection legislation - and states categorically that EU privacy laws still apply in such circumstances, almost always. The decision includes a specific carve-out when it comes to national security, noting that “in situations where a Member State is facing a serious threat to national security that proves to be genuine and present or foreseeable, that Member State may derogate from the obligation to ensure the confidentiality of data relating to electronic communications by requiring, by way of legislative measures, the general and indiscriminate retention of that data for a period that is limited in time to what is strictly necessary, but which may be extended if the threat persists.”


New Flaws in Top Antivirus Software Could Make Computers More Vulnerable

According to a report published by CyberArk researcher Eran Shimony today and shared with The Hacker News, the high privileges often associated with anti-malware products render them more vulnerable to exploitation via file manipulation attacks, resulting in a scenario where malware gains elevated permissions on the system. The bugs impact a wide range of antivirus solutions, including those from Kaspersky, McAfee, Symantec, Fortinet, Check Point, Trend Micro, Avira, and Microsoft Defender, each of which has been fixed by the respective vendor. Chief among the flaws is the ability to delete files from arbitrary locations, allowing the attacker to delete any file in the system, as well as a file corruption vulnerability that permits a bad actor to eliminate the content of any file in the system. Per CyberArk, the bugs result from default DACLs (short for Discretionary Access Control Lists) for the "C:\ProgramData" folder of Windows, which are by applications to store data for standard users without requiring additional permissions. Given that every user has both write and delete permission on the base level of the directory, it raises the likelihood of a privilege escalation when a non-privileged process creates a new folder in "ProgramData" that could be later accessed by a privileged process.


How organizations can maintain a third-party risk management program from day one

First and foremost, we really took our time to hire subject matter experts in our industry. We’ve got lots of practitioners that have years and years and years of governance risk and compliance expertise. They’ve run third-party risk programs for some of the largest banks and financial institutions in the world. They’ve run risk programs at heavily regulated industries. Our people, first and foremost, is a huge differentiator. Number two, our products. It’s incredibly configurable, incredibly easy to use. But that’s such a common thing that folks claim. I actually like to say it’s easy to administrate. Some of the platforms that, if you will, we compete with. You can do those things, but you need to pay IT developers or other developers or even the company that you purchase the system from, to configure it for you. From our perspective, we like to empower our clients to really run the programs and configure the applications on their own. And so, from that perspective, I like to say, ease of administration. It’s also easy to use. First and foremost, not just for our clients, but for the vendors. So, think about it, if you’re an important vendor in a vertical like financial services, you’re getting a million of these questionnaires.


Game Development with .NET

All the .NET tools you are used to also work when making games. Visual Studio is a great IDE that works with all .NET game engines on Windows and macOS. It provides word-class debugging, AI-assisted code completion, code refactoring, and cleanup. In addition, it provides real-time collaboration and productivity tools for remote work. GitHub also provides all your DevOps needs. Host and review code, manage projects, and build software alongside 50 million developers with GitHub. The .NET game development ecosystem is rich. Some of the .NET game engines depend on foundational work done by the open-source community to create managed graphics APIs like SharpDX, SharpVulkan, Vulkan.NET, and Veldrid. Xamarin also enables using platform native features on iOS and Android. Beyond the .NET community, each game engine also has their own community and user groups you can join and interact with. .NET is an open-source platform with over 60,000+ contributors. It’s free and a solid stable base for all your current and future game development needs. Head to our new Game Development with .NET site to get an overview of what .NET provides for you when making games. If you never used Unity, get started with our step-by-step Unity get-started tutorial and script with C# as quick as possible.


Suspected Chinese Hackers Unleash Malware That Can Survive OS Reinstalls

The company discovered the UEFI-based malware on machines belonging to two victims. It works to create a Trojan file called "IntelUpdate.exe" in the Startup Folder, which will reinstall itself even if the user finds it and deletes it. "Since this logic is executed from the SPI flash, there is no way to avoid this process other than eliminating the malicious firmware," Kaspersky Lab said. The malware's goal is to deliver other hacking tools on the victim’s computer, including a document stealer, which will fetch files from the “Recent Documents” directory before uploading them to the hacker’s command and control server. Kaspersky Lab refrained from naming the victims, but said the culprits have been going after computers belonging to “diplomatic entities and NGOs in Africa, Asia, and Europe.” All the victims have some connection to North Korea, be it through non-profit activities or an actual presence in the country. While looking over the malware’s computer code, Kaspersky Lab also noticed the processes can reach out to a command and control server previously tied to a suspected Chinese state-sponsored hacking group known as Winnti. In addition, the security firm found evidence the creators behind the malware used the Chinese language while programming the code.


Q&A on the Book Infinite Gamification

There are two types of gaming to consider here - either they are cheating or they have found a cheap way to score points, a loophole in our program design. For cheats, the best way to deal with this is to have a clear set of rules and principles you expect players to follow, then if you find someone cheating you can call them up and explain they are not acting according to the stated rules of the program. In most cases, the person will desist but sometimes you do need to enforce the ultimate sanction of kicking them off the program. The second type of gaming, finding cheap ways to score points, is for you to fix. The principle here is “don’t blame the gamer, blame the game”. There are lots of techniques you can do - making that activity less valuable, capping the number of points they can earn with that activity, and so on. The book lists these. In order to do this though you need to have framed your program as one that will iterate over time. Too many gamification programs are launched as if these are the final rules and nothing can change - this is a recipe for disaster; most programs aren’t right the first time around. Human nature being what it is, by leaving room to evolve the program, you give yourself the flexibility to get it right over time.


How to Survive a Crisis with AI-Driven Operations

As an enterprise turns to AI during a crisis -- whether for predictive sales modelling or automating customer-center operations -- leaders must prioritize developing employees’ core competencies around AI. Employees skilled in AI will be of course be needed to develop and operate the new automation advancements, but the benefit extends beyond this. AI-skilled employees can be tapped to create a roadmap on how to best leverage the technology to drive business value in times of crisis. Organizations should consider developing internal reskilling and upskilling programs or using third party learning platforms to help employees develop AI specializations. Employees can also be instrumental in galvanizing coworkers to readily adopt new AI technology, accelerating adoption rates as an organization looks to quickly scale up the technology across the business to adjust operations in response to a crisis. Enterprises need a clear data strategy around data governance in order to scale up AI quickly and successfully. Ensuring they have a clear set of repeatable protocols and methodologies in place to help them execute that strategy effectively is critical, so leaders don’t have to worry about compliance as they scale up AI in the face of a crisis.


5 blockchain use cases in finance that show value

Financial institutions traditionally work as intermediaries moving payments between different entities, which involves complex and time-consuming processes that add friction into transactions. Blockchain can streamline these processes -- notably reconciliation as well as clearing and settlement -- by removing the friction, thereby reducing the time and cost that financial institutions incur. For example, in April 2020 European financial technology company SIA launched a blockchain infrastructure to enable the Spunta Banca DLT, a private permissioned distributed ledger technology-based project for interbank reconciliation that is promoted by Italian Banking Association (ABI) and coordinated and implemented by ABI Lab, a banking research and innovation center. "The reconciliation process for interbank transactions in Italy -- formerly governed by the spunta process -- has been notoriously complex," said Charley Cooper, managing director at R3, an enterprise blockchain technology company. "With multiple parties involved, the task of identifying and addressing inconsistencies has historically been hampered by a lack of standardization, the use of piecemeal and fragmented communication methods and no single version of the truth," he added.


Cloud data management – the post-Covid future of data protection for MSPs

The dynamic changes in 2020 have emphasized just how much MSPs need to be on the front foot with innovative data management solutions. And those that are pivoting to cloud data management are seeing both a boost in their revenue, and an ability to Covid-proof operations. After all, customers with on-site solutions may not be able to get an engineer visit in person. Companies are shrinking, or growing, rapidly, and need to be able to scale up or down accordingly – without hitting the bottom line. And for remote users the expectation is that they can work wherever they need to, whenever they need to. The only way MSPs can help companies meet these challenges is with cloud data management. ... Unify complex data: With a one-stop, cloud-data management platform, MSPs can stream customers' backup, archive and DR data, while offering invaluable insight into entire data estates. This enables them to gain borderless visibility of all critical data, structured and unstructured - from a single control center in real time. Importantly this includes Microsoft 365 and G Suite data. Eliminate downtime: Modern solutions now instantly restore individual files or whole systems, using user-driven recovery methods. 



Quote for the day:

"Distinguished leaders impress, inspire and invest in other leaders." -- Anyaele Sam Chiyson

Daily Tech Digest - January 30, 2018

Today, most task work is driven by logic, which typically requires working from our left-brain. Logic is all about numbers, critical thinking, black & white. Those of us who live in our left-brains have great difficulty perceiving right-brain work. But, the right brain is still there waiting for us! Right-brain work includes creativity, design, communications, influencing others, building relationships, engaging, consultative sales, strategy, among others, a lot of stuff our parents warned us not to do. In my new book, The Workplace Engagement Solution, I talk about how a global engagement figure of 13% isn’t just a business problem, disengagement is a tragedy infecting our lives, families, customer satisfaction and day-to-day living. The great disengagement of the modern worker is leading directly to the scourge of our modern economy: underemployment. How many task workers are now part-time task workers? “Consultants?”


How To Manage Your KPIs And Expectations During Digital Transformation


Digital transformation should set you up for the long-term by giving you a scalable, streamlined approach to business growth. And as such, it starts on the inside, building the internal systems that support even the outward-facing initiatives. With that in mind, having a baseline of what's working and what's not in your organization will provide you a good jumping off point. Are processes clear, well documented and accessible to everyone? Are all those processes easily repeatable and scalable, and supported by the right technology? Is there a system in place for hiring the right people, documenting and sharing customer data across different departments, making suggestions for process improvement and acting on it, and getting leadership's approval of major initiatives in an efficient manner? If any of these elements are off, your path to transformation may lead to expensive dead-ends.



Make the case to follow a container strategy at your company

Adding even a simple orchestration tool to the primary container software facilitates container deployment on public and hybrid cloud, as well as across multiple data centers. It can also help organize multicomponent applications, particularly those that share components among applications. Large enterprises should look into this path to achieve container success. The second trail off of the main container highway is for businesses with stringent security and compliance requirements. There are many ways to separate containers within a given server, and not all of them offer the same level of security. The most basic container software is the most popular, but not the most secure. If you have applications that demand an exceptionally high level of isolation and control, such as financial applications and even cloud applications involved in storefront missions, you may want to use something designed for that purpose.


The Anatomy of a Data Story

The Anatomy of a Data Story
The function of data in a data story is to tell what happened, and figuring out what happened typically starts with a question. Typical business-oriented questions usually revolve around sales or other KPIs, but they could be about anything—the results of a customer satisfaction survey, the efficacy of a policy change, the user behavior on a website. Once the overall question is established (e.g., How are our sales doing this quarter compared to last quarter?), you can begin to partition the data into smaller, more manageable pieces. Maybe you can track sales by product or by a sales representative or by company branch. Maybe you can look for correlations between revenue and other variables. If you don’t have a question to answer or artificial intelligence to point you to an interesting trend, you’ll likely have to do some data discovery and exploration to find a story worth telling. This is the process Ben Wellington employs when researching his blog posts.


What Will Artificial Intelligence Be Doing in 2018?

AI increasingly will require knowledge and skill sets that data scientists and AI specialists usually lack, according to the paper. Consider a team of computer scientists creating an AI application to support asset management systems. “The AI specialists probably aren’t experts on markets,” says PwC. “They’ll need economists, analysts, and traders working at their side to identify where AI can best support the human asset manager.” And, since the financial world is in constant flux, once the AI is up and running it will need continual customizing and tweaking. For that, too, functional specialists, not programmers, will have to lead the way. AI has already shown superiority over humans when it comes to hacking. For example, machine learning, often considered a subset of AI, can enable a malicious actor to follow a person’s behavior on social media, then customize phishing tweets or emails just for them, PwC says.


Designing Effective AI Public Policies


Governments lacking in-house expertise is problematic from a policy development perspective. As AI increasingly intersects with safety-critical areas of society, governments hold responsibilities to act in the interests of their citizens. But if they don’t have the ability to formulate measured policies in accordance with these interests, then unintended consequences could arise, placing their citizens at risk. Without belabouring scenarios of misguided policies, governments should prioritise building their own expertise. Whether they’re prepared or not, governments are key stakeholders. They hold Social Contracts with their citizens to act on their behalf. So, as AI is applied to safety-critical industries, like healthcare, energy, and transportation, understanding the opportunities and implications is essential. Ultimately, knowledge and expertise are central to effective policy decisions. And independence helps align policies to the public interest. While the spectrum of potential policy actions for safety-critical AI is broad, all with their own effects, inaction is also a policy position.


AI cracks ancient game of Go
Personalization, 1-to-1 marketing, people-based marketing and other trending terms describe how marketers in every industry are working to stop aggressive, irrelevant advertising campaigns and create highly targeted interactions. Online gaming is no different. Through big data, gaming companies can create meaningful marketing messages. Especially as we talk about all of the data being collected, the thought of playing a mobile game may seem intrusive. But gaming companies are mining such metrics to better appeal to their users with content they’re likely to appreciate, not despise. “Segmentation isn’t enough anymore. 76 percent of digital nomads expect to see a personalized website screen on just about every brand site they visit — and your inability to give any kind of individual regard means they think a lot less of your brand, and makes them significantly more likely to bounce,” according to VentureBeat.


artificial-intelligence-mirror-sphere-on-curved-surface-singularity-colorful-black-hole
No one would dispute the fact that we’re in an age of considerable AI hype, but the progress of AI is littered by booms and busts in hype, growth spurts that alternate with AI winters. So the AI Index attempts to track the progress of algorithms against a series of tasks. How well does computer vision perform at the Large Scale Visual Recognition challenge? (Superhuman at annotating images since 2015, but they still can’t answer questions about images very well, combining natural language processing and image recognition). Speech recognition on phone calls is almost at parity. In other narrow fields, AIs are still catching up to humans. Translation might be good enough that you can usually get the gist of what’s being said, but still scores poorly on the BLEU metric for translation accuracy. Measuring the performance of state-of-the-art AI systems on narrow tasks is useful and fairly easy to do. 


How to build a Successful Advanced Analytics Department

Using data is proven to work. Our client’s examples showcase the possibilities. We’ve built and implemented a dynamic pricing model that deals with over 2 million quarterly pricing decisions. Increased fraud detection from 50% to over 90% and more accurately predicted e-commerce sales a year in advance. Our portfolio includes AI and AA projects for a large range of industries, often times including industry leaders. If you discover more frauds than your competition – you get an advantage. Moreover, you build from there. You get new ideas every time you work with data. The power and value of using data are spreading within organizations as managers start noticing results. ... The very first thing is to understand where you stand today. It might be that you already gather a lot of data, but your organization is mostly driven by spreadsheets. This is how a vast number of organizations are managed. 


The general sentiment of global media coverage of AI in 2017 frequently painted very much what is deemed to be a worst case scenario picture of what the future holds for the technology. Job losses, a lack of human control and even killer robots continued to dominate the headlines in the year just gone. This year however, we can all expect to see the technology applied more widely, and more practically than ever before. Digital transformation will then be experienced through the mainstream application of AI to business operations, coupled with greater adoption of cloud and growth in the scale and degree of AI implementations. Not only will the technology revolutionise areas like the supply chain, in-store operations and merchandise execution but also dependency on AI will become a more prominent means of pursuing new business avenues across the retail sector.



Quote for the day:


"Eventually relationships determine the size and the length of leadership." -- John C. Maxwell


March 30, 2016

Cyber criminals use Microsoft PowerShell in ransomware attacks

Traditional ransomware variants typically install malicious files on the system which, in some instances, can be easier to detect. Although the code is simple, PowerWare is a novel approach to ransomware, the researchers said, reflecting a growing trend of malware authors thinking outside the box in delivering ransomware. Carbon Black researchers found that PowerWare is delivered through a macro-enabled Microsoft Word document that launches two instances of PowerShell. One instance downloads the ransomware script and the other takes the script as input to run the malicious code to encrypt files on the target system and demand payment for releasing them.


Train your IT team for endurance

Work is the ultimate endurance event. While a triathlete might compete in a 5- to 12-hour event, the average career is measured in decades. Consider your IT organization for a moment. If it's like the majority, it's been conditioned around sprinting. A firefight or development sprint results in a fury of activity, the organizational equivalent of an athlete spiking her heartbeat to the max and tenaciously hanging there until it's physically impossible to sustain that level of effort. Like the athlete, after the sprint the team usually hits a wall and performance crashes down— employees even become physically affected by the workload. Contrast this to the team that has trained and measured around the productivity they can produce at sustainable activity levels. There's a quiet energy and diligence, and this team can make a strategic sprint or two when the time comes, without depleting themselves and falling apart.


Q&A: Database infrastructure must match modern apps

As a standard SQL solution, the way you build an application is not significantly different from how you build a system against other relational database management systems. The difference is that it scales. If you're running Oracle on a single machine, and you reach the capacity of a SQL machine, you switch to Oracle RAC, and that gets you some more performance. But when that gets exhausted, you're done. With NuoDB, you can take an intuitive database application design, and rather than changing the application to handle more scalability, you just plug in more computers.


Is outsourcing IT worth the compliance risk?

“Regulators have taken a deeper interest in outsourcing services that have an impact on either the regulatory posture of the organization or on cyber security and cyber-crime,” explains Bala Pandalangat, president and CEO of Centre for Outsourcing Research & Education (CORE), an organization that provides outsourcing advice and training based in Toronto. CORE’s membership includes Deloitte, IBM, Xerox, large banks, universities and law firms such as Torys LLP. “We see several common mistakes when it comes to outsourcing arrangements,” says Pandalangat. “The number one mistake is viewing risk management is an after-thought. Many deals emphasize the financial benefit of outsourcing at the expense of risk management. If risk management is not built into the contract, costly adjustments may be required to address that concern.”


NASA Software Audit Reveals Budgetary Black Hole

The audit warns that delays with such software designed for the Space Launch System (SLS) rocket could affect the ability to react to unexpected issues during launch operations, and could impact the launch schedule for the unmanned Orion system, which is due to lift off in 2018. The first exploration mission would allow the space agency to use the lunar vicinity as a proving ground to test technologies farther from Earth, and demonstrate it can get to a stable orbit in the area of space near the moon in order to support sending humans to deep space. The root of the budgetary issues appears to result from NASA's June 2006 decision to integrate multiple products or parts of products rather than develop software in-house or buy an off-the-shelf product.


Apple’s New Challenge: Learning How the U.S. Cracked Its iPhone

The challenges start with the lack of information about the method that the law enforcement authorities, with the aid of a third party, used to break into the iPhone of Syed Rizwan Farook, an attacker in the San Bernardino rampage last year. Federal officials have refused to identify the person, or organization, who helped crack the device, and have declined to specify the procedure used to open the iPhone. ... Making matters trickier, Apple’s security operation has been in flux. The operation was reorganized late last year. A manager who had been responsible for handling most of the government’s data extraction requests left the team to work in a different part of the company, according to four current and former Apple employees, who spoke on the condition of anonymity because they were not authorized to speak publicly about the changes.


Prep your smartphone for emergency situations

Another obvious recommendation, but one that can save you a lot of grief: keep your device in tip-top shape. Remove all unnecessary apps which might drain the battery. Keep a couple of spare batteries (if your device allows you the option of swapping these out). Make sure the hardware performs well; replace damaged screens, buttons and other elements which may be malfunctioning. And by all means keep it as fully charged as possible. I use car chargers, desk chargers and of course a bedside charger so at least two-thirds of the time during a normal day (and sometimes 100% depending on my schedule) I have access to power.


The triumphant, magnificent, and unexpected return of PC gaming

What makes the PC even more compelling right now is that the VR revolution has finally started. Just this week, the Oculus Rift debuted for PC with a host of new games that you can’t play on any of the consoles. (I will have a full report on that device soon.) That system requires at least an Intel Core i5 processor, 8GB of RAM, and at least a NVIDIA GTX 970 or AMD 290 GPU. The consoles just don’t have enough horsepower to make VR look realistic or compelling, despite what you may have heard. My theory is that PC gamers are smart enough to know this. They’ve seen the writing on the wall, and it says Virtual Reality


IT Security Threat to Intensify in Next Two Years

The report, Threat Horizons 2018, says the ability of organizations to protect IT is progressively being weakened. Businesses and society, for that matter, are becoming more reliant on complex new technologies to function, which intensifies the threat landscape, the report contends. "We are having to be a little bit more, perhaps, critical of the way in which we look at our use of technology, and that's what you're beginning to see with some of the predictions we're coming out with now," Steve Durbin, managing director of the Information Security Forum, says in an interview with Information Security Media Group. "Let's bear in mind: These predictions are really trying to put some extra weaponry into the armory for the security professionals so we can anticipate some of the challenges that we're going to be seeing."



Quote for the day:


"Strategy is a commodity, execution is an art." -- Peter Drucker


October 21, 2015

I'm a cyborg now - and so are you

Mixing sensors on our bodies, in our homes, and in our devices is bringing about an intriguing, science-fiction-like world. This isn't tomorrow, this is today, all over the developed -- and the developing -- world. As we bridge the Internet of Things and our personal area networks, we're immersed in a sea of low power radio, linking us to our machines and linking our machines to us. It's not hard to see a piece of software monitoring my wearables, letting me know that I should move. That's already a function of the Apple Watch, and anecdotes from Cupertino talk of meetings being interrupted by people getting up and walking around. 


The future of Cloud computing

In order to consider the future of cloud computing, it’s important to realise that there are a number of different adoption scenarios out there. ... The older companies might also have a history of insufficient IT investment and will continue to struggle to adapt to the new technology landscape because of their legacy IT. New entrants to their markets are threatening to disrupt the establishment because of the different approach to IT and cloud use, not just because of the difference in market offerings. The following observations of the future of cloud apply to both scenarios, albeit to different extents.



IoT hype, hope give rise to new C-level position, chief IoT officer

Making room for a chief IoT officer underscores the emphasis -- and the urgency -- senior leaders are placing on the technology. "In the past, you could get to market late," Heppelmann said. Today, competition is brutal, and being late to market is not only a missed opportunity, it's a failure to understand that "data exhaust coming off of products gives you new leverage over your customer base." Worse? Businesses (and not just of the vendor variety) that aren't jumping on first-to-market IoT opportunities put themselves at risk for becoming copycats, what Heppelmann called the "me too" companies. A conservative watch-and-learn approach could create setbacks that "me too" companies can't recover from -- not the least of which is keeping pace with rapidly evolving technology.


HTTP/2 is Ready, But Are You Ready For It?

Encryption is a de facto mandate in HTTP/2 implementations at the moment because all known browser implementations from the likes of Firefox and Chrome only support HTTP/2 with TLS encryption enabled. If you are a web content provider who relies on a content delivery network (CDN) to reduce latency, you will need to share your encryption keys with your CDN providers. While some providers are comfortable doing so, many more are not. Given these various requirements, many organizations will have to weigh the benefits of HTTP/2 adoption against the costs of implementation. Do the performance improvements make it worth the steps required to support it? This calculation will probably lead many web content providers and enterprises to hold off on HTTP/2 implementation.


What You Need To Know About The CISA Bill In The U.S. Senate

CISA is yet another attempt by the U.S. Senate or House of Representatives to present legislation based on security, privacy or copyright that would regulate Internet activities. The Stop Online Piracy Act (SOPA) in 2012 would have allowed companies (like movie studios or record labels) to take down websites deemed to be infringing on copyrighted material. Opponents of SOPA said the bill provided too much leverage to media companies and the government to take down websites for even the most trivial of offenses and survey user activity. An online protest led by the likes of Reddit and Google ultimately caused the bill to fail in Congress. SOPA had a sister bill called the Protect IP Act of 2011 that also aimed to give the government and companies the ability to increase surveillance in the name of protecting copyright and fighting digital pirates.


Safe Harbor Ruling Leaves Data Center Operators in Ambiguity

“It is unrealistic to think that all transatlantic data is going to have to stop as a result of this decision,” Snead added. “The European Commission is likely to figure out a way to accommodate it, and the US is as well.” Safe Harbor, created in 2000, is a uniform set of rules for handling personal data of citizens of member states of the European Union, including rules around moving that data to facilities in the US and storing it there. If a service provider complied with the rules, they could be confident that they were not breaking any European privacy laws. Former NSA contractor Edward Snowden’s public disclosure of the US spy agency’s covert electronic surveillance practices, however, eroded trust in Safe Harbor.


Business alignment and data analytics top CIO concerns, says SIM study

“Although alignment has received considerable attention from both academics and practitioners, it continues to remain a challenge for many organizations. It is possible that alignment remains a persistent issue due to the changing nature of business and the difficulty that the IT organization has in responding to these changes. In other words, it is one thing to become aligned, but quite another to stay aligned,” the study authors noted. Further, “Alignment of IT and/with the Business,” which has ranked in the top three for over a decade, retained the number one position it has held since 2013. Similarly, “Security/Privacy” retained the number two position that it achieved last year.


‘Response and Recovery’ Emphasized for Cyber Attacks

“So basically there are two kinds of companies: those that have been attacked and know it, and those that have been attacked and don’t know it yet.” The headlines report attacks at Target, Home Depot, Verizon and AT&T, but Joseph Bermudez, regional managing partner at Wilson Elser, said that it is not always malicious activity that causes a cyber loss. “Sometimes it is a bad act, but often it is an accident,” said, noting that regardless of the cause, “if there is a breach, your client will get a letter from their customer saying that they caused a problem and that they are owed some money. Now your client has a liability.”


The Five Qualities of Application Delivery Done Right

So if immutable infrastructure has all these benefits, why aren't all companies using it? First off, immutable infrastructure takes organizational buy-in. But even if an organization believes in the merits of immutable infrastructure, creating a system to build, deploy, maintain, and manage immutable infrastructure is not an easy task. Building images or containers is easy. Deploying and maintaining images and the provisioned hosts is challenging. However, once the build-time system is in place, it is significantly easier to manage runtime environments since there are less moving pieces. For individuals managing personal websites or companies managing small infrastructures, the investment into immutable infrastructure is probably not worth it.


Building an online game platform: Startup caters to developers

"The analytics and tools model is one of the most common ways to attract developers to gaming platforms," said Sangeet Paul Choudary, founder and CEO of Platform Thinking Labs and co-chair of the MIT Platform Strategy Group. He noted that the same model is used to attract brands to marketing platforms. In addition, the analytics-and-tools approach doesn't fully address what Choudary refers to as the chicken-and-egg problem of platform business models: the need to get producers and consumers on board to make a two-sided business work. "The issue is that it isn't really solving the chicken-and-egg problem as much as augmenting value once the problem gets solved, because there isn't really much value in analytics below a critical mass of usage," Choudary noted.



Quote for the day:

"Behind every argument is someone’s ignorance." -- Louis D. Brandeis

September 14, 2015

Getting started with open source machine learning

Common machine learning tasks include classification (applying labels to items), clustering (grouping items automatically), and topic detection. It is also commonly used in natural language processing. Machine learning is increasingly being used in a wide variety of use cases, including content recommendation, fraud detection, image analysis and ecommerce. It is useful across many industries and most popular programming languages have at least one open source library implementing common ML techniques. Reflecting the broader push in software towards open source, there are now many vibrant machine learning projects available to experiment with as well as a plethora of books, articles, tutorials, and videos to get you up to speed.


Don't get too excited about superfast 5G wireless yet

It's a bit of rerun from the last advent of new wireless technology. In 2008, Verizon was the first in the US to lead the charge to the variant of 4G technology called Long-Term Evolution, or LTE, and it launched its service to consumers two years later. At the time, AT&T also downplayed the immediate benefits of 4G, noting that early devices would be clunky and would quickly run through their batteries. Eventually, the move to 4G LTE by both Verizon and AT&T helped drive a jump in mobility, ushering in the rise of sophisticated smartphones and mobile programs and services that are now integral to our lives. The hope is that 5G, which will bring speeds that are higher than what Google Fiber offers through a superfast landline connection, will usher in a new revolution.


APIs Are The New FTEs

Imagine the power of tools such as Bubble. While their tagline, “build your startup by pointing and clicking,” might not be applicable to everyone today, I strongly believe that within 10 years we will see at least one unicorn built without writing a single line of code. APIs are truly democratizing startup creation. Not only will you practically need no money to get started, you won’t need any tech skills either. All you will need is a keen understanding of the user and how to take your product to market. Of course, this has major implications in terms of pace of product development, and the consequent noise in the market, but net-net it’s great for consumers. Anyone with a great idea anywhere in the world can build a billion-dollar tech company. That’s exciting!


The Value of Storage Management

We’ll learn more about how HTC lowers total storage utilization cost while bringing in a common management view to improve problem resolution, automate resources allocation, and more fully gain compliance -- as well as set the stage for broader virtualization and business continuity benefits. ... From a performance standpoint, our former primary storage platform was not great at telling us how close we were to the edge of our performance capabilities. We never knew exactly what was going to cause a problem or the unpredictability of virtual workloads in particular. We never knew where we were going to have issues. Being able to see into that has allowed us to prevent help desk cost for slow services, for problems that maybe we didn’t even know were going on initially.


A Video-Game Algorithm to Solve Online Abuse

To truly curb abuse, Riot designed punishments and disincentives to persuade players to modify their behavior. For example, it may limit chat resources for players who behave abusively, or require players to complete unranked games without incident before being able to play top-ranked games. The company also rewards respectful players with positive reinforcement. Lin firmly believes that the lessons he and his team have learned from their work have broader significance. “One of the crucial insights from the research is that toxic behavior doesn’t necessarily come from terrible people; it comes from regular people having a bad day,” says Justin Reich, a research scientist from Harvard’s Berkman Center, who has been studying Riot’s work.


The ‘missing link’: Do your processes support strategy?

It is easy to be drawn into an illusion that all organisations in a particular industry or sub-sector must have identical processes. If we were to examine the airline industry, for example, it is likely that all airlines will have processes enabling tickets to be booked, passengers to be boarded, aircraft to be cleaned ready for their next flight and so on. Yet whilst all airlines might have these processes, the activities, goals and measures each airline deem relevant may differ substantially. ... It is crucial that we have an understanding of our organization’s mission, vision, objectives and strategy before and during our process design or improvement initiatives. If we don’t, we risk designing a process that is out of kilter with the organization’s aspirations.


5 reasons why Lego-like modular PCs aren't as exciting as they seem

Companies like Acer, which recently announced its Revo modular computer, promise to make PC component upgrades as easy as snapping together a few Lego bricks. The idea is that anyone should be able to customize their own desktop rig without the usual tangle of wires, finicky connectors, and exposed circuit boards. You may recall Razer making similar promises a couple years ago with Project Christine, a modular PC that didn’t get beyond the concept stage. And of course there’s the recently released Micro Lego Computer and its accessories, all of which literally look like Lego blocks. While these announcements always elicit oohs and aahs from the tech press, in reality they just don’t make a lot of sense. Without a concerted, industry-wide effort to make the modular PC a reality, you’d be wise to steer clear of the concept.


How to Make Your Data Center PUE Calculation More Accurate

While PUE has become the de facto metric for measuring infrastructure efficiency, data center managers must clarify three things before embarking on their measurement strategy: There must be agreement on exactly what devices constitute IT loads, what devices constitute physical infrastructure, and what devices should be excluded from the measurement. Since most data center operators who attempt to determine PUE will encounter one or more of the above problems, a standard way to deal with them should be defined. The three-pronged approach outlined below can be used to effectively determine PUE. This methodology defines a standard approach for collecting data and drawing insight from data centers.


Design Thinking

Empathizing is not easy. It should wreck you! It should shake you to the core. And it has done just that to me–to my life. I am so grateful for the people who I have met, who have shared their struggles, because I have learned so much from them. It has strengthened and enlightened me–my entire life–and it started with my own mother. My mother had a heart of gold and would give the very shirt off of her back, but also the shirt off of my back, my brother’s back, and my dad’s back. Though she used to tell us, “We will not give a hand out, but a helping hand.” (I can attest she gave more than a hand!) How I miss so much of that wisdom today. My mother gave her life helping others and building them up to succeed. And, through her example of selflessness and generosity, I have learned how to be a leader, a father, and a friend.


Behind American Express’ Machine Learning Effort

We use machine learning to identify potential fraud concerns whenever an American Express Card is used anywhere in the world. Our machine learning models help to protect $1 trillion in charge volume every year. Making the decision in less than 2 milliseconds, it allows us to approve charges at the point of sale, with the least amount of disruption to our customers. The point-of-sale decisions we make using machine learning in turn automatically trigger fraud alerts to our Card Members through instant emails, text messages and smart phone notifications. Card Members are able to verify charges through these channels very quickly, allowing them to continue with their transaction without further disruption.



Quote for the day:

"You can't let praise or criticism get to you. It's a weakness to get caught up in either one." -- John Wooden

February 28, 2015

Process Trumps Innovation in Analytics
A good analytic process, however, needs more than a sensibility for how to derive and think about questions; it needs a tangible method to address the questions and derive business value from the answers. The method I propose can be framed in four steps: what, so what, now what and then what. Moving beyond the “what” (i.e., measurement and data) to the “so what” (i.e., insights) should be a goal of any analysis, yet many organizations are still turning out analysis that does nothing more than state the facts. Maybe 54 percent of people in a study prefer white houses, but why does anyone care? Analysis must move beyond mere findings to answer critical business questions and provide informed insights, implications and ideally full recommendations.


Virtual Creatures in a Box, Controlled by You
A projector inside the lid of Holus beams four images of the same object onto the walls of the prism, which are reflected to form a single 3-D image that users can control with a smartphone connected via Bluetooth or Wi-Fi. A tablet computer or laptop attached to the box runs an app that feeds images to the projector, and adjusts what you see based on input from the controller. At this year’s International Consumer Electronics Show in Las Vegas, H+ used Holus to let visitors play a multiplayer dice game controlled with an iPod Touch.


Kaspersky Lab Unveils Cybersecurity Startup Accelerator
The SSC is a mentor-driven acceleration programme developed and implemented by the Kaspersky Academy in partnership with venture industry players Mangrove Capital Partners and the ABRT Venture Fund. SSC will provide startups with access to business, cybersecurity and cross-industry expertise from around the world. Eugene Kaspersky, CEO of Kaspersky Lab, said: "As the cyber threat landscape becomes more and more dangerous, the world needs new ideas, new concepts and new approaches to cybersecurity. As a result, there's been a significant increase in venture funding of early-stage startups in the industry."


Google reveals plans for futuristic cityscape campus
The design of the office “motivates people to move around the office and interact in casual, unscheduled ways,” he explains–just like the well-planned public spaces of a great city. Early concepts for the office were motivated by old 18th-century maps of cities. “When I think about a city,” Gorman says, “I shop, I go get coffee, I go to the park, I go for walks. We wanted to create that same variety in the office.” In addition to its in-house café (and in-house debugger/barista), Square has been experimenting with pop-up stores and artisan merchants appearing within Square’s own offices.


UK poised to relax rules on employing overseas workers for some IT jobs
Rules would be loosened so employers no longer have to demonstrate they have tried to fill the job domestically before recruiting workers from outside the European Economic Area (EEA). Currently employers must prove they have advertised a job in the UK for 28 days and were unable to find a suitable worker. However, the MAC recommends that only start-up companies should be able to recruit from abroad in this fashion, stating it failed to receive much evidence from large tech firms that they are suffering from a skills shortage. "Any significant shortages within the sector, on the basis of the evidence we received, seem presently to mainly be confined to firms at the start-up/scale-up end," the report states


Red Hat wants you to contain yourself and your workloads
The cool part is that containers require no additional overhead or stress on the system. In fact, to the kernel, it's just running applications like any normal server does. For users and for the contained application, it's a separate and independent world. You can assign IP addresses to containers. Each container can have its own users, including the root user. From the container's point-of-view, it is a fully functional system. You can even reboot it without affecting any other container or the host system.


Net Neutrality Decision: What You Need to Know
The 3-to-2 Federal Communications Commission vote largely enshrines current practices of the major providers, such as Comcast, AT&T, and Verizon Communications, and as such probably won’t hold any immediate effects for the average consumer. It does, however, prevent a tiered Internet where companies and content providers can pay for speedy access to customers. “If this goes well, consumers will not notice a difference,” says Christopher Mitchell, an official with the Institute for Local Self-Reliance, an advocacy group for community development that supported the net neutrality proposal. Mitchell says the FCC rules are aimed at “preventing things from getting worse.”


Corporate Leaders Aren't Prepared for the Internet of Things
Fewer than one-quarter of survey respondents have established clear business leadership for the IoT, either in the form of a single organization unit owning the issue or multiple business units taking ownership of separate IoT efforts. Exacerbating this lack of leadership is a lack of understanding about the IoT by senior executives, the board of directors, and non-IT workers. Overall, the survey results show that there is a clear need for more internal education and ideation at all levels in the organization to explain the potential of the IoT and to seek innovative ways to exploit it.


Blockchain Technology Explained: Powering Bitcoin
So what is blockchain? Bitcoin blockchain is the technology backbone of the network and provides a tamper-proof data structure, providing a shared public ledger open to all. The mathematics involved are impressive, and the use of specialized hardware to construct this vast chain of cryptographic data renders it practically impossible to replicate. All confirmed transactions are embedded in the bitcoin blockchain. Use of SHA-256 cryptography ensures the integrity of the blockchain applications – all transactions must be signed using a private key or seed, which prevents third parties from tampering with it. Transactions are confirmed by the network within 10 minutes or so and this process is handled by bitcoin miners.


Building Software for the Long Term
Big software might survive but that might be just because it might be terrible software but it's just too expensive to replace, I mean I think there is probably a lot of software in financial institutions, I mean everywhere really that has been around for 40 years but nobody is able to change it. ... as software engineers we often want to improve things but we can’t describe it well enough to be able to convince people, so being able to make a business case to improve software and because actually bad software has significant costs and it’s not hard to find business cases for a lot of improvement work, that make sense for a business, it's not just our instincts tell us that we want to live in a nice software environment, there is a real business case usually in there.



Quote for the day:

"So much of what we call management consists in making it difficult for people to work." -- Peter Drucker

April 08, 2014

Yahoo email anti-spoofing policy breaks mailing lists
The specification introduces the concept of aligned identifiers, which requires the SPF or DKIM validation domains to be the same as or sub-domains of the domain for the email address in the "from" field. The domain owners can use a DMARC policy setting called "p=" to tell receiving email servers what should happen if the DMARC check fails. The possible values for this setting can be "none" or "reject." Over the weekend Yahoo published a DMARC record with "p=reject" essentially telling all receiving email servers to reject emails from yahoo.com addresses that don't originate from its servers, Levine said.


Scientists apply physics to biology to create uncrackable encryption scheme
The way your heart and lungs interact is an example of “coupling functions;” both organs carry out separate jobs to keep you alive, yet they must also communicate back and forth with each other -- cardiorespiratory interactions -- to coordinate their rhythms. The paper on Physical Review X included this handy-dandy visual aid.  “Here we offer a novel encryption scheme derived from biology, radically different from any earlier procedure,” stated Dr. Stankovski. “Inspired by the time-varying nature of the cardio-respiratory coupling functions recently discovered in humans, we propose a new encryption scheme that is highly resistant to conventional methods of attack.”


Microsoft Shows Off 'Power Of The Cloud' With Azure Servers
This is the sort of thing that Microsoft has been talking about since the Xbox One reveal, but we’ve yet to get much of an idea of how it will work when the rubber hits the road. The video below is a demonstration of two high-end gaming machines, one of which is connected to Azure’s cloud server, one of which isn’t. When the Microsoft presenter starts loading the scenario up with some complex physics, the unconnected machine struggles to maintain framerate while the connected one clips along at 32 fps. It should be noted that this is not Xbox One footage, but rather a PC prototype. The recording is courtesy of Arekkz Gaming.


All that a CIO needs to know about CRM was said already by the Dalai Lama
There is no beginning or end to the Magic Quadrant – it is not a cycle with a beginning, middle and end. It is not a novel or story with character, setting, plot, problem and resolution neatly bent around a beginning, a middle or an end. Nor are the dots random positions of Brownian Motion. Positions grow, decline, evolve based on the readiness of the market and the prowess of the software suppliers and the consultancies and integrators to bring the vision into reality. And here the thoughts that I heard long ago from the Dalai Lama, who will be 80 next year, are helpful.


Entrepreneurship Always Leads to Inequality
Inequality, in the broadest sense, is precisely, and perhaps paradoxically, what entrepreneurship is all about: entrepreneurs use their wit and grit to burst into new markets and generate extraordinary wealth, sometimes very quickly, more often over decades. Along the way, entrepreneurship rewards smart and risk-tolerant investors (who helped build the success) with wildly above-market (read: unequal) financial returns. The most successful entrepreneurship is disruptive — a term entrepreneurs these days have donned as a magic mantle: “We have a disruptive business model, a disruptive technology, and will disrupt the market” goes the startup pitch.


Microsoft shows off next-gen Windows for connected cars
Microsoft has been in the automotive space for a very very long time—probably more than 15 years, according to Steve Teixeira, who works in the developer division at Microsoft. A good chunk of cars on the road run either Windows CE or Windows Automotive, including BMW, Fiat, Ford, Kia, and Nissan. Now, Microsoft is prepping yet another version, Teixeira revealed at last week’s Build event. The company has already tested its new version of Windows for the car, both in simulators that model eye-tracking, as well as in actual cars in a local Seattle raceway.


How MDM works -- or doesn't work -- for SMBs
Right off the bat, things are tricky given that smaller companies often implement BYOD since they can't afford to provide employees with devices. "In some ways, it changes the landscape a little bit, because users may be hesitant to allow corporate control of their devices," says Tyler Shields, lead mobile analyst for Forrester. "But if you propose the trade off as, 'If you want access to sensitive material, you have to have MDM,' the user will almost always accept MDM on there for the convenience." With BYOD in place, SMBs either opt for endpoint security or simply ask that employees have "something on their devices, some sort of security," adds Shields.


The Science and Art of Customer Matching for MDM
The best customer MDM systems do not exist in a vacuum. They are continually updated with the latest and greatest data available, whether that be from a customer change request, an internal CRM system or a partner data feed. But in order for this data to be meaningful and accurate, it must be integrated with existing data so as not to create duplicates or apply updates to the wrong record. The challenge with customer MDM is that names are not unique. In addition, persons may change their name and customers may shift addresses.


China obtains patent concessions in return for approving Microsoft-Nokia deal
China's commerce ministry, however, fears the patent enforcement could go too far. Because Microsoft is entering the smartphone business, the company has the incentive to raise its patent licensing fees as a way to stifle the competition. Android makers could be forced out of the market, or pass the costs on to the consumer, the ministry added. To prevent the patent abuse, Microsoft has promised it won't use so-called "fundamental patents" to seek a product ban on Android handset makers. Nor will the company seek to increase their patent licensing fees following the acquisition.


Modern C++ and Visual Studio
One of the features that Modern C++ offers is simplified (from the programmer’s perspective) memory management when using new-> make_unique or new->make_shared. No need for delete, automatic lifetime management exception-safe. Another area is how values types are handled more efficiently for move operations. C++11 added the idea of moving object-like types. Building on this approach, the ability exists to take ownership instead of making copies that have to then be deleted. The improved move semantics can improve the speed of legacy code simply by recompiling with C++14 capable compiler.



Quote for the day:

“Keep your fears to yourself, but share your courage with others.” -- Robert Louis Stevenson

November 28, 2013

Consumer cloud-based storage services force changes in security
The perceived superiority of consumer cloud-based storage services may reflect a lack of policy controls and not a difference in core functionality. For example, an internal document management system may have features such as device-independent access. It might seem less user-friendly because a user cannot simply provide a list of collaborator email addresses to share a folder with others.


How the cloud’s value proposition is changing
Since 2010 a new value proposition has taken shape — one that I feel truly realizes the full power and original intent of the modern cloud. Today, the value proposition of the cloud comes from the ability to connect disparate applications to form one seamless web of IT. In a 100 percent web environment, APIs from dozens of applications can be integrated to allow data to flow across systems.


Screen play thoughts: A speculative look at trends in video game addiction
Over the last decade there has been a significant increase in the number of scientific studies examining various aspects of video game addiction. This has resulted in a wide-ranging selection of review papers focusing on different aspects of the topic. These include general literature reviews of video game addiction, reviews of online (as opposed to offline) gaming addiction, reviews of the main methodological issues ...


Resurrecting the Failed Project - Part 2
Finally, we had a modified project kick-off meeting. Nothing big, nothing very formal. But it was a chance for us to once again discuss next steps, assumptions, risks, issues and lessons learned, and to review the project schedule so we all left on the same page and ready for the next phases and the next deliverables we would be focused on. This step is critical…because while it's not a formal kick-off meeting you have to remember you're dealing with an organisation that somehow decided to give your organisation a second chance.


To Strengthen Your Attention Span, Stop Overtaxing It
Top performance requires full focus, and sustaining focused attention consumes energy – more technically, your brain exhausts its fuel, glucose. Without rest, our brains grow more depleted. The signs of a brain running on empty include, for instance, distractedness, irritability, fatigue, and finding yourself checking Facebook when you should be doing your work.


XtremIO: What You Need to Know (Updated)
The controllers each have two 8Gb/s Fibre Channel ports, Two 10GbE iSCSI ports, two 40Gb/s Infiniband ports (for node communications) and one 1Gb/s management port. In terms of capacity, todays’s XtremIO solution scales from a single X-Brick with 10TB of capacity (7.5TB usable) to four X-Bricks of 30TB usable. A capacity increase is expected in 1Q2014 with double capacity SSDs offering up to 60TB in a single four-node cluster. Eight-node clusters are also being talked about, but I have no timescale for that.


WSO2 Big Data Story
WSO2’s Big Data Analytics platform captures business activity across multiple data formats and message channels, performs temporal complex event processing and map-reduce analytics, and presents relevant, real-time business alerts and dashboards to enable timely operational management and business planning. WSO2 Big Data Analytics Platform enables an API-centric architecture, enhances business visibility, Contextual Web, and helps build an adaptive business.


The Care and Feeding of Data Scientists
"I'm coaching them to make sure they're aligned with the company, but I'm not prescribing methodology," says Anne Robinson, director of supply chain strategy and analytics at Verizon Wireless. "Because if you want a high return on your analytical investment, allow them the freedom to explore." Robinson says good teams incorporate a mix of academic skills and applied experiences. Personal characteristics, such as the ability to make connections and express ideas well, are important in the corporate setting, managers say.


Researchers enable computers to teach themselves common sense
The program also is set up to enable a computer to make common sense associations, like buildings are vertical instead of lying on their sides, people eat food, and cars are found on roads. All the things that people take for granted, the computers now are learning without being told. "People don't always know how or what to teach computers," said Abhinav Shrivastava, a robotics Ph.D. student at CMU and a lead researcher on the program. "But humans are good at telling computers when they are wrong."


Bluelock CTO: Learn which benefits of IaaS matter most to customers
As competition in Infrastructure as a Service (IaaS) intensifies and more players enter the market, customers won't think twice about abandoning their current cloud provider if it disappoints them. Now more than ever, providers need to not only understand what enterprises are looking for in an IaaS provider, but they also need to know which benefits of IaaS resonate the most with customers.



Quote for the day:

"I am reminded how hollow the label of leadership sometimes is and how heroic followership can be." -- Warren Bennis

September 17, 2013

The Human Body is the New Password
A few weeks ago Motorola demonstrated a so called password pill. A vitamin pill that contains a computer chip which transmits an encrypted signal to identify the individual. Google recently filed a patent to recognize faces in a unique way. Normal facial recognition software can easily be fooled by keeping a picture in front of the camera. Google has therefore found a way that the static portraits can be broken, simply by winking, “at least one of a blink gesture, a wink gesture, an ocular movement, a smile gesture, a frown gesture, a tongue protrusion gesture, an open mouth gesture, an eyebrow movement, a forehead wrinkle gesture, and a nose wrinkle gesture.”


The future bank will be the one with biggest (inter)network
Banks are very poor at collaboration – apart from creating their cooperative SWIFT – and many areas of banking today will not exist in the future without collaboration. We need to make collaboration work to survive. If you look at how the world works today, everything has ‘crowd’ in it somewhere with crowdsourcing and crowdfunding being two that really apply to the banking world. This is why we will need far more collaboration in the future as you cannot work or stand alone in a globally connected world.


With No Camera Required Armband Converts Gestures Into Controls
The Tom Cruise action-thriller Minority Report, made in 2002 and set in 2054, envisioned a world where people spoke to computers and controlled them with a swipe of the wrist. We only had to wait ten years for the science fiction imaginings to become a reality, with gesture recognition, and more recently wearable tech, blurring the lines between digital interfaces and human commands to making communicating with machines easier than ever before.


Disrupting the Consultants: Clayton Christensen and Friends Sound the Alarm
Now, more than ever before, companies want to connect to the originator, the source of an idea - instead of going with organizational middlemen. Thought-leadership translates to market leadership. Some of the big firms are hiring these gurus to harness their I.P. but the list of independent, disruptive gurus is growing fast.


Get an Inside Look at Microsoft Datacenters and Hardware
Have you ever wondered what a datacenter looks like? Maybe you saw a datacenter 5 years ago. I can tell you first hand a lot has changed in datacenter construction and implementation in the last 5 years. There are a couple of great videos on YouTube that show off a few of the things that Microsoft is doing with cloud computing hardware and datacenters.


Cybersecurity business booming in Silicon Valley
"It's a multibillion-dollar business in and of itself," said John Grady, a security specialist with the International Data Corporation, of the criminal enterprises. "So the industry, to keep up on the defensive side, has just skyrocketed." Although HP doesn't reveal how much money it gets from its cybersecurity products, which are designed to discourage attacks and minimize losses when breaches occur, the amount is a tiny portion of its revenue.


Hybrid Databases Gaining Favor for Enterprise Big Data Analytics
“Traditional databases do not go away,” said Sastry Malldi, the chief architect for StubHub. ... The more unstructured data coming into the company, the more structured you have to become in dealing with all those sources. StubHub uses a four-layer data approach overseen by a data management umbrella. The data and data management reside in eBay’s private infrastructure cloud. ... The hybrid database will be the goal of the enterprise data architect for years to come.


Postgres Gets Even More Reliability, High Availability, Several Developer-Friendly Features
PostgreSQL 9.3 comes with Fast Fail-over and streaming-only Remastering as well as many developer-focussed features such as materialized views, auto-updateable views, many features for JSON data-type and more. ... Features include: Optional ability to Checksum data pages and report corruption; Fast Failover option for Standby servers: enables sub-second switch from master to replica; and Streaming-Only Remastering: easier, faster reconfiguration of cascading replicas after failover


Valve CEO: Why Linux is the future of gaming
"Linux is the future of gaming for gamers on the client as well, because, besides Microsoft moving to a more locked-in style of computing, "Open systems were advancing much faster. The old console guys are not competitive, and there's huge tension in proprietary systems." For example, Newell said, "It took us six months to get one update through the Apple store. Closed systems are at odds with the evolution of gaming." So, Valve has been bringing its Steam games to Linux. There are now 198 Steam games running on Linux. The issues of bringing the games to Linux have been solved.


Innovation under the covers
There are a number of reasons for what I call "innovation under the covers". First, every firm wants to be viewed as an innovator, so it pays to talk about innovation externally, regardless of what you are actually doing internally. Second, innovation is risky, so rather than make a big, public bet that may fail, executives are often willing to allow innovation to happen, but in a quiet, discrete way in case it doesn't pan out.



Quote for the day:

"The leadership instinct you are born with is the backbone. You develop the funny bone and the wishbone that go with it." -- Elaine Agather