Showing posts with label payment terminals. Show all posts
Showing posts with label payment terminals. Show all posts

Daily Tech Digest - April 26, 2020

Can computers become conscious?


AI-hard problems are hypothesized to include general computer vision, natural language understanding, and dealing with unexpected circumstances while solving any real-world problem. As it stands, AI-hard problems cannot be solved with current computer technology alone. They still require human intervention, and probably always will. Following this trend, AI will not become self-aware. So, the doomsday conspiracy theorists are wrong. AI will not become the dominant form of intelligence on Earth, with computers and robots taking over the world. Still, there’s nothing wrong with taking a few precautionary measures to ensure that future superintelligent machines remain under human control. However, I don’t think a robot uprising is possible. Nonetheless, there are those who believe that machines have minds or soon will. This is why scientists have developed a number of experiments to test AI, to find out what the limits of artificial intelligence are.



Custom Response Caching Using NCache in ASP.NET Core

Response caching enables you to cache the server responses of a request so that the subsequent requests can be served from the cache. It is a type of caching in which you would typically specify cache-related headers in the HTTP responses to let the clients know to cache responses. You can take advantage of the cache control header to set browser caching policies in requests that originate from the clients as well as responses that come from the server. As an example, cache-control: max-age=90 implies that the server response is valid for a period of 90 seconds. Once this time period elapses, the web browser should request a new version of the data. The key benefits of response caching include reduced latency and network traffic, improved responsiveness, and hence improved performance. Proper usage of response caching can lower bandwidth requirements and improve the application’s performance. You can take advantage of response caching to cache items that are static and have minimal chance of being modified, such as CSS, JavaScript files, etc.


It's a great time to tackle core IT upgrades


There are hundreds of thousands of security patches out there, but Vulcan will tell you that a few of the important ones will eliminate many related security issues. A little work now goes a long way -- if you know what to do. With consumers and business buyers stuck at home, it is the e-commerce side of a business that is super important. During the important fourth-quarter holiday sales season, companies won't risk making any changes to their e-commerce systems. Now things are reversed, it is the main IT systems that can be upgraded and patched with less risk of downtime problems. But don't mess with the e-commerce systems. Vulcan's platform is designed to scale and to interface with all the standard IT tools. It makes heavy use of machine learning and also human intelligence -- IT experts that can analyze new security threats and solutions. And sometimes a patch isn't needed and a simple workaround will eliminate dozens of related issues, says Bar-Dayan. Vulcan's reports identify the top vulnerabilities and the detailed remediation steps necessary. It is a huge time-saver for cybersecurity teams.


Shadow Broker leaked NSA files point to unknown APT group


Juan Guerrero-Saade, a security researcher and adjunct professor at Johns Hopkins University’s School of Advanced International Studies, wasn’t convinced, arguing that misleading files make their way onto VirusTotal all the time. He realised that the file in question was a 15Mb memory dump of a McAfee installer. In short, it’s a red herring. Investigating godown.dllfurther, he found that the file was a drop from a larger multi-stage infection framework. The tools and techniques that the framework used indicated a unique cluster of activity. It pointed to an advanced persistent threat group that wasn’t publicly known until now. Although it’s difficult to directly attribute the attack to a specific actor, Guerrero-Saade noted that some of the resources in the files mention Farsi (Persian), which is native to countries including Iran. The name used in the root debug path, c:/khzer, apparently means ‘to survey or monitor’ according to friends of his that are acquainted with the language, and so he decided to call the attack group Nazar, after the heart-shaped amulet supposed to protect people against the evil eye in many countries across the middle east.


The true costs incurred by businesses for technology downtime

technology downtime
The research, conducted by Vanson Bourne, which surveyed 1,000 senior IT decision-makers and 2,000 end users at organizations with at least 1,500 employees across the U.S., the U.K., France, and Germany, shows that employees are losing an average of 28 minutes every time they have an IT-related problem. The report also shows that IT decision makers believe employees are experiencing approximately two IT issues per week, wasting nearly 50 hours a year. However, as only just over half of IT issues are being reported, the numbers are more likely to be nearly double that – close to 100 hours (two work weeks) a year. This has led to a vicious cycle of employees trying to fix IT problems on their own, leading to less engagement with the IT department, which doesn’t have visibility into how the technology is being consumed. There exists a major disconnect between IT departments and employees, with 84% of employees believing that their organizations should be doing more to improve the digital experience at work. However, a staggering 90% of IT leaders believe that workers are satisfied with technology in the workplace, highlighting the discrepancy between perception and reality of the digital employee experience.


Judges and lawyers learn Zoom rules in real time during coronavirus crisis


Ines Swaney, a certified Spanish interpreter, said her first experience with Zoom was a three-way conversation during a legal visit between an attorney in one city, the attorney's incarcerated client joining the conversation from jail in another city, and herself serving as an interpreter in a third city. One drawback with the Zoom platform is that it forces an interpreter to use consecutive interpreting instead of simultaneous interpreting, which is the preferred approach. Swaney said that online platforms also need to allow private conversations between an attorney and the judge, and among an attorney, client and interpreter who may need to speak privately for a brief period of time during a hearing. Tony Sirna, legal strategist and customer success manager at Verbit, said there are serious considerations the courts are working through, particularly ensuring due process with remote proceedings, technology interruptions, unauthorized recordings, exhibits, and the impact virtual appearances will have on defendants, for example.  Sirna said in addition to standardizing software and recording technology, courts need to agree on procedural best practices, such as how exhibits and stipulations will be handled remotely.


Text ‘bomb’ crashes iPhones, iPads, Macs and Apple Watches – what you need to know

Text 'bomb' crashes iPhones, iPads, Macs and Apple Watches - what you need to know
The problem appears to exists in how the latest shipping versions of Apple’s operating system handle a Unicode symbol representing specific characters written in Sindhi, an official language in part of Pakistan. The problem occurs most irritatingly when your device attempts to display a message notification. If you have configured your iPhone, for instance, to display a new message notification which includes a preview of the message, then iOS fails to properly render the characters and crashes with unpredictable results. You may find the only way to get around the problem is to completely reboot your device – but there is always the risk that you will receive a new boobytrapped notification. The problem can also manifest itself inside apps. For instance, some mischievous Twitter users have tweeted the offending characters causing other users to have their devices crash. Android users, meanwhile, are unaffected – and can watch the chaos with bemusement. Some of the earliest reports suggested that for the attack to work the Sindhi characters had to be used in conjunction with an Italian flag emoji.


What Is Agile Enterprise Architecture? Just Enough, Just in Time

Agile is based on the concept of “just in time.” You can see this in many of the agile practices, especially in DevOps. User stories are created when they are needed and not before, and releases happen when there is appropriate value in releasing, not before and not after. Additionally, each iteration has a commitment that is met on time by the EA team. EA is missing the answer to the question of “what exactly is getting delivered?” This is where we introduce the phrase “just enough, just in time” because stakeholders don’t just simply want it in time, they also want just enough of it — regardless of what it is. This is especially important when communicating with non-EA professionals. In the past, enterprise architects have focused on delivering all of the EA assets to stakeholders and demonstrating the technical wizardry required to build the actual architecture. ... Create a marketing-style campaign to focus on EA initiatives, gathering and describing only what is required to satisfy the goal of the campaign.


Safe shopping: Your best options for NFC and contactless payments


Near-Field Communications, or NFC, is a technology built-in to many modern families of mobile devices, such as the iPhone, the Samsung Galaxy, Google Pixel, and many other Android smartphones. NFC, introduced in 2002, allows contactless data transfer between mobile devices and can to emulate a credit card for payments at POS terminals in retail stores. NFC lets the user pass their smartphone device over a payment terminal at a retailer in order to complete the purchase, provided that a supported "e-Wallet" platform is used. Keep in mind, however, that NFC still requires you get relatively close to the payment terminal and the person running it, and may even require you physically interact with a keypad or virtual keypad/screen to initiate a transaction -- so wear gloves or have the employee initiate the transaction on your behalf, and if you have to touch the terminal, do not touch your face, and wash your hands immediately afterward. Be sure you maintain safe distances when using it, or shop where there is a plexiglass barrier between you and the retail employee.


Go as a Scripting Language

Go's growing adoption as a programming language that can be used to create high-performance networked and concurrent systems has been fueling developer interest in its use as a scripting language. While Go is not currently ready "out of the box" to be used as a replacement for Bash or Python, this can be done with a little effort. As Codelang's Elton Minetto explained, Go has quite some appeal to be used as a scripting language, including its power and simplicity, support for goroutines, and more. Google software engineer Eyal Posener adds more reasons to adopt Go as a scripting language, such as the availability of a rich set of libraries and the language terseness, which makes maintenance easier. ... Being able to use the same language for day-to-day tasks and less frequent scripting task would greatly improve efficiency. Go is also a strongly typed language, notes Cloudflare engineer Ignat Korchagin, which can help to make Go scripts more reliable and less prone to runtime failure due to such trivial errors as typos.



Quote for the day:


"A leader is one who sees more than others see and who sees farther than others see and who sees before others see." -- Leroy Eimes


May 30, 2014

Know your Data Lineage
You need to know what has been done to your data, where it came from, and who is responsible for each stage of the analysis. This information represents your data lineage; it is your stack-trace. If you’re an analyst, suspicious of a number, it tells you why the number is there and how it got there. If you’re a developer, working on a pipeline, it provides the context you need to track down the bug. If you’re a manager, or an auditor, it lets you know the right things are being done. Lineage tracking is part of good data governance. Most audit and lineage systems require you to buy into their whole structure.


Hackers put security tool that finds payment card data into their arsenal
"This is the unfortunate reality for all software vendors: It is common for criminals to acquire a copy of commercial software via unauthorized means and then reverse engineer that software to circumvent the licensing mechanisms that are designed to prevent its unauthorized use," Cavey said. Numaan Huq, a senior threat researcher for Trend Micro, wrote on Wednesday that a version of Card Recon dating from three years ago was being used to validate payment card details in a type of POS malware. When Card Recon is scanning, it has to be able to separate 16-digit numbers and other random data it finds from valid 16-digit credit card numbers. Credit card numbers can be validated by using a checksum formula called the Luhn algorithm.


The Proof is in the SDN Applications
What should an open SDN Ecosystem or strategy look like? HP’s SDN strategy is based on open standards and building an open ecosystem to deliver complete SDN solutions. HP is a founding member of the Open Networking Foundation (ONF), and has adopted ONF’s standard definition of SDN, and has fully embraced the OpenFlow standard with over 50 switches and 10 routers comprising over 25 million OpenFlow capable ports. HP also participates in other standards consortiums such as ETSI, OpenStack and OpenDaylight with the vested interest in open, agile networking for all. Please read this Lippis Report for further analysis of HP’s open SDN strategy.


Engagement Is Driven By Good Managers With Rare Talents
If it’s not already apparent, the most effective managers seek to influence employees in ways we’ve traditionally believed were soft and even weak in business. They build personal relationships with their people, advocate for their growth – and routinely ensure they feel valued, respected and cared for. Just the idea that they want to make a difference in other people’s lives is a colossal change in our shared leadership paradigm. Were you to ask any of the people known-to-be disengaged in their jobs today (70% of our society) what they felt was missing at work, it’s almost assured to be some if not all of the things I just mentioned.


A beginner's guide to BitLocker, Windows' built-in encryption tool
The company says there are no back doors, but how can we be certain? We can't. Sure, if BitLocker was open source most of us wouldn't be able to read the code to determine if there was a backdoor anyway. But somebody out there would be able to meaning there would be a much higher chance of any faults with the program being discovered. So with BitLocker's closed source nature in mind, I wouldn't count on this encryption program defending your data against a government actor such as border agents or intelligence services. But if you're looking to protect your data in case your PC is stolen or other situations where petty criminals and non-government types might mess with your hardware then BitLocker should be just fine.


Documentation and Test Assertions in Databases
With Extended properties, one can get the best of both worlds, and even use them to put blame, praise or annotations into your VCS. It requires a lot of work, though, particularly the script to generate the table. The problem is that there are no conventional names beyond ‘MS_Description’ for the special use of extended properties. This makes it difficult to do splendid things such ensuring the integrity of the build by running a suite of tests that are actually stored in extended properties within the database and therefore the VCS. We have lost the readability of database source code over the years, and largely jettisoned the use of test assertions as part of the database build.


Free ebook: Introducing Microsoft Azure HDInsight
In Introducing Microsoft Azure HDInsight, we cover what big data really means, how you can use it to your advantage in your company or organization, and one of the services you can use to do that quickly—specifically, Microsoft’s HDInsight service. We start with an overview of big data and Hadoop, but we don’t emphasize only concepts in this book—we want you to jump in and get your hands dirty working with HDInsight in a practical way. To help you learn and even implement HDInsight right away, we focus on a specific use case that applies to almost any organization and demonstrate a process that you can follow along with.


Information overload: Finding signals in the noise
"The detection of an opportunistic Trojan, which happens to include a keylogger (e.g., the Zeus Trojan), occurs at a high frequency and may be considered to have low business risk to an organization (AKA - a noisy detection) because the presumed motivation of the attacker is to steal a user's credentials to personal accounts (e.g., shopping, personal banking)," explained Oliver Tavakoli, the CTO of Vectra Networks. "However, the same host may be used to login to IT systems or customer-owned systems, as in the case of an employee at Fazio Mechanical logging into a outside vendor support website at Target, thus resulting in the compromise of business-critical account credentials."


Between Cisco and VMware SDN, which will network engineers choose?
Network engineers will be much more comfortable with Cisco and its hardware-centric vision. After all, one of the three pillars of the Cisco ACI strategy is the Nexus 9000 series switch line, which runs a trimmed down version of the familiar Nexus operating system. ... Systems engineers, on the other hand, will be much more comfortable with the VMware vision of the future, as it brings the promise of network virtualization and control more directly into their world and the existing VMware product portfolio. It remains to be seen how much network control will truly be shifted to systems engineers in an NSX-centric version of the data center, but it is fairly certain that the likelihood of a power shift is much stronger with VMware than with Cisco.


A Random Walk in Finance
Malkiel's simple random walk is one in which each observation has a 50% chance of assuming a value of -1 and a 50% chance of being 1. The “problem” with an RW like this for the analyst is that its properties change over time – an RW isn't a statistically well-behaved “stationary” process. The RW's variance increases with the number of time points, potentially generating “patterns” that are in fact just noise. And indeed, realized RW's often can be confused with series having apparent patterns. Malkiel argues that market “chartists” – technical analysts who purport to time the market for profits by projecting future movement in stocks based on recent patterns -- are in reality being fooled by random walks.



Quote for the day:

"Meetings are indispensable when you don't want to do anything." -- John Kenneth Galbraith

February 28, 2013

In-Memory Technology: Keeping Pace with Your Data
In-memory technology presents two major advantages over traditional disk-based technologies. The first is speed. By storing all relevant data in its main memory, rather than on disk, new calculations can be performed on the fly, ... The second advantage is flexibility. Because a specifically structured data layer no longer needs to be built for a given query – which has long been a key part of most BI deployments – in-memory provides greater scope for analytics freedom, widening the range of what executives can query.


Forrester: 70% of "private clouds" aren't really clouds at all
Staten says if you call a highly virtualized environment a cloud, but it doesn't have one or more of the key characteristics of a private cloud, then the IT department is setting an unrealistic expectation for users. If users are disappointed when they find out the environment doesn't have self-provisioning, or an elastic resources pool, they can get discouraged. The next time they need a VM on the fly, where will they turn? The pseudo-private cloud IT has set up, or Amazon Web Services, which IT could have no control over.


Mobile devices will get next-gen Wi-Fi in early second half, Qualcomm says
The new Wi-Fi standard in Snapdragon will increase peak data transfer rates, but at the same time enable tablets and smartphones to retain battery life similar to mobile devices with 802.11 b/g/n technology, Renduchintala said. The theoretical data transfer rates for 802.11ac is expected to be three to four times faster than that of 802.11n, which are in mobile devices, PCs and routers today.


Despite the gloom, there is cause for optimism in IT security, says Microsoft
“There are significant advances the IT security industry has made, so my optimism is not delusional, but based in fact,” he told attendees of RSA Conference 2013 in San Francisco. The hardware security has seen the introduction of UEFI, the Unified Extensible Firmware Interface specification designed to provide a more secure alternative to BIOS. This has enabled the introduction of secure boot and measured boot in software such as Microsoft’s Windows 8 operating system. “These are positive developments in security that the industry can build on,” said Charney.


The unfulfilled promises of health information technology
Realizing that the cost savings and improvements in healthcare delivery are nowhere near what was optimistically predicted in 2005, RAND recently commissioned a new study to take a fresh new look at the state of health information technology. The new study paints a very different picture and received broad coverage by mainstream news outlets, including “In Second Look, Few Savings From Digital Health Records” by the New York Times in January.


Bringing BI Back to the Executive
From the executive’s perspective, the most important piece of this is realizing that the executive is not an endpoint consumer of BI; the executive is a driver and collaborator within the organization from the start. So what is the starting point, and what is the ending point? And what about the steps in between? Let’s look at the flow of processes that should be followed, what each of those phases is and what they will provide.


The Lost Art of Eye Contact
When is the last time you consciously looked into someone’s eyes and had a meaningful conversation? When nearly every personal and business interaction uses a screen as an intermediary, it’s difficult to develop and maintain meaningful relationships with employees, customers and partners. But such relationships are the cornerstone of building a long-term business. So put down that smart phone, walk away from the computer, and think about these five things


Paypal Accepts Coins and Paper Currency At Coinstar Kiosks
The rollout is part of PayPal's bid to play a role in brick-and-mortar retail in addition to its significant presence in online payments. The payments processor said it had lined up 23 national retailers last year that would accept payments using PayPal in their stores. Customers can make payments using a PayPal payment card that is accepted at participating stores, or by using their mobile number and a PIN (personal identification number).


Union Budget 2013 gives lucid reaction to IT Inc concerns
While giving a target fiscal deficit number of 5.2% of GDP, Finance Minister P Chidambaram's Union Budget 2013-14 did not do much about crucial concerns of IT industry. Will all these minimal measures rescue the economy from the possibility of a sovereign rating downgrade? And how much can $100 bn IT industry of the country can gain from these subtle measures?


Aveksa's Approach to Identity & Access Management
Good identity and access management can make sure your people have the access they need to do their jobs. It will ensure that information is secure, and your company meets its regulatory needs. But can it do more? Can it be a business enabler? To find out, Adam Burns spoke with Deepak Taneja, CTO and founder of Aveksa… the discussion started with the big challenges of today’s workplace – information security in the context of cloud, mobile and big data



Quote for the day:

"If you don't understand that you work for your mislabeled "subordinates",then you know nothing of leadership.You know only tyranny." -- Dee Hock

July 27, 2012

Will Enterprise Architecture Ever “Cross the Chasm?”
While the field has grown, the proliferation of voices, methods, frameworks, and generally inconsistent advice in the field of EA has also grown. The number of “EA Frameworks” has grown to include a wide array of overlapping bodies of work.

OAuth 2.0 and the Road to Hell
... Our standards making process is broken beyond repair. This outcome is the direct result of the nature of the IETF, and the particular personalities overseeing this work. To be clear, these are not bad or incompetent individuals. On the contrary – they are all very capable, bright, and otherwise pleasant. But most of them show up to serve their corporate overlords, and it’s practically impossible for the rest of us to compete. ...

Payment terminal flaws shown at Black Hat
Criminals can also leverage these vulnerabilities to trick store clerks into thinking that a transaction was authorized by the bank when in fact it wasn't, allowing them to buy things without actually paying.

Avoid These 6 Recipes for Business Disaster
Why would anyone want to know the formula for failure? Because you may be blind to the fact you are already following it, at least in part. And if you know the ingredients to avoid, you'll save your business before it's too late.

4 Reasons Why IT Matters More Than Ever
The argument that IT no longer matters has resurfaced. In this age of consumerization, BYOD and the cloud, IT departments are, in fact, vital to any business, able to create value and sort the wheat from the chaff as stakeholders eye new investments or money-saving ideas.

Lithium-Air Batteries Get a Recharge
Lithium-air batteries work, at least in theory, by exposing a lithium anode to an electrolyte that grabs its positively charged lithium ions and drives them toward the cathode, made of a different, porous material that allows oxygen from the air to form the crucial lithium peroxide.

LaCie 2Big NAS offers 6TB of network storage
If you think that LaCies latest network attached storage product, the 2Big NAS, looks like something youve seen before, youre right. But beneath the familiar appearance (the basic design of the 2Big has been around since 2007), there are a number of differences under the hood.

How To Be A Horrible Leader – 50 Bad Leadership Traits
Of course this is done in the hope that one can avoid the ill effects on an organization from any of bad leadership behaviors. We cannot all be perfect, but all it takes is a few of these in the right combination to kill moral and create a horribly run organization.

Losing Can Be Useful, If You Learn To Get Good At It
Successful entrepreneurs are crazy risk-takers, right? Not so much. The best know precisely how much they can lose--and what they can gain from the process.

Microsoft announces finalists for startup accelerator programme in India
Microsoft has unveiled the names of the 11 tech startups that will be incubated at the Microsoft Accelerator for Windows Azure in Bangalore. The program was announced in May this year and received more than 200 applications from startups.

Enterprise & IT Architecture Global Excellence Awards 2012
Check out the nominees to the various categories of Enterprise & IT Architecture Globa Excellence awards 2012 for the year 2012 instituted by iCMG and hope to have the winners published out there soon.


Quote for the day:

"Nothing is a waste of time if you use the experience wisely." -- Auguste Rodin