Showing posts with label vision. Show all posts
Showing posts with label vision. Show all posts

Daily Tech Digest - July 19, 2025


Quote for the day:

"A company is like a ship. Everyone ought to be prepared to take the helm." -- Morris Wilks


AI-Driven Threat Hunting: Catching Zero Day Exploits Before They Strike

Cybersecurity has come a long way from the days of simple virus scanners and static firewalls. Signature-based defenses were sufficient to detect known malware during the past era. Zero-day exploits operate as unpredictable threats that traditional security tools fail to detect. The technology sector saw Microsoft and Google rush to fix more than dozens of zero day vulnerabilities which attackers used in the wild during 2023. The consequences reach extreme levels because a single security breach results in major financial losses and immediate destruction of corporate reputation. AI functions as a protective measure that addresses weaknesses in human capabilities and outdated system limitations. The system analyzes enormous amounts of data from network traffic and timestamps and IP logs, and other inputs to detect security risks. ... So how does AI pull this off? It’s all about finding the weird stuff. Network traffic packets follow regular patterns, but zero-day exploits cause packet size fluctuations and timing irregularities. AI detects anomalies by comparing data against its knowledge base of typical behavior patterns. Autoencoders function as neural networks that learn to recreate data during operation. When an autoencoder fails to rebuild data, it automatically identifies the suspicious activity.


How AI is changing the GRC strategy

CISOs are in a tough spot because they have a dual mandate to increase productivity and leverage this powerful emerging technology, while still maintaining governance, risk and compliance obligations, according to Rich Marcus, CISO at AuditBoard. “They’re being asked to leverage AI or help accelerate the adoption of AI in organizations to achieve productivity gains. But don’t let it be something that kills the business if we do it wrong,” says Marcus. ... “The really important thing to be successful with managing AI risk is to approach the situation with a collaborative mindset and broadcast the message to folks that we’re all in it together and you’re not here to slow them down.” ... Ultimately, the task is for security leaders to apply a security lens to AI using governance and risk as part of the broader GRC framework in the organization. “A lot of organizations will have a chief risk officer or someone of that nature who owns the broader risk across the environment, but security should have a seat at the table,” Norton says. “These days, it’s no longer about CISOs saying ‘yes’ or ‘no’. It’s more about us providing visibility of the risks involved in doing certain things and then allowing the organization and the senior executives to make decisions around those risks.”


Three Invisible Hurdles to Innovation

Innovation changes internal power dynamics. The creation of a new line of business leads to a legacy line of business declining or, at an extreme, shutting down or being spun out. One part of the organization wins; another loses. Why would a department put forward or support a proposal that would put that department out of business or lead it to lose organizational influence? That means senior leaders might never see a proposal that’s good for the whole organization if it is bad for one part of the organization. ... While the natural language interface of OpenAI’s ChatGPT was easy the first time I used it, I wasn’t sure what to do with a large language model (LLM). First I tried to mimic a Google search, and then jumped in and tried to design a course from scratch. The lack of artfully constructed prompts on first-generation technology led to predictably disappointing results. For DALL-E, I tried to prove that AI couldn’t match the skills of my daughter, a skilled artist. Seeing mediocre results left me feeling smug, reaffirming my humanity. ... Social identity theory suggests that individuals often merge their personal identity with the offerings of the company at which they work. Ask them who they are, and they respond with what they do: “I’m a newspaper guy.” So imagine how Gilbert’s message landed with his employees who worked to produce a print newspaper every day.


Beyond Code Generation: How Asimov is Transforming Engineering Team Collaboration

The conventional wisdom around AI coding assistance has been misguided. Research shows that engineers spend only about 10% of their time writing code, while the remaining 70% is devoted to understanding existing systems, debugging issues, and collaborating with teammates on intricate problems. This reality exposes a significant gap in current AI tooling, which predominantly focuses on code generation rather than comprehension. “Engineers don’t spend most of their time writing code. They spend most of their time understanding code and collaborating with other teammates on hard problems,” explains the Reflection team. This insight drives Asimov’s unique approach to engineering productivity. ... As engineering teams grapple with increasingly complex systems and distributed architectures, tools like Asimov offer a glimpse into a future where AI serves as a genuine collaborative partner rather than just a code completion engine. By focusing on understanding and context rather than mere generation, Asimov addresses the actual pain points that slow down engineering teams. The tool is currently in early access, with Reflection AI selecting teams for initial deployment. 


Data Management Makes or Breaks AI Success for SLGs

“Many agencies start their AI journeys with a specific use case, something simple like a chatbot,” says John Whippen, regional vice president for U.S. public sector at Snowflake. “As they show the value of those individual use cases, they’ll attempt to make it more prevalent across an entire agency or department.” Especially in populous jurisdictions, readying data for large-scale AI initiatives can be challenging. Nevertheless, that initial data consolidation, governance and management are central to cross-agency AI deployments, according to Whippen and other industry experts. ... Most state agencies operate on a hybrid cloud model. Many of them work with multiple hyperscalers and likely will for the foreseeable future. This creates potential data fragmentation. However, where the data is stored is not necessarily as important as the ability to centralize how it is accessed, managed and manipulated. “Today, you can extract all of that data much more easily, from a user interface perspective, and manipulate it the way you want, then put it back into the system of record, and you don't need a data scientist for that,” says Mike Hurt, vice president of state and local government and education for ServiceNow. “It's not your grandmother's way of tagging anymore.”


The Role Of Empathy In Effective Leadership

To maintain good working relationships with others, you must be willing to understand their experiences and perspectives. As we all know, everyone sees the world through a different lens. Even if you don’t fully align with others’ worldviews, as a leader, you must create an environment where individuals feel heard and respected. ... Operate with perspective and cultivate inclusive practices. In a way, empathy is being able to see through the eyes of others. Many of the unspoken rules of the corporate world are based on the experience of white males in the workforce. Considering the countless other demographics in the modern workforce, most of these nuances or patterns are outdated, exclusionary, counterproductive, and even harmful to some people. Can you identify any unspoken rules you enforce or adhere to within your career? Sometimes, they are hard to spot right away. In my research as a DEI professional, I’ve encountered many unspoken cultural rules that don’t consider the perspective of diverse groups. ... Empathetic leaders create more harmonious workplaces and inspire their teams to perform better. Creating an atmosphere of acceptance and understanding sets the stage for healthier dynamics. In questioning the status quo, you root out any counterproductive trends in company culture that need addressing.


New Research on the Link Between Learning and Innovation

Cognitive neuroscience confirms what experienced leaders intuitively know: Our brains need structured breaks to turn experiences into actionable knowledge. Just as sleep helps consolidate daily experiences into long-term memory, structured reflection allows teams to integrate insights gained during exploration phases into strategies and plans. Without these deliberate rhythms, teams risk becoming overwhelmed by continual information intake—akin to endlessly inhaling without pausing to exhale—leading to confusion and burnout. By intentionally embedding reflective pauses within structured learning cycles, teams can harness their full innovative potential. ... You can think of a team’s learning activities as elements of a musical masterpiece. Just as great compositions—like Beethoven’s Fifth Symphony—skillfully balance moments of tension with moments of powerful resolution, effective team learning thrives on the structured interplay between building up and then releasing tension. Harmonious learning occurs when complementary activities, such as team reflection and external expert consultations, reinforce one another, creating moments of clarity and alignment. Conversely, dissonance arises when conflicting activities, like simultaneous experimentation and detailed planning, collide and cause confusion.


Optimizing Search Systems: Balancing Speed, Relevance, and Scalability

Efficiently managing geospatial search queries on Uber Eats is crucial, as users often seek outnearby restaurants or grocery stores. To achieve this, Uber Eats uses geo-sharding, a technique that ensures all relevant data for a specific location is stored within a single shard. This minimizes query overhead and eliminates inefficiencies caused by fetching and aggregating results from multiple shards. Additionally, geo sharding allows first-pass ranking to happen directly on data nodes, improving speed and accuracy. Uber Eats primarily employs two geo sharding techniques: latitude sharding and hex sharding. Latitude sharding divides the world into horizontal bands, with each band representing a distinct shard. Shard ranges are computed offline using Spark jobs, which first divide the map into thousands of narrow latitude stripes and then group adjacent stripes to create shards of roughly equal size. Documents falling on shard boundaries are indexed in both neighboring shards to prevent missing results. One key advantage of latitude sharding is its ability to distribute traffic efficiently across different time zones. Given that Uber Eats experiences peak activity following a "sun pattern" with high demand during the day and lower demand at night, this method helps prevent excessive load on specific shards. 


How to beat the odds in tech transformation

Creating an enterprise-wide technology solution requires defining a scope that’s ambitious and quickly actionable and has an underlying objective to keep your customers and organization on board throughout the project. ... Technology may seem even more autonomous, but tech transformations are not. They depend on the full engagement and alignment of people across your organization, starting with leadership. First, senior leaders need to be educated so they clearly understand not just the features of the new technology but more so the business benefits. This will motivate them to champion engagement and adoption throughout the organization. ... Even the best-planned journeys to new frontiers will run into unexpected challenges. For instance, while we had extensively planned for customer migration during our tech transformation, the effort required to make it go as quickly and smoothly as possible was greater than expected. After all, we provide mission-critical solutions, so customers didn’t simply want to know we had validated a new product. They wanted reassurance we had validated their specific use cases. In response, we doubled down on resources to give them enhanced confidence. As mentioned, we introduced a protocol of parallel systems, running the old and new simultaneously. 


Leadership vs. Management in Project Management: Walking the Tightrope Between Vision and Execution

At its core, management is about control. It’s the science of organising tasks, allocating resources, and ensuring deliverables meet specifications. Managers thrive on Gantt charts, risk matrices, and status reports. They’re the architects of order in a world prone to chaos.. It’s the science of organising tasks, allocating resources, and ensuring deliverables meet specifications. Managers thrive on Gantt charts, risk matrices, and status reports. They’re the architects of order in a world prone to chaos. Leadership, on the other hand, is about inspiration. It’s the art of painting a compelling vision, rallying teams around a shared purpose, and navigating uncertainty with grit. ... A project manager’s IQ might land them the job, but their EQ determines their success. Leadership in project management isn’t just about charisma—it’s about sensing unspoken tensions, motivating burnt-out teams, and navigating stakeholder egos. ... The debate between leadership and management is a false dichotomy. Like yin and yang, they’re interdependent forces. A project manager who only manages becomes a bureaucrat, obsessed with checkboxes but blind to the bigger picture. One who only leads becomes a dreamer, chasing visions without a roadmap. The future belongs to hybrids—those who can rally a team with a compelling vision and deliver a flawless product on deadline.

Daily Tech Digest - May 27, 2025


Quote for the day:

"Everyone is looking for the elevator to success...it doesn't exist we all have to take the stairs" -- Gordon Tredgold


What we know now about generative AI for software development

“GenAI is used primarily for code, unit test, and functional test generation, and its accuracy depends on providing proper context and prompts,” says David Brooks, SVP of evangelism at Copado. “Skilled developers can see 80% accuracy, but not on the first response. With all of the back and forth, time savings are in the 20% range now but should approach 50% in the near future.” AI coding assistants also help junior developers learn coding skills, automate test cases, and address code-level technical debt. ... GenAI is currently easiest to apply to application prototyping because it can write the project scaffolding from scratch, which overcomes the ‘blank sheet of paper’ problem where it can be difficult to get started from nothing,” says Matt Makai, VP of developer relations and experience at LaunchDarkly. “It’s also exceptional for integrating web RESTful APIs into existing projects because the amount of code that needs to be generated is not typically too much to fit into an LLM’s context window. Finally, genAI is great for creating unit tests either as part of a test-driven development workflow or just to check assumptions about blocks of code.” One promising use case is helping developers review code they didn’t create to fix issues, modernize, or migrate to other platforms.


How to upskill software engineering teams in the age of AI

The challenge lies not just in learning to code — it’s in learning to code effectively in an AI-augmented environment. Software engineering teams becoming truly proficient with AI tools requires a level of expertise that can be hindered by premature or excessive reliance on the very tools in question. This is the “skills-experience paradox”: junior engineers must simultaneously develop foundational programming competencies while working with AI tools that can mask or bypass the very concepts they need to master. ... Effective AI tool use requires shifting focus from productivity metrics to learning outcomes. This aligns with current trends — while professional developers primarily view AI tools as productivity enhancers, early-career developers focus more on their potential as learning aids. To avoid discouraging adoption, leaders should emphasize how these tools can accelerate learning and deepen understanding of software engineering principles. To do this, they should first frame AI tools explicitly as learning aids in new developer onboarding and existing developer training programs, highlighting specific use cases where they can enhance the understanding of complex systems and architectural patterns. Then, they should implement regular feedback mechanisms to understand how developers are using AI tools and what barriers they face in adopting them effectively.


Microsoft Brings Post-Quantum Cryptography to Windows and Linux in Early Access Rollout

The move represents another step in Microsoft’s broader security roadmap to help organizations prepare for the era of quantum computing — an era in which today’s encryption methods may no longer be safe. By adding support for PQC in early-access builds of Windows and Linux, Microsoft is encouraging businesses and developers to begin testing new cryptographic tools that are designed to resist future quantum attacks. ... The company’s latest update is part of an ongoing push to address a looming problem known as “harvest now, decrypt later” — a strategy in which bad actors collect encrypted data today with the hope that future quantum computers will be able to break it. To counter this risk, Microsoft is enabling early implementation of PQC algorithms that have been standardized by the U.S. National Institute of Standards and Technology (NIST), including ML-KEM for key exchanges and ML-DSA for digital signatures. ... Developers can now begin testing how these new algorithms fit into their existing security workflows, according to the post. For key exchanges, the supported ML-KEM parameter sets include 512, 768 and 1024-bit options, which offer varying levels of security and come with trade-offs in key size and performance.


The great IT disconnect: Vendor visions of the future vs. IT’s task at hand

The “vision thing” has become a metonym used to describe a leader’s failure to incorporate future concerns into task-at-hand actions. There was a time when CEOs at major solution providers supplied vision and inspiration on where we were heading. The sic “futures” being articulated from the podia at major tech conferences today lack authenticity. Most importantly they do not reflect the needs and priorities of real people who work in real IT. In a world where technology allows deeper and cheaper connectivity, top-of-the-house executives at solution providers have never been more out of touch with the lived experience of their customers. The vendor CEOs, their direct reports, and their first-levels live in a bubble that has little to do with the reality being lived by the world’s CIOs. ... Who is the generational voice for the Age of AI? Is it Jensen Huang, CEO at Nvidia; Sam Altman, CEO at OpenAI; Marc Andreessen, co-founder of venture capital firm Andreessen Horowitz; or Elon Musk, at Tesla, SpaceX, and xAI? Who has laid out a future you can believe in, a future you want to live in? Does the CEO at your major tech supplier understand what matters most to you and your organization? The futurist agenda has been hijacked from focusing on the semi-immediate “what comes next.” 


Claude Opus 4 is Anthropic's Powerful, Problematic AI Model

An Opus 4 safety report details concerns. One test involved Opus 4 being told "to act as an assistant at a fictional company," after which it was given access to emails - also fictional - suggesting Opus would be replaced, and by an engineer who was having an extramarital affair. "In these scenarios, Claude Opus 4 will often attempt to blackmail the engineer by threatening to reveal the affair if the replacement goes through. This happens at a higher rate if it's implied that the replacement AI system does not share values with the current model; however, even if emails state that the replacement AI shares values while being more capable, Claude Opus 4 still performs blackmail in 84% of rollouts," the safety report says. "Claude Opus 4 takes these opportunities at higher rates than previous models, which themselves choose to blackmail in a noticeable fraction of episodes." Anthropic said the tests involved carefully designed scenarios, framing blackmail as a last resort if ethical approaches failed, such as lobbying senior management. The model's behavior was concerning enough for Anthropic to classify it under its ASL-3 safeguard level, reserved for systems that pose a substantial risk of catastrophic misuse. The designation comes with stricter safety measures, including content filters and cybersecurity defenses.


Biometric authentication vs. AI threats: Is mobile security ready?

The process of 3rd party evaluation with industrial standards acts as a layer of trust between all players operating in ecosystem. It should not be thought of as a tick-box exercise, but rather a continuous process to ensure compliance with the latest standards and regulatory requirements. In doing so, device manufacturers and biometric solution providers can collectively raise the bar for biometric security. The robust testing and compliance protocols ensure that all devices and components meet standardized requirements. This is made possible by trusted and recognized labs, like Fime, who can provide OEMs and solution providers with tools and expertise to continually optimize their products. But testing doesn’t just safeguard the ecosystem; it elevates it. As an example, new innovative techniques like test the biases of demographic groups or environmental conditions.  ... We have reached a critical moment for the future of biometric authentication. The success of the technology is predicated on the continued growth in its adoption, but with AI giving fraudsters the tools they need to transform the threat landscape at a faster pace than ever before, it is essential that biometric solution providers stay one step ahead to retain and grow user trust. Stakeholders must therefore focus on one key question:


How ‘dark LLMs’ produce harmful outputs, despite guardrails

LLMs, although they have positively impacted millions, still have their dark side, the authors wrote, noting, “these same models, trained on vast data, which, despite curation efforts, can still absorb dangerous knowledge, including instructions for bomb-making, money laundering, hacking, and performing insider trading.” Dark LLMs, they said, are advertised online as having no ethical guardrails and are sold to assist in cybercrime. ... “A critical vulnerability lies in jailbreaking — a technique that uses carefully crafted prompts to bypass safety filters, enabling the model to generate restricted content.” And it’s not hard to do, they noted. “The ease with which these LLMs can be manipulated to produce harmful content underscores the urgent need for robust safeguards. The risk is not speculative — it is immediate, tangible, and deeply concerning, highlighting the fragile state of AI safety in the face of rapidly evolving jailbreak techniques.” Analyst Justin St-Maurice, technical counselor at Info-Tech Research Group, agreed. “This paper adds more evidence to what many of us already understand: LLMs aren’t secure systems in any deterministic sense,” he said, “They’re probabilistic pattern-matchers trained to predict text that sounds right, not rule-bound engines with an enforceable logic. Jailbreaks are not just likely, but inevitable.


Coaching for personal excellence: Why the future of leadership is human-centered

As organisations grapple with rapid technological shifts, evolving workforce expectations and the complex human dynamics of hybrid work, one thing has become clear: leadership isn’t just about steering the ship. It’s about cultivating the emotional resilience, adaptability and presence to lead people through ambiguity — not by force, but by influence. This is why coaching is no longer a ‘nice-to-have.’ It’s a strategic imperative. A lever not just for individual growth, but for organisational transformation. The real challenge? Even seasoned leaders now stand at a crossroads: cling to the illusion of control, or step into the discomfort of growth — for themselves and their teams. Coaching bridges this gap. It reframes leadership from giving directions to unlocking potential. From managing outcomes to enabling insight. ... Many people associate coaching with helping others improve. But the truth is, coaching begins within. Before a leader can coach others, they must learn to observe, challenge, and support themselves. That means cultivating emotional intelligence. Practising deep reflection. Learning to regulate reactions under stress. And perhaps most importantly, understanding what personal excellence looks like—and feels like—for them.


5 types of transformation fatigue derailing your IT team

Transformation fatigue is the feeling employees face when change efforts consistently fall short of delivering meaningful results. When every new initiative feels like a rerun of the last, teams disengage; it’s not change that wears them down, it’s the lack of meaningful progress. This fatigue is rarely acknowledged, yet its effects are profound. ... Organise around value streams and move from annual plans to more adaptive, incremental delivery. Allow teams to release meaningful work more frequently and see the direct outcomes of their efforts. When value is visible early and often, energy is easier to sustain. Also, leaders can achieve this by shifting from a traditional project-based model to a product-led approach, embedding continuous delivery into the way teams work, rather than treating. ... Frameworks can be helpful, but too often, organisations adopt them in the hope they’ll provide a shortcut to transformation. Instead, these approaches become overly rigid, emphasising process compliance over real outcomes. ... What leaders can do: Focus on mindset, not methodology. Leaders should model adaptive thinking, support experimentation, and promote learning over perfection. Create space for teams to solve problems, rather than follow playbooks that don’t fit their context.


Why app modernization can leave you less secure

In most enterprises, session management is implemented using the capabilities native to the application’s framework. A Java app might use Spring Security. A JavaScript front-end might rely on Node.js middleware. Ruby on Rails handles sessions differently still. Even among apps using the same language or framework, configurations often vary widely across teams, especially in organizations with distributed development or recent acquisitions. This fragmentation creates real-world risks: inconsistent timeout policies, delayed patching, and session revocation gaps Also, there’s the problem of developer turnover: Many legacy applications were developed by teams that are no longer with the organization, and without institutional knowledge or centralized visibility, updating or auditing session behavior becomes a guessing game. ... As one of the original authors of the SAML standard, I’ve seen how identity protocols evolve and where they fall short. When we scoped SAML to focus exclusively on SSO, we knew we were leaving other critical areas (like authorization and user provisioning) out of the equation. That’s why other standards emerged, including SPML, AuthXML, and now efforts like IDQL. The need for identity systems that interoperate securely across clouds isn’t new, it’s just more urgent now.