November 20, 2015

How DIY Could Help User Adoption of Big Data

What could we do to create a breakthrough? Could the DIY movement be brought to the Big Data & Analytics area? It has certainly worked in some other areas. For instance, the 3D printing business. Of course, 3D printing had already been invented and was in existence, but the start of the DIY 3D printing race really made it possible for this business to flourish. It’s funny to notice that it was spurred by the possibilities from crowd-funding, making it possible for the first DIY 3D print companies to start building their business. A great documentary call ‘Print the Legend’ is available on Netflix, in case you are interested to know more. The same goes for Internet of Things (IoT). One could argue that IoT is no longer a new thing, but to many it is still a starting business.


More Efficient I/Os Through Read/Write Optimization

Morin first took a few moments to speak about V-Locity, what the company describes as "I/O Reduction Software." The product appears to aggregate I/O from Windows and virtual machine (VM) software from VMware and Microsoft and then optimize storage reads and writes. The product does this by gathering up small I/O requests and making the system read and write larger amounts of data in a single I/O. It also more intelligently places data, rather than using the first available space. ... By optimizing writes to be written in a more contiguous fashion, the size of an I/O consistently increases. In other words, instead of writing four 4Kb blocks of a 16Kb file, V-locity enables the system to write a single 16Kb write, requiring a single I/O operation.


Developers First Line of Defense When Adopting DevOps

The DevOps movement essentially stems from the agile development movement. "Agile is working," Randell said. "Three quarters of [development] teams are doing some kind of agile. It comes down to the focus on delivering to the users. It's not a one size fits all situation." Development teams are now the first line of defense for effective and smooth-running apps, Randell added. The move to DevOps has changed the app testing process. Testing now becomes embedded into the development teams as part of the process. By iterating frequently and delivering rapidly, apps are tested and debugged on a more continual basis. "It really does turn DevOps into a machine," Jones said, noting even Microsoft no longer has a QA department which has led to the delivery of new code to fix bugs faster.


What Makes Joy,Inc Work? Part 3 – High-Tech Anthropology

Putting the ultimate user of the product front and centre results in a focus on making products people want to use, and High Tech Anthropology® (HTA) is considered to be the key to how they achieve this. HTA is an approach to user needs identification, requirements elicitation and product design that draws elements from a variety of existing disciplines and adds some Menlo-specific tools and approaches. As with the other Menlonian practices, it sits atop the solid foundation of the Menlo culture – collaboration, trust, respect and teamwork are baked in from the beginning. Without this solid foundation the practices would not work. The underlying culture is the secret sauce of Menlo Innovation’s success.


8 more years of leap-second problems loom; governments punt decision to 2023

The recommended way of dealing with the leap second is to stop the clock for a second, but on a computer, that's not practical: The computer and its clock will keep running and have to be jumped back, with the same second seemingly occurring twice -- a chance for high-frequency stock traders in Asia and California to make -- or lose -- a fortune. Software, then, must deal with the consequences of that repeated second, or find a way to fake it, perhaps by gradually adjusting the clock over the last few minutes of the day. But the sheer variety of clever ways to handle the extra second is part of the problem, as systems using different methods drift slowly out of sync with one another before slowly realigning once again.


Delving into an enterprise IoT initiative? Read this first

Monsanto's enterprise IoT strategy started as a way to reduce inefficiencies in its supply chain, such as preventing seed loss. Seeds that experience heat stress, for example, are unlikely to germinate. By outfitting the semi-trucks that transport seed from fields to processing facilities with sensors that measure temperature and geolocation, Monsanto's IT department was able to build a virtual window into the transportation environment. Doing so gave the business an advantage: "Now, with IoT, if our grain gets heat stressed, we can dynamically route it to cooling centers or route it to the front of a receiving line to get the grain processed," said Fred Hillebrandt, infrastructure architect at the agro-chemical and technology company in St. Louis.


Mastering the Finer Points of Big Data Success

What many companies are experiencing is a gap between their investments in the underlying technologies of Big Data, and the anticipated benefits. The macro trends across many industries around challenged sales growth, margins, and consumer loyalty reflect this reality. The gap looks a bit differently between companies at the bleeding edge of adoption and those just beginning their journeys. Yet there is one thing in common between the two: wide-ranging views on what Big Data represents in terms of value creation and how it fits within the organization. CEOs and their leadership teams have enough to worry about and focus on, without getting into the weeds of Big Data technologies.


Why Apple keeps its distance from enterprise IT (and why it works)

Blau cites BlackBerry as an example. "Even though [BlackBerry] still seemingly has fairly decent enterprise support today, it's not enough," says Blau. "You have to have that whole ecosystem." Angela Yochem, CIO of logistics and transportation company BPD International, says third-party partnerships are almost always a good thing for enterprise vendors. "These partnerships allow enterprise customers to benefit from innovations and support structures well outside of a single vendor capability." Apple is similar to Google in this regard. Both companies focus on what they do best, instead of "customizing elaborate support models and relationship management teams for major customers," Yochem says. "Consumers and enterprise customers alike are becoming more comfortable with this sort of constrained model."


Larry Wall's programmer virtues and 'vices'

The lazy man figured out ways to eliminate wasteful movements, conserve energy and still get the job done. "If necessity is the mother of invention, then maybe laziness is the mother of innovation," he said. One of the ways CIOs can encourage laziness? Brian encouraged CIOs to embrace the DRY principle -- Don't Repeat Yourself. Automate what you can so that employees can devote time to the most important problems. ... "Impatience leads to better tools," Brian said. "We get impatient with the tools we have, so we build a better one, and it solves the problem in a better way." That's also why impatience benefits from laziness and hubris, characteristics that can ensure the business doesn't take on too much technical debt.


Investigating Data Scientists, their Skills and Team Makeup

Understanding data is about extracting insights from the data to answer questions that will help executives drive their business forward. Do we invest in products or services to improve customer loyalty? Would we get greater ROI by hiring more staff or invest in new equipment? Getting insights from data is no simple task, often requiring data science experts with a variety of different skills. Many pundits have offered their take on what it takes to be a successful data scientist. Required skills include expertise in business, technology and statistics. In an interesting study published by O'Reilly, researchers (Harlan D. Harris, Sean Patrick Murphy and Marck Vaisman) surveyed several hundred practitioners, asking them about their proficiency in 22 different data skills.



Quote for the day:


"Opportunity always involves some risk. You can?t steal second base & keep your foot on first!" ~ Joseph Helle


November 19, 2015

Power To The People: Stop Thinking Of Them As Users

Users are people. Treat them like people. The makers of apps and operating systems, media and television tend to forget this principle. Why? Because to truly acknowledge that users are people and not just big numbers on a spreadsheet is to acknowledge that people are individuals with vast diversity of cultures, needs, opinions wants, hopes and fears. The uniqueness of people is a messy business and individuals don’t scale. ... The term user was distinguished the actor—end user—of the software from the people that created, often known as developers. The user was synonymous with the word “operator.” User specifically meant a human. Systems where the primary actors were other machines or pieces of software do not classify the other operators as users.


Forget Big Data, use "Little Data" instead

To help reconnect with other humans, rather than treat customers as a data point in the Big data pile, we should add a personal touch via "little data", which is personal, specific information. "I wouldn't be surprised if $1bn is wasted on Big Data this year," he said, adding: "Little Data often makes the most magic. Big Data is about a pattern… but Little Data is about a person." While he admitted Big Data has huge potential -- he pointed to medical research as an example -- but said companies shouldn't ignore personal information they have on customers. "Creating magic for customers often costs nothing," he said. "It's the Little Data, and Little Data is almost free." He pointed to BA, which sent him a personalised email asking why he always books one-way trips rather than returns -- it's because of his work travel.


Why AI could destroy more jobs than it creates, and how to save them

Brynjolfsson identifies various astonishing technologies lining up to encroach on human labour. Take Rethink Robotics' Baxter, a robotic humanoid torso complete with arms, claw-like grips and a head with an LCD face. Baxter is designed to replace factory line workers employed in repetitive but as-yet-unautomated tasks, such as inserting large components into circuit boards. Baxter can be trained to carry out new jobs far more simply than its robotic predecessors, primarily by taking its arm and guiding it to where it needs to pick up and drop items. His 'hands' can be swapped out for suctions cups or different grippers to allow him to take on different tasks.


In The Cloud, The Big Get Bigger

As cloud computing moved into the mainstream, some smaller cloud providers and wanna-be suppliers were acquired. In May, EMC bought Virtustream; ActiveState sold its PaaS system, Stackato, to HP in July; HP also bought Amazon API look-alike Eucalyptus Systems in September 2014. OpenStack vendor Piston Cloud Computing was acquired by Cisco in January; GoGrid was purchased by Datapipe the same month. The consolidation continues apace, with the table stakes growing each month for what it takes to become a global cloud provider. "The consolidation and shakeout will accelerate in 2016, which will force many current providers to refocus on a narrower field, retreat from cloud or exit," Forrester said.


Is Microsoft Azure PCI DSS Compliane?

Not allowing users to change logging entries is one thing. Maintaining log file integrity is a completely different thing. If there is failure here for a QSA and/or Microsoft to misunderstand a simple PCI DSS control like this, what else is wrong? Have the compensating controls been understood correctly? So. Is Microsoft Azure PCI DSS Compliant? Some of it might be, some of it definitely isn’t (according to the data above), and to date I haven’t been able to find any formal documentation that assures me, a seasoned Qualified Security Assessor, that any of the services you can buy from Azure have been correctly validated. If you decide to host your CDE or parts of it in Azure, do so at your own risk.


The Entrepreneur’s Guide To Surviving A Tech Bubble

We’re in a cycle — I don’t believe in the questions about the bubble. I think cycles come and get a little overheated. It’s more like a deflation: How much air comes out of the balloon versus the balloon actually popping? While the market is never in equilibrium, the public and private markets have different variables driving their valuations. Once companies go public, there is a change in how people value them. Pre-IPO, they are judged by their potential and then post, they are judged by their performance. Unfortunately, the performance of those companies don’t always back up their valuations. Today, public markets are demanding sustainable business models before allowing companies to go public, while in the past companies often went public without the need to prove their model out.


Dell Pushing Advanced Scale to the Enterprise

If supercomputers are the spearhead of advanced computing, the slowdown in Moore’s Law has flattened the spear tip just as the enterprise’s need for advanced computing has grown. Result: Some of the grandeur has slipped from the TOP500 and making the list is not the badge of glory it once was. Ganthier said, “It’s kind of starting to run its course because standing up [in the TOP500] is just a beauty contest.” The real action, Dell is betting, is putting HPC to work. He said Dell wouldn’t walk away from the TOP500 – there were 13 Dells on the list this year – but it wasn’t a priority. In implementing this strategy, Turkel said Dell wants to replicate in the HPC sphere what the company did to the PC market starting in the late 1980s and later on with X86 servers – ease and broaden market acceptance of technology.


The Amazing Ways Shell Uses Analytics to Drive Business Success

Of course, we’ve long been conscious of the fact that we could eventually use up all of the non-renewable oil and gas buried under the earth – perhaps sooner than we think. While this is an environmental concern to us all, it’s a financial one to companies like Shell. Dwindling reserves mean the cost of getting at what is available goes up, as they are forced to look deeper underground in ever more remote locations. One alternative is offered by the growing hope that “unconventional resources”, such as shale gas and tight oil will fill the gap. These resources, trapped in shale and sandstone, now supply 20% of the gas used in the USA and their use is expanding rapidly around the globe.


Blockchain Revolution Butts Head With Creaky Banking Pay Systems

“The payments leg is some of the real difficulty here,” he said in an interview. The services that move cash between financial firms and their customers “are all running lagged systems and none of them communicate efficiently,” he said. “We need everyone else to catch up to us.” ItBit is one of dozens of new companies seeking to use blockchain technology to revolutionize back-office functions for markets ranging from commodities to loans to bonds. Wall Street firms see the technology as a way to reduce costs and increase efficiency as they face stricter regulatory requirements following the 2008 financial crisis. While trading in stocks or derivatives is done in milliseconds, the verification and settlement of those transactions still take days.


Why Privacy Advocates Warn the Cybersecurity Bill Is a Mistake

"The first problem with CISA is that it has very weak front-end privacy protection," said Robyn Greene, policy counsel, New America's Open Technology Institute, a Washington think tank. "There's a low requirement for companies to remove unnecessary personally identifiable information from the information they want to share with the government." Under CISA, companies would only be required to remove PII if they know it is not directly related to a threat. The institute's position is that PII should be removed before sharing unless it is necessary to identify or protect against a threat. "Your personal information is personal and shouldn't be shared with the government or other companies unnecessarily," Greene said.




Quote for the day:

"Hard work spotlights the character of people: Some turn up their sleeves, some turn up their noses, and some don't turn up at all." -- Sam Ewing,


November 18, 2015

Thread – An Open Standard Protocol for Home Automation

The Thread architecture is built from ground up keeping device to device communication in mind. Since devices are creating a mesh, one particular malfunctioning device (called host) cannot bring the entire Thread network down. This is very similar to how the internet is made resilient – remember that it was designed to keep up communication while parts of it are failing. Moving to a mesh network topology makes home networks internet-grade. Thread is built on 6LowPAN (Low power Wireless Personal Area Networks) which lets IPv6 packets to be sent and received over wireless networks. This allows even small devices to be connected to the internet and thus actually create the Internet of Things.


AI technology: Is the genie (or genius) out of the bottle?

Needless to say, the early pioneers (as is typical) were a bit overly optimistic, although, in the bigger picture, perhaps not that much. The 1970s brought government funding cuts and the field went from the "Peak of Inflated Expectations" to the "Trough of Disillusionment," to use the modern vernacular of the Gartner Hype Cycle. During the 1980s, commercial success was achieved through the development of expert systems that enhanced knowledge and analytics capabilities, and the market grew to over $1 billion -- the "Slope of Enlightenment," literally and figuratively. Enthusiasm for AI was rekindled.


More women on tech boards, but industry lags

"A diverse board makeup improves employee morale and productivity and sends a message to employees throughout the organization that a company is committed to the advancement of women and minorities. At the same time, it enhances a company’s reputation and attractiveness at a time when many investors are increasingly using a variety of nonfinancial metrics, such as board diversity, as criteria in investment decision-making," Chiang wrote. The tech industry is wrestling with a chronic lack of diversity from the highest corporate ranks to the rank and file. New efforts are targeting the shortage of women at the top of the tech industry. Boardlist, for example, is a database that privately held companies can search to find female candidates to fill open board seats.


Decoding DevOps: a Management Primer

The good news is most organizations are willing to share their own best practices; the bad news is that most development teams are already understaffed and as a result, there is very little time for admins to think about, build, test, optimize and implement all the changes that are required to successfully move to a DevOps process. That includes not only taking the time to learn about the process, but also deciding how to realign existing processes and skills to fit a new DevOps model. One should not underestimate the required change in culture to adopt the new mindset, either. For most organizations and IT decision makers, these challenges are likely off-putting and intimidating.


New, Better Way to Search for Technology

The scout can strategically search for offerings to minimize the evaluation effort without eliminating the unknown unknowns. Rather than using typical Internet searches that don’t find everything, federated search explores sources simultaneously in real time. While only a small percentage of the web’s technical content is crawled and available via Google, Deep Web searches uncover and expose the desired information. Federated search automatically pulls data from multiple sites — such as patent, publication, expertise, and invention databases — to find the content hidden below the surface. Without it, users have to manually enter submission forms for each individual search site which is very time consuming.


Amazon: An Evil Empire dawns on the Internet of Things

Amazon has hardly been open to allowing 3rd parties access to the Prime APIs for playing music -- for example, SONOS cannot play Amazon Prime Music content. iOS and Android can do it, but in this case, Amazon controls the app in question, and Prime exists outside of both Apple and Google's in-app purchasing rules, as it is a yearly subscription purchased directly from Amazon. What we're seeing here is the beginnings of an Internet of Things Evil Empire. An empire that wants to control not just the content you consume, and what cloud infrastructure you use, but also the devices you are allowed to buy that consume that content and use that infrastructure. One could make the argument that Apple with iOS does the exact same thing. But at its core, Apple is a devices company that has a brick and mortar retail presence, that just so happens to have a content cloud.


The Right Way to Scale Agile: Scaling Value Delivery over Process

One of the key tenets of the Agile Manifesto is "individuals and interactions over processes and tools". Another critical piece of the Manifesto states that to be agile, software professionals or organizations should focus on "responding to change over following a plan". With any piece of writing, interpretations may vary, but it's pretty rational to take these tenets as meaning organizations need to lead with people, deliver value, and collaborate instead of following a closely prescribed scaled agile process. It sounds easy enough, but really changing the way you work is easier said than done. When you design your workflow process, you should remember that how you do something is just means to an end and it’s the underlying reasons that are important.


Security Trends That Will Impact Your Data In 2016

As expected, technology forecasts and predictions for 2016 continue to come into Information Management at a brisk pace now, with the latest concerning data protection and cybersecurity. Haiyan Song, senior vice president, security markets, at Splunk, offered Information Management her thoughts this week on what will be the top security trends that data professionals and cybersecurity managers need to be aware of. Splunk is a market-leading platform that powers operational intelligence. ... Song notes that cyber-attacks have historically caused little physical damage, but “the proliferation of IoT will cause more disruption and actual physical damage versus just hardware and software disruption,” she says.


What the JPMorgan Chase Breach Teaches Us

"We simply are not doing enough to protect data," Easttom says during this interview with Information Security Media Group. "Having data sitting on a server unencrypted is an egregious omission in the security posture. ... Unfortunately, there are lots of companies, not just banks - healthcare, hospitals, all sorts of organizations - that have, frankly, too low of a security posture." Organizations have to get ahead of regulatory mandates and make cybersecurity part of their overall corporate strategy, with understanding and buy-in from the top, he says. "Organizations don't have to wait for regulation," Easttom says. "They need to start bringing security to the forefront of all their conversations ... and those conversations need to be at the highest level."


5 Ways to Create a Culture of Analytics Within Your Company

Leading companies don’t make decisions based on their gut, they use data to drive answers. Once you can understand and dissect the data presented, you can use the numbers for more than just simple performance tracking. The 2015 State of Analytics survey reveals that high-performing teams are 4.6x more likely to say they’ve moved beyond using data to keep score and onto using data to drive business decisions. The most popular ways businesses use data today are for ‘driving operational efficiencies’ (37%), ‘facilitating growth’ (37%), ‘optimizing operational processes’ (35%) and ‘Improving existing products, services and features’ (35%). When planning the success and growth of your business, make sure your company is making smart decisions based on real data insights.



Quote for the day:


"You cannot swim for new horizons until you have courage to lose sight of the shore." -- William Faulkner,


November 17, 2015

A Manual for the Data-Driven Finance Chief

The quicker CFOs can uncover insights, the quicker they can make insight-driven decisions and take actions that can improve the company’s performance. But while technology is getting faster (and cheaper), some companies are struggling to move their organizations at an equivalent pace. One of the best ways to overcome this challenge is by implementing an agile analytics operating model. With greater analytics agility, a CFO can help his or her company transform into an insight-powered enterprise that can defend, differentiate, and disrupt in its market. ... Talent in financial organizations today is primarily skilled in the areas of financial management and planning. With the opportunity that data insights can offer a business, CFOs could look to transform this talent pool into a digital workforce.


Enterprise security for our mobile-first, cloud-first world

Extending Microsoft’s security commitment to customers, we also announced the Microsoft Enterprise Cybersecurity Group (ECG). This dedicated group of worldwide security experts delivers security solutions, expertise and services that empower organizations to modernize their IT platforms, securely move to the cloud and keep data safe. ECG offers security assessments, provides ongoing monitoring and threat detection, and incident response capabilities. ECG helps customers take advantage of Microsoft’s best-in-class security and privacy technologies to optimize their investments and confidently advance their security postures.


Tor Project Claims FBI Paid Carnegie Mellon $1 Million To Deanonymize Tor Users

A few weeks before the big Black Hat Conference in 2014, it was announced that a planned presentation from two Carnegie Mellon University researchers (Michael McCord and Alexander Volynkin), entitled "You Don't Have to be the NSA to Break Tor: Deanonymizing Users on a Budget" was pulled from the program, leading to lots and lots of speculation about what happened. Soon after this, the Tor Project announced it had discovered a group of relays that appeared to trying to deanonymize Tor users who were operating Tor hidden services.  A few months after this, the FBI and Europol suddenly took down a bunch of darknet sites and arrested people accused of running them (calling it "Operation Onymous") -- including arresting a guy named Blake Benthall for running Silk Road 2.0.


Why the CIA wanting encryption backdoors is a failure of leadership

Wired's Kim Zetter, who wrote a strong rebuttal of the anti-encryption brigade's controlled and often contradictory rhetoric, pointed to vague comments made by incumbent CIA director John Brennan, who said on Monday: "There are a lot of technological capabilities that are available right now that make it exceptionally difficult, both technically as well as legally, for intelligence and security services to have the insight they need to uncover it. I do think this is a time for particularly Europe, as well as here in the United States, for us to take a look and see whether or not there have been some inadvertent or intentional gaps that have been created in the ability of intelligence and security services to protect the people that they are asked to serve."


Everything as a Service (XaaS) Case Studies in the New IoT Economy

With wide acceptance and large-scale adoption of cloud solutions, the race is on to innovate new products and services at all levels. Each year, hundreds of innovative companies will quickly bring services and applications to market, delivered on established cloud platforms. The cloud facilitates rapid development by making it possible to integrate technologies easily across a platform. There’s no need to reinvent the wheel for all types of functionality needed to support a new service delivery. Instead, businesses are able to concentrate on developing disruptive technology to meet a specific business or industry need, while partnering with other cloud companies to handle things on the backend, such as billing, accounting, order management, or customer relations.


Electromagnetic Pulse weapons could knock enterprises offline

The effect would be that the enterprise would be immediately shutdown and become inoperable. “Anything to do with circuit boards and electronic technology would be blown out unless it is hardened,” says Fleming. Hardened electronics require features such as heavy wiring and additional capacitors to withstand the EMPs and absorb the energy enough to at least come back up after the attack. Since to date EMP attacks have been highly unlikely, such expensive electronics hardening is extremely uncommon even though the impact of an EMP attack would be severe. The nation’s defenses are secure. NORAD has taken preventive measures to protect its technology.


FTC Scrutinizes Cross-Device Tracking, Possible Privacy Issues

Modern online tracking techniques make the browser cookie look "pretty wonderful," said Joseph Lorenzo Hall, chief technologist and director of the Internet Architecture Project at the Center for Democracy & Technology, at a Federal Trade Commission workshop on cross-device tracking. Hall pointed to audio beacons as an example of an advertising technology that makes past privacy debates about cookies seem quaint by comparison. Audio beacons play ultrasonic sounds when an ad appears on a smartphone, computer, or TV, to communicate that event covertly to nearby devices running software designed to listen for such signals. They represent the ad industry's latest attempt to develop reliable ways to track people online.


Effective cyber risk management: An integrated approach

Even though ‘getting hacked’ may seem inevitable, by taking an integrated approach to risk management, cybersecurity risk can be effectively managed. The risk process must be ongoing and iterative, and not a one-time, infrequent, or ‘check the-box’ activity. Not only must the right stakeholders be engaged at the right levels within an organization, but the right automated tools and processes must also be in place to support risk decision-making and monitoring. It’s important to note that accountability does not lie with just one person (e.g. the chief information officer (CIO) or chief information security officer (CISO)); only an integrated approach to risk management will ensure that a company’s cybersecurity risk is managed effectively.”


How to create successful business intelligence – A supply chain approach to Big Data

From a technology standpoint, in order to deliver BI that can quickly adapt to the changing needs of the business a new approach to how data is delivered is required. A new concept that is gaining traction in the business world is viewing data delivery as akin to a supply chain. Currently this is not how most data is accessed and delivered. At the moment, data architectures tend to be hierarchical and facilitated by process. In order to accelerate data delivery, a linear approach is required, essentially the creation of a data and insights supply chain to the business. Current business intelligence systems are most often used to report on the historical state of the business as opposed to being used for demand planning.


Preparing IT systems and organizations for the Internet of Things

The transition from a traditional enterprise IT architecture to one optimized for the Internet of Things will not be easy. Elements of companies’ current technology stacks may need to be redesigned so they can support billions of interdependent processing events per year from millions of products, devices, and applications. Because networked devices are always on, companies must be able to react to customer and system requests in real time; agile software development and delivery will therefore become a critical competency. Seamless connectivity will also become a must-have, as will collaboration across IT and business units, which have traditionally been siloed. Moreover, companies must be able to securely and efficiently collect, analyze, and store the data emerging from these refined IT architectures.



Quote for the day:


"Action is not about talking. It's about how you are listened to." -- Bob Dunham


November 16, 2015

Encryption is not the enemy: A 21st century response to terror

Any time a back door or a pre-built vulnerability is left in a system (let's say, like our phone operating systems), it weakens everyone's safety. Sure, it might give some governments a temporary advantage, but it's far more likely that hackers and terrorists themselves will use these vulnerabilities to further cause damage to citizens or, at the very least, steal their personal and financial data. And lest any policy-makers reading this think, "Well, it'll be safe because we'll safeguard the keys," let me point out the elephant in the room: the United States Office of Personnel Management (OPM) was systematically penetrated and deflowered to such a complete and damaging degree that the actual fingerprints of U.S. government officials with high-level security clearances were exfiltrated with the alacrity of water entering a submarine with a screen door.


Inside Mark Zukerberg's Bold Plan for the Future of Facebook

"There are different ways to do innovation," he says, drawing a stark contrast without ever mentioning Page, Google, or Alphabet. "You can plant a lot of seeds, not be committed to any particular one of them, but just see what grows. And this really isn’t how we’ve approached this. We go mission-first, then focus on the pieces we need and go deep on them, and be committed to them." Facebook’s mission is "to give everyone in the world the power to share and make the world more open and connected," as Zuckerberg says, explaining that he is now spending a third of his time overseeing these future initiatives. "These things can’t fail. We need to get them to work in order to achieve the mission."


Apple says the iPad Pro is built for business

Business and creative functions such as graphics design and photo and video editing aren’t exactly foreign to Apple’s tablet, but new accessories, apps and the additional data the iPad Pro’s larger screen accommodates, enable you to accomplish more of the work you’re likely to be conducting on computers today. The iPad Pro is a bridge into a new way of operating, says an Apple spokesman. The company tells CIO.com its goal is to give you tools that cause you to rethink how a touch-enabled environment might apply to you and the way you work. The device won’t meet the needs of all businesses and their respective employees’ preferences, of course, but the company says advancements in the iPad Pro will give workers a new opportunity to reflect on what they use for work and whether the new iPad is a fit for their work life.


8 Biggest Cloud Mistakes Companies Make

According to a recent report by Harvard Business Review and Verizon, 84% of the IT and business executives polled said their use of cloud had increased in the past year, with 39% reporting it increased significantly. Another 40% said the cloud had increased their revenue, and 36% said it had increased their profit margin. These figures are sure to rise as more businesses discover the benefits of moving to the cloud, including lower capital and operating costs for data centers and improved application performance and resiliency. In addition, cloud usage is expanding to the nuts and bolts of IT operations, instead of an experimental thing. While initial cloud implementations focused on areas such as application development and sales force automation, more organizations now are exploring cloud for core business systems like supply-chain management and industry-specific services, such as financial applications or transportation management.


Analytics for Innovation: Why You Need to Read the External Signals

The market is moving faster than ever: consumer preferences are more dynamic, the rate of global innovation and technological development is incessant, and our current information methods can’t keep up with it. New players are threatening the status quo: Apple makes watches, Apparel companies are building wearable sensors, technology companies are building automobiles. Colliding worlds mean that traditional approaches to establishing market leadership and maintaining competitive advantage just aren’t working. ... Keurig got to the right product requirements eventually that hit on the major points – but now they are waiting on this in delay mode. Intelligence from external signals, up front, could have helped them avoid catastrophe in the first place, and more quickly bring them to the next opportunity that would address what consumers wanted.


Fact or Fiction? Reversing your PIN can call the police in an emergency

This urban legend is over a decade old and consistently makes it’s rounds on the Internet. Surprisingly, a lot of social media users care so much about this topic that they continually share this old tale with their friends, urging them to READ IT RIGHT AWAY! As it goes with all urban legends, there is a grain of truth in this myth. The idea of ’emergency code’ for ATMs had been hatched some time ago and is obviously where the myth originated. ... While it might save the victim’s money on the card, the method cannot take into account the behavior of the criminal. For example what if the enraged criminal hurts or kills the victim? Does this make the cost too high a price to pay? After all, the police might also not be on time to prevent the crime, so what’s the point then?


Create a data security culture to keep data safe

Sadly, there have been so many projects and deadlines that the organisation has given up keeping track of how every last piece of radioactive material is handled. Surely to track it all would be impossible anyway? In either case, most of the “legacy” is kept in a huge man-made lake outside. Nobody really knows what is in there. Those who do flag the hazards and suggest protections are routinely ignored or worse.  Enter your “comprehensive enterprise programme”. You’ve bought checklists with hundreds of predefined handling policies from outside experts. You’ve created a small team of dedicated personnel to audit and track every action for every employee on-site.


The Role of Specifications in Agile

That shared understanding and empathy for the target customer unlocks hidden bandwidth for product owners. They can focus on higher-level requirements and leave implementation details to the development team, who is fully equipped to do so – again, because of that shared understanding. ... User stories are the form that specifications take. Each user story is created in advance and placed in a backlog, but only the small set of the very next stories are flesh out in detail. Then, the level of detail is very high. Designs are included at this stage, and so are detailed descriptions of fine grained behavior like validation, individual errors messages, etc. Though the PM owns the user story, the team itself generates the detail through a processes called grooming.


Cyberspies inject victim profiling and tracking scripts in strategic websites

"We believe that the computer profiling data gathered by the WITCHCOVEN script, combined with the evercookie that persistently identifies a unique user, can -- when combined with basic browser data available from HTTP logs -- be used by cyber threat actors to identify users of interest, and narrowly target those individuals with exploits specifically tailored to vulnerabilities in their computer system," the FireEye researchers said in their report. The company has not detected any follow-up exploitation attempts against its customers so far, but this could be because the attackers use a highly targeted approach to victim selection. The subsequent exploits could be embedded in malicious documents attached to email spear phishing messages and not necessarily be served through a browser.


How to Build A Culture Primed to Perform

Here’s the kicker though: not all “whys” are created equal, and too often, cultures are designed to motivate using the destructive “whys.” Our answer is not only elegantly simple, but also empirically powerful. Using our total motivation framework, we’ve measured the motives of over 20,000 people at more than 50 major institutions. We’ve observed an incredibly strong relationship between their culture and performance metrics like sales and customer experience. In one study, employees with high levels of total motivation (or ToMo for short) generated 38% more in revenues than their low ToMo counterparts. Culture is an entirely quantifiable and engineerable asset—and the most important one. ToMo gives leaders the tools to unlock the highest levels of performance in their people and company.



Quote for the day:


"Bring the best of your authentic self to every opportunity." -- Brian Jantsch


November 15, 2015

Sick of apps, mice and menus? Finland's Solu might have an answer

It involves an all-you-can-eat software subscription and near unlimited storage. It is also blending Mozilla's HTML5-led approach with Firefox OS -- which it hoped to draw web developers to its open mobile platform -- and the path trodden by BlackBerry and Jolla, which developed their own OSes but equipped them to run Android apps. "We have a revenue-sharing model for our subscription a bit like Spotify, which is whenever people use your applications we pass on that subscription to the developers. This means that developers get money even by accident -- for example by users collaborating," Lawson said.


A Lifelong Learner’s Path from Library Science to Data Science

Kurt recognized that the entry level to math and software “is really boring, really difficult, and doesn’t have a lot of reward,” but he believes that: “one of the most dangerous things is the ingrained sense that I don’t know math, and can’t. The irony is when you look at the upper level advanced stuff in math, the skills needed are related to creative skills. The danger then becomes that the barriers of the tech industry keep the wrong people out. Poking at what’s happening and trying to find something more interesting about it fits both the mathematical and the creative mindset.”


OPNFV Won’t Be a Product

As to why OPNFV was even formed when there were already so many open source groups, Sen said NFV “brings stuff from all the other open source efforts. When we started, we thought we were building one platform, but it’s really a framework where you have a lot of choices.” Chris Wright, chief technologist with Red Hat, said network users’ expectations are being set by Internet companies where orders are self-service and immediate. “Tomorrow’s network is software-centric, with apps that scale out on-demand,” he said. However, network environments are much more complex than many of these Internet companies that have raised the bar.


CIOs receive low marks on IT reform report card

"This scorecard is not intended to be a juridical, prescriptive exercise. It should not be considered a scarlet letter on the back of a federal agency," says Rep. Gerry Connolly (D-Va.). "It is," he says, "an initial assessment, a point-in-time snapshot, much like the quarterly report card one might get from the university or at a school. The intent isn't to punish or stigmatize -- it is in fact to exhort and urge agencies to seize this opportunity and use the scorecard as a management tool to better guide decision making and investments within the agency." "To me the real measure will be six months or a year from now, did we really move the needle on these things?" says U.S. CIO Tony Scott.


Strong data security is not optional

A truly game-changing ruling in Remijas v. Neiman Marcus has made it easier for consumers to sue companies after breaches involving their personal data. Historically, even when sensitive information such as credit card numbers, birth dates, government ID numbers and medical records have been accessed, it’s been hard for consumers to sue companies over the breach. Companies have typically been able to avoid these lawsuits by invoking a Supreme Court case,Clapper v. Amnesty International. The case, which was about phone records and national security, required a showing of a risk of “imminent” and “concrete” injury in order to have standing to bring suit.


How social media can help employees perform better.

When someone connects with people who share similar perspectives and relationships to their own, those new connections typically don’t offer new insights or alternative viewpoints that person couldn’t have accessed before. The natural tendency to be drawn to people similar to yourself can create an “echo chamber,” which can lead to network structures that are detrimental to individual and organizational performance. Enterprise social networking platforms may be better able to offer features that counteract or overcome of our typical social tendencies. Social networking platforms can provide features that allow users to overcome these inherent limitations in our natural networking tendencies, allowing people to develop and maintain networks more beneficial to an organization’s purpose and to their own performance.


7 Key Risks All Businesses Should Manage (But Often Don’t)

Risk is inherent in doing business. The best way to fail is never to take any risks. But there are two kinds of risks: the kind you take consciously to move your company forward, and the kind that sneak up on you and pounce when you’re not looking. The latter are the kind companies must actively manage to avoid being wiped out. When it comes to managing risks, many companies prepare for natural disasters, fire, or maybe theft prevention (even though many small ones don’t even do that), but I think there are bigger risks companies of all sizes should manage. If you have a plan for what to do in case of physical emergency, you should also plan for ...


Claimed Breakthrough Slays Classic Computing Problem; Encryption Could Be Next

Computer scientists measure the difficulty of a problem by looking at how much the computational resources an algorithm needs to solve it grow as the size of the initial problem is increased. Graph isomorphism is considered extremely difficult because the best known algorithm needs roughly exponentially more resources as the size of the graphs it was working on increases. That algorithm was published in 1983 by Babai with Eugene Luks of the University of Oregon. Babai claims that his new algorithm experiences a much less punishingly steep increase in resources as the graphs it is working on get larger, giving graph isomorphism a major difficulty downgrade.


A New Architecture for Information Systems

Just as we can describe a new system, we can also assume a new architecture. Today’s systems architects deliver a crucial business function—carefully planning the relationships between nodes that include networked devices, software, services, and data in the context of business activities. The artifact from these activities typically takes the form of areference architecture. As such, information architecture activities relate equally to the concepts, contexts, language, and intents that foster UX planning, or architecture, activities that articulate a strategy and roadmap for digital user engagement. As businesses and technologists embrace digital transformation and digital experience as vital strategic paradigms, they must mature their digital initiatives by extending their notion of the system to include the thoughtful consideration of information architecture and customers’ digital experience.


Google Cloud gains security for Docker containers

From a security standpoint, though, it's a challenge to tell whether the containers have any vulnerabilities or if there are issues with how the application is being developed. ... Twistlock's Container Security Suite scans the applications both in image registries and in runtime to detect vulnerabilities present in the Linux distribution, application frameworks, and custom-developed application code. It also has activity monitoring and smart profiling capabilities to detect misconfigurations and malicious activities and to take appropriate action, such as blocking the containers from launching and killing misbehaving containers dynamically. The suite can also apply enterprise access control policies to the container environment.



Quote for the day:


"Be clear about your goal but be flexible about the process of achieving it." -- Brian Tracy


November 14, 2015

How Cloud Computing Changes Storage Tiering

New challenges in controlling data traversing the data center and the cloud have emerged. How do we handle replication? How do we ensure data integrity? How do we optimally utilize storage space within our cloud model? The challenge is translating the storage-efficiency technology that’s already been created for the data center — things like deduplication, thin provisioning, and data tiering — for the cloud. ... cloud computing adds an extra tier. “Cloud introduces another storage tier which, for example, allows for moving data to an off-premise location for archival, backups, or the elimination of off-site infrastructure for disaster recovery,” he said. “This, when combined with virtual DR data center, can create a very robust cloud-ready data tier.”


3 Tips for Managing a Boss You Don't Even Like

“You don’t have to love your boss but you need to be able to work well with them. One of the main reasons employees leave their job is because of their boss. A troubled relationship with your boss can negatively affect your morale, your productivity, your happiness, and of course, your career. A positive relationship can improve your morale, productivity and happiness which could lead to more career success in the form of promotions, raises and higher self-esteem.” Everyone can contribute to the workplace happiness, which means that much too often, no-one does.


Big Data and Social Listening

The purposes behind social listening are simple: To extract unsolicited opinion, to gather real world case studies, and to examine sentiment about products and services. For example, a company that makes smartwatches wants to know what its competition has done correctly, where the flaws are in its products, and how consumers feel that the products could be improved upon. The company wants to gather opinions, ratings, reviews, and sentiments about competitor’s smartwatches before investing time and money into a product that has no advantages over current offerings. To gather this information manually would put the company out of the proper release cycle and perhaps make the product obsolete by the time it debuts.


Service design thinking

This move towards service design thinking is not even necessarily an adjunct of the digital movement - better service design need not involve technology at all, but instead brings a long-absent focus on the users of public services and their needs in place of the internal imperatives of the providing organisations. Pioneering initiatives from the "The Public Office" in 2007 to the joint seminar series on "Innovating Through Design in Public Services"hosted by the London School of Economics Public Policy Group and the Design Council in 2010-11 highlighted some of the art of the possible. At last, some of that thinking finally seems to be entering the mainstream.


You Don’t Have to Choose Between ‘Big Data’ and ‘IoT’

With the technologies that are at our disposal today, we can attempt way more than we were able to in the past. In fact, we now can uncover problems that we didn’t know we had. The key is to examine each process that makes a difference to the business and ask questions that challenge the status quo – it is important to imagine new ways of doing current tasks and to ponder the possibility of doing things we always wished we could do but didn’t have a way of doing. To those out there who are trying to decide where to spend their IT budget, don’t get trapped in the mindset that you have to consider a “big data” or an “IoT” initiative. Make the call solely on the merits of the problem at hand and make a commitment to using the most capable technology platform out there.


Agile, DevOps and Cloud, 1 + 1 + 1 can equal more than 3

Where agile breaks the barriers in development, DevOps (development and operations) integrates operations. It industrializes the process of creating software and gets it into production. Webopedia defines DevOps X as a phrase in enterprise software development used to mean a type of agile relationship between development and IT operations. The goal of DevOps is to change and improve the relationship by advocating better communication and collaboration between the two business units. ... Cloud enables the developer to provision his development environment at the touch of a button. When he logs on, he’s provided with a number of development environment options. He chooses the one most applicable for the job and has it provisioned quickly. His advantage is that he doesn’t need to construct his development environment any further.


The seven people you need on your data team

You’ve been asked to start a data team to extract valuable customer insights from your product usage, improve your company’s marketing effectiveness, or make your boss look all “data-savvy” (hopefully not just the last one of these). And even better, you’ve been given carte blanche to go hire the best people! But now the panic sets in – who do you hire? Here’s a handy guide to the seven people you absolutely have to have on your data team. ... The one I have in mind is a team that takes raw data from various sources and turns it into valuable insights that can be shared broadly across the organization. This team needs to understand both the technologies used to manage data, and the meaning of the data – a pretty challenging remit, and one that needs a pretty well-balanced team to execute.


Building a Recommendation Engine with Spark ML on Amazon EMR using Zeppelin

Spark is commonly used for iterative machine learning algorithms at scale. Furthermore, Spark includes a library with common machine learning algorithms, MLlib, which can be easily leveraged in a Spark application. For an example, see the "Large-Scale Machine Learning with Spark on Amazon EMR" post on the AWS Big Data Blog. Spark succeeds where traditional MapReduce approach fails, making it easy to develop and execute iterative algorithms. Many ML algorithms are based on iterative optimization, which makes Spark a great platform for implementing them. Other open-source alternatives for building ML models are either relatively slow, such as Mahout using Hadoop MapReduce, or limited in their scale, such as Weka or R.


Microsoft open sources Distributed Machine Learning Toolkit

The toolkit, available now on GitHub, is designed for distributed machine learning -- using multiple computers in parallel to solve a complex problem. It contains a parameter server-based programing framework, which makes machine learning tasks on big data highly scalable, efficient and flexible. It also contains two distributed machine learning algorithms, which can be used to train the fastest and largest topic model and the largest word-embedding model in the world. The toolkit offers rich and easy-to-use APIs to reduce the barrier of distributed machine learning, so researchers and developers can focus on core machine learning tasks like data, model and training.


The Biggest Misconception About Information Security

Technologies are used to protect information and ensure its confidentiality, integrity and availability. But according to a recent survey by the Ponemon Institute on “Risk & Innovation in Cybersecurity Investments,” 90% of respondents said their organization invested in a technology that was ultimately discontinued or scrapped before or soon after deployment. In other words, these technology investments become “shelfware” which means they sit on the shelf instead of being properly implemented or utilized. There are a variety of reasons to explain this shelfware phenomenon but they predominantly boil down to people and process issues. Some organizations lack the resources to properly staff and support their technologies, a problem that many are able to solve through the use of Managed Security Services.



Quote for the day:


"Strength comes from overcoming adversity, not avoiding it." -- Gordon Tredgold


November 13, 2015

Luring Top Campus Talent to the Field of Data Analytics

“Many students discover they love the challenge of analyzing the data and coming up with meaningful insights and recommendations. It has changed the career trajectory and aspirations of many students,” Dykes said. Adobe has hired more than 20 students from this competition, and many others have gone on to work in the field of analytics for ad agencies and other companies, according to Dykes. “When I was a manager in Adobe Consulting, it was one of our best hiring channels for new talent. Many of our hires from the competition went on to be our best consultants and then took roles in product management, product marketing, and consulting leadership at Adobe,” Dykes said.


Business commerce: Can B2B really get ‘friendlier’ online?

The eCommerce sites aimed at consumers have polished their customer experiences to remove any hint of friction. However, B2B buying is more complicated – while some purchases might be simple commodities that could go through B2C-style experiences, many are long “considered purchases” that involve multiple stakeholders and capital expenditure. Here, removing friction would not speed up procurement – it would only make it more pleasant. Managing the purchase process and making it go faster is a goal for all B2B companies on both sides of the buyer and seller divide. However, it can be harder to remove some of the friction that exists than you think, unless you can put the right data in front of the right people at the right times.


Accounting And Finance Professionals Play Increasing Role In Cybersecurity

The number and severity of damaging cyberattacks has brought to the forefront the importance of providing the finance profession with the tools they need to protect the personal and corporate financial information they handle. With the amount of sensitive information they handle, accounting professionals are at the center of the fray, making it critical that they are prepared to prevent and respond to cyber threats. “For accountants, measures must be taken to ensure that the sensitive personal and corporate financial information they handle is safe: accountants need to be at the forefront of cybersecurity,” said the report’s author, Dr. Jonathan Hill, Interim Dean at Pace’s Seidenberg School of Computer Science and Information Systems.


The Potential of Geolocation for Revolutionizing Retail

One of the most exciting areas of development is the marrying of mobile apps, location sensing technologies (e.g., GPS), and data analytics to improve the in-store experience for customers. Location sensing technologies in retail typically involve customers using the retailer’s app, or a third-party app, and ceding permission to track their location in return for a better experience or reward. The customer’s location can be determined through the phone’s GPS capability — or more accurately within the store via WiFi, light-based triangulation or beacons. ... Many retailers, from Macy’s to Walgreens, are already experimenting with location-sensing technologies, with most of the focus to date on navigation, location based promotional offers, and reviews of nearby products.


4 ways CIOs can speak better CFO

“I’ve worked with my CFO for seven years, and I’ve never been told ‘no’ for a project, partly because I only come to him when it’s something I really need, and because I’ve also developed a great relationship with him,” says Darren Schoen, director of technology infrastructure at the Broward Center for the Performing Arts. But achieving that level of report isn’t something that happens overnight, it’s something that takes time and persistence, Schoen says. “Some CIOs and IT folks are intimidated by the CFO, but you shouldn’t be. If you talk to them in a language they understand and start working together, that intimidation dissipates and you start developing a truly collaborative relationship,” Schoen says.


Teradata’s Embrace of Hadoop

Teradata, if you don’t know the company’s products, has been working towards a Unified Data Architecture (UDA) for years. If you don’t know what a UDA is, it’s a little like the Grand Universal Theory that physicists have been searching for and failing to find for years. It’s a single unified data architecture that can launch queries effectively and efficiently over any kind of data. Until I completed research for that algebra book (The Algebra of Data by Sherman and Bloor) I believed that such an architecture was a mirage of the kind that moves further into the distance the closer you get to it. After all, nowadays we have relational databases, document databases, graph databases and even triple-stores. But now, because it’s mathematically possible – and provably so – I have more confidence in Teradata’s ambition.


Gathering intelligence: how manufacturers can use Big Data

Research by the MTC suggests there are three essential areas that companies should be prioritising, if they are to get the most out of the rise of Industry 4.0. These are data on product quality, including faults or components not meeting their required specifications; information on the health of production equipment, such as maintenance and repair data; and any data that allows them to be more flexible, by allowing them to more easily meet customer demands for increased customisation of their products. In addition to these, information on the power consumption of each machine, and therefore the energy efficiency of the production line as a whole, is also an important area that companies may wish to analyse, she said.


Five super-easy IP traffic monitoring tools

For system admins, one of the most important tasks is keeping an eye on the network. When things go bad in your world, a rogue ne'er-do-well could be the cause. Whether that malicious entity is a hacker, a compromised system, or a bad piece of hardware, it's essential to sniff out the issue. To that end, you need the right tools. One of the first tools you might turn to is an IP traffic monitoring tool. The good news is that there are tons of these tools ready to serve you. The bad news... some of them are a bit complex. That's why I thought I'd find the easiest IP traffic monitoring tools and list five of them for your network monitoring pleasure.


Microsoft CEO seeks a Visual Basic for new digital age

Nadella’s vision is data-centric with information sucked in to spit out smarter human-computer interactions. “It’s going to be data. There will never be a search box that doesn’t autocomplete or have recommendations.” In the same way that Visual Basic programming opened up Windows development to a broader constituency, Nadella wants Microsoft to be at the heart of democratising cloud computing so it’s “much easier to write applications that fuel the world”. Technology pillars for this new generation of data-driven apps will include some of Microsoft’s full house of analysis technologies including Cortana Analytics, Azure Machine Learning, Kinect Computer Vision and Bing Web Understanding.


Digital Don Accused of Hacks at JPMorgan, Dow Jones Over 8 Years

“The conduct alleged in this case showcases the brave new world of hacking for profit,” U.S. Attorney Preet Bharara in Manhattan said Tuesday in announcing two of the indictments that laid out parts of the scheme. “It is no longer hacking merely for a quick payout,” Bharara said. “It is hacking as a business model.” The allegations are perhaps the starkest illustration yet that even the most sophisticated computer networks, run by companies at the heart of the global financial system, may be vulnerable in the age of the Digital Don. The latest revelations come just three months after U.S. authorities arrested several men they accuse of lurking inside servers where corporate press announcements were awaiting release, in order to trade on the information before it went public.



Quote for the day:


"There is no greater learning experience than teaching." -- Gordon Tredgold


November 12, 2015

Next Generation Session Management with Spring Session

This article will demonstrate how the recently released Spring Session APIs help surmount some of the limitations of the current approach to session management, traditionally employed by enterprise Java.  ... Spring Session provides an app server independent way to configure pluggable session data stores within the bounds of the Servlet specification without having to rely on any application server specific APIs. This means that Spring Session works with all app servers (Tomcat, Jetty, WebSphere, WebLogic, JBoss) that implement the servlet spec, and it is very easy to configure in exactly the same way on all app servers. You also get to choose whatever external session data store best meets your needs.


How Apple Is Giving Design A Bad Name

Apple is destroying design. Worse, it is revitalizing the old belief that design is only about making things look pretty. No, not so! Design is a way of thinking, of determining people’s true, underlying needs, and then delivering products and services that help them. Design combines an understanding of people, technology, society, and business. The production of beautiful objects is only one small component of modern design: Designers today work on such problems as the design of cities, of transportation systems, of health care. Apple is reinforcing the old, discredited idea that the designer’s sole job is to make things beautiful, even at the expense of providing the right functions, aiding understandability, and ensuring ease of use.


Medicine On The Cutting Edge – The Bionic Eye

Prof Paulo Stanga, consultant ophthalmologist and vitreoretinal surgeon at the hospital, said the first results of the trial were a total success. “Mr Flynn’s progress is truly remarkable. He is seeing the outline of people and objects very effectively. Stanga is recruiting four more patients to the trial in Manchester. “On behalf of the Manchester Royal Eye hospital, we feel privileged to be conducting the world’s first study into retinal implants for patients with AMD. This technology is revolutionary and changes patients’ lives – restoring some functional vision and helping them to live more independently,” he said.


Quantum computers aren’t perfect for deep learning

Deep learning, though, is a whole other thing. Generally speaking, it requires a model and a set of values for parameters, and you can’t make a prediction until you have both of those things, Greg Corrado, a senior research scientist at Google Research, told reporters at last week’s event. “The number of parameters a quantum computer can hold, and the number of operations it can hold, are very small,” Corrado said. He explained that recognizing a cat in a photo, for example, might require millions of parameters. It would involve taking “billions upon billions upon billions of steps,” to make out the cat’s granular characteristics, such as its whiskers, and then eventually identify the image in the photo at a higher level.


How can we protect the internet’s undersea cables?

Sabotage has actually been rare in the history of undersea cables. There are certainly occurrences (though none recently), but these are disproportionately publicized.  ... The fact is it’s incredibly difficult to monitor these lines. Cable companies have been trying to do so for more than a century, since the first telegraph lines were laid in the 1800s. But the ocean is too vast and the lines simply too long. It would be impossible to stop every vessel that came anywhere near critical communications cables. We’d need to create extremely long, “no-go” zones across the ocean, which itself would profoundly disrupt the economy.


TensorFlow could be Google’s new, open-source, central nervous system

That’s an important advance, since Google’s machine learning initiatives are some of their most important, at this point. Machine learning is increasingly how Google sifts the mountains of data we provide for them, how it pulls salable signals out of seemingly endless volumes of noise. Machine learning lets the company burrow ever-more-invasively into people’s lives by providing services too interesting and valuable to pass up, from translation to facial recognition. It’s also the main technology driving the epic Now-versus-Siri-versus-Cortana triforce of corporate one-upmanship, which could very well end up determining many users’ choice of mobile platforms over the next five years.


Huawei predicts the 'superphone' by 2020

"Inspired by the biological evolution, the mobile phone we currently know will come to life as the superphone," said Shao on Thursday afternoon. "The intelligence of the superphone will continue to evolve and develop itself into digital intelligence, capable of empowering us with interactions with the world. Through evolution and adaptation, the superphone will be more intelligent, enhancing and even transforming our perceptions, enabling humans to go further than ever before." The Chinese company said the superphone will take advantage of advancements in big data, cloud computing, and digital intelligence by tying in with the Internet of Things (IoT), where all physical things are digitalised.


8 tips for hiring a Web designer for your business

Many ecommerce and website platforms claim to be so easy to use that even nontechnical folks can create an attractive website. However, if you are like most people, you are still probably going to need some design help if you don’t want your site to look like everyone else’s. So how do you find a good Web designer – and by “good” we mean an individual or agency who has designed in your preferred Web platform, has a great portfolio, understands your business and goals, but won’t charge you tens of thousands of dollars? Following are eight suggestions, along with pricing guidelines and advice on where to find talented Web designers.


Building a design-driven culture

One essential to running a design-driven company is making sure the right people with the right skill set are in the right place. To start, that means ensuring a chief design lead has a seat at the table where strategic decisions are made. That person could be a chief design officer, a chief digital officer, or a chief marketing officer. All that matters is that whoever has the responsibility is the primary customer advocate. He or she must bring the customer’s point of view to business decisions, translate business goals into customer-friendly initiatives, and build a culture in which employees think about how what they do affects customers.


Automation Will Change Jobs More Than Kill Them

“It makes a lot of sense to look at automation at the task level, as a way to think about redefining jobs,” said Erik Brynjolfsson, a professor at M.I.T.’s Sloan School of Management and co-author of “The Second Machine Age: Work, Progress, and Prosperity in a Time of Brilliant Technologies.” The McKinsey authors emphasized the potential for automation to enrich work, liberating people to focus on more creative tasks. Apparently there is a lot of room for improvement on that front. According to one calculation in the report, “just 4 percent of the work activities across the U.S. economy require creativity at median human level of performance.”



Quote for the day:

"People are smarter than you think. Give them a chance to prove themselves." -- Tim Ferriss