Daily Tech Digest - December 23, 2016

Data quality for developers

Just like code testing, Data Quality is one of things that we generally don't pay attention to until it comes and bites us, and when it does, its usually a customer that notices it and as always, we poor beleaguered developers get to pay the price. I'm starting into a Data Quality project, so I thought it might be good to have a talk about what it is, and how we can put some simple checks and balances in place to help us manage our data, and improve its quality. ... To bring your system to the next level, and make it really robust, you could consider building these kinds of checks into your system whenever data is changed or ingested. While you can get very detailed and domain specific with the following, in general, its possible to be quite generic about data at this level and combine these rules and checks to dramatically improve the quality of your data. The bottom line is we are seeking to ensure our data is in a clean state before allowing it to proceed into production or analysis.


Are You a Modern Software Engineer?

Another lane on our highway is related to architecture and non-functional requirements. One day, you may decide to invest your time into common practices of solving scalability issues of any kind, have a look how high availability is being achieved in some modern and popular products, what helps one solution survive high load, etc. If you are a fan of patterns, then you could have a look at classic patterns first, and then switch to modern ones, recall old school enterprise patterns, or read a book about integration patterns.  If you like the web, then the hype is about monolith vs. SOA vs. microservices, so you can invest time into that area. If you are in a big data world, then and kappa architectures might be interesting to you, too.  Another valuable effort might be to spend time reviewing architectures of successful products.


Leaked files reveal scope of Israeli firm's phone cracking tech

The forensics company claims it can download almost every shred of data from almost any device in a matter of seconds -- on behalf of police intelligence agencies in over a hundred countries -- to help solve crimes. It does that by taking a seized phone from the police, then plugging it in, and extracting messages, phone calls, voicemails, images, and more from the device using its own proprietary technology. It then generates an extraction report, allowing investigators to see at a glance where a person was, who they were talking to, and when. We obtained a number of these so-called extraction reports. One of the more interesting reports by far was from an iPhone 5 running iOS 8. The phone's owner didn't use a passcode, meaning the phone was entirely unencrypted. Here's everything that was stored on that iPhone 5, including some deleted content.


Executive Ritalin: 3 steps that prevent leadership from killing your project

In rare cases, big problems are quickly solved. More often, large-scale problems require time to fix. And time is something many executives believe is in short supply. As Bob Richards, a vice president for a global manufacturer headquartered in Switzerland notes, “True change -- from a problem-solving standpoint -- takes a lot longer than is usually allowed in companies. You need to get folks involved in identifying the problem, how the problem was created, and then get their input on how to solve the problem.” Richards has devised a simple three-step process for staving off executive impatience that leads to killing off promising projects. He acknowledges an executive’s difficult position, saying, “When you’re in a leadership role, it is one problem after the next and your role is to get problems resolved—and quickly.”


In virtualized networking, availability tracking is key

The ability to track packets through the network is necessary, but it's not enough. With virtualization, network and application management have become tightly interdependent. When an application starts up, virtualized networking management requires creation of virtual components and allocates network paths among application virtual machines (VMs). These VMs may execute on different servers, and may move from server to server in response to shifting loads. When a VM moves, network traffic must be redirected to support the new configuration. In the meantime, performance monitors must report whether applications are meeting service-level agreements and track server and network utilization rates. They collect statistics that show use over time so managers can spot components that are nearing limits.


Refactoring to Reactive - Anatomy of a JDBC migration

Reactive programming is the new kid on the block, offering built-in solutions for some of the most difficult concepts in programming including concurrency management and flow control. But if you work on an application development team there's a good chance you are not using reactive and so you might have questions - how do I get there, how do I test it, can I introduce it in phases? ... In the reactive world we aim to bring a blocking application to a non-blocking state. (A blocking application is one that blocks when performing I/O operations such as opening TCP connections.) Most of the legacy Java APIs for opening sockets, talking to databases (JDBC), file/inputStream/outputStream, are all blocking APIs. The same is true about the early implementations of the Servlet API and many other Java constructs.


Programming Robotics using the Intel® XDK, Node.js, and MRAA library

There are many different platforms, programming languages, and tools that you can learn. Dfrobot* created a tank robot platform called Devastator that contains the Romeo* controller board. This board was modified for use with the Intel® Edison compute module to bring more capability to the kit with an increased number of I/O’s, integrated WiFi, USB Host, servo control, and increased processing power. The kit can be programmed using the Arduino* IDE and a USB connection out of the box. This article describes another method of programming the robot using the Intel® XDK to program the robot over WiFi, Node.js*, and the MRAA library. In particular, the article will discuss about the tools used, the Romeo controller board, mapping peripheral pins, creating an Intel XDK project, and the implementation of the sensor & actuator components for the robot.


New Accounting Standards Change The Rules Of IT Leasing

It’s just the latest shakeup in the IT equipment leasing industry which has also been reeling from reductions in the cost of IT equipment and increased adoption of cloud computing. “The profits of the companies that lease IT equipment are under pressure,” Kirz says. “At the same time, cloud adoption is shifting lessor relationships from the end-client to the cloud provider, and many cloud providers are building their own data centers with commodity equipment, thus shrinking the lessors’ market size.” ... In the face of these trends, a number of large independent leasing companies have recently sold themselves to large banks resulting in market consolidation. Crestmark Bank bought equipment-leasing company TIP Capital in late 2014. Huntington Bank acquired Macquarie Equipment Finance last April. And Wells Fargo purchased GE Capital Vendor Finance in March.


How Big Data and the Internet of Things are Saving and Making Millions

With Big Data processing power and IOT insights, repairs and maintenance can be optimized to avoid delays, stoppages, and safety risks. These technologies are used to pinpoint precisely what leads up to an issue. Often, the issues can be resolved instantly and remotely, before they escalate. In this instance, Big Data and IOT sensor input simplify the process of obtaining appropriate data, which gives companies the chance to react effectively and avoid crisis situations. Manufacturing companies are reaping huge benefits by deploying Big Data technologies. Automakers worldwide use data analytics to monitor the cost of steel and other raw materials, helping them identify when they can purchase at the best price point. How can this be done? A database of several suppliers is built on a Hadoop framework; this tracks which supplier offers the most competitive price and can deliver at the optimal time. The result? Car manufacturing costs are reduced significantly.


How artificial intelligence can eliminate bias in hiring

"AI/machine learning can help close the diversity gap, as long as it is not susceptible to human bias. For example, recruiting contact center employees could provide AI/machine learning models with the historical application forms of hired contact center employees with high customer satisfaction scores. This allows the model to pick up on the subtle application attributes/traits and not be impacted by on-the-job, human biases," Alexander says. By simply using an automated, objective process like this, it's possible to drastically reduce the scope for human bias. If, for example, fairly trained AI/machine learning tools are used to whittle an applicant pool down from 100 applicants to the final 10 interviewees, that means that 90 percent of the pool reduction would be done in a process immune to any human biases, Alexander explains.



Quote for the day:


"Motivation is what gets you started. Habit is what keeps you going." -- Jim Ryun


Daily Tech Digest - December 22, 2016

Magisto: The machine-generated creativity you're looking for?

There is an attitude in the technology space that startups should look to automate every time-consuming or mundane process. Sick of doing laundry? A web service will do it for you. Not keen on vacuuming? The Roomba solves your issues. These examples, while telling a sad tale of humanity's laziness, at least remove an arguably low-level and mundane task. But what of automating creativity -- can you, and should you? That is exactly what Magisto is setting out to do. The company has what it calls a "smart video storytelling application." What that means in English is that using Magisto, customers can upload video and imagery, choose a theme and a soundtrack and, only a few minutes later, have a complete video to use.


Big Banks Are Stocking Up on Blockchain Patents

Until now, many blockchain startups have downplayed the importance of patents and pinned their hopes on wider adoption through open source. Hyperledger, a venture led by companies including IBM, Accenture and Intel, makes its code free for others to use and enhance. Chain, which lets companies use the blockchain to issue and transfer assets, released its code in late October. Even R3 -- a consortium of some of the largest banks -- made its Corda blockchain available last month. As such projects have multiplied, some blockchain supporters have suggested open-source makes patents irrelevant. It doesn’t, according to Vitalik Buterin, co-creator of the popular Ethereum blockchain. Companies could find themselves being sued by one-time collaborators. Large firms could wield patents to muscle into promising businesses developed by today’s startups.


How to manage the top 4 tech culture challenges

Leading a tech team in the current culture of competition and globalization comes with a unique set of challenges, and requires a distinct set of leaderships skills to mitigate them. A recent report from corporate training and leadership development firm VitalSmarts lays out the particular competencies tech leaders need to build successful organizations and products. "Everybody who's ever worked in tech feels like there's something quite different and unique about that culture and the whole industry," said VitalSmarts vice president of research David Maxfield. "The questions we were asking were: 'Are these differences real, do they matter, and if so, how?'" The researchers first interviewed more than a dozen leaders from tech firms asking about the unique challenges of the field.


VMs prove most popular Docker infrastructure -- for now

"Capacity wasn't important. Stability was the primary driver," said Stephen Eaton, infrastructure technical lead at Dealertrack Technologies, a holding of Atlanta-based Cox Enterprises. Encapsulating applications in containers that float over infrastructure made the workflow easier for the entire IT group. However, as he ramps up containerization -- the goal is 80% of the group's apps on Docker containers within a year -- Eaton will be closely watching network-attached storage performance. With five times as many apps using the storage resources, will there be latency with logs or scaling that necessitates changes to the underlying Docker infrastructure? ... Containers also change the equations for dynamic and static load balancing. While container-monitoring capabilities are not yet close to those available for virtualization, log-monitoring tools such as Sysdig and Splunk are working on the visibility issue with admin-friendly dashboards.


Digital Transformation and Bimodal IT

As we all know, the Traditional IT team in each enterprise is entrusted with the responsibilities of maintaining functionality, safety, and predictability. Generally speaking, these are the teams that ensure that the show is running without any interruptions. The Exploratory IT team, however, are the specialists, specifically employed to implement the latest, futuristic version of IT. They work on systems and processes that will increase the ability of the company today and optimize its capabilities for the future. They are the guys who, for example, are implementing the new move to the cloud, creating the proof of concepts for the latest IoT offering, demonstrating to the world your connected car expertise, or training the new team created to work on the latest systems. They train the “would-be” employees and make all the necessary plans and strategies for the future migrations.


Alice: A Lightweight, Compact, No-Nonsense ATM Malware

Trend Micro first discovered the Alice ATM malware family in November 2016 as result of our joint research project on ATM malware with Europol EC3. We collected a list of hashes and the files corresponding to those hashes were then retrieved from VirusTotal for further analysis. One of those binaries was initially thought to be a new variant of the Padpin ATM malware family. However, after reverse analysis, we found that it to be part of a brand new family, which we called Alice. ATM malware has been around since 2007, but over the past nine years we have only learned of eight unique ATM malware families, including Alice. This new discovery is remarkable because it shows a clear tendency for malware writers to attack an ever-increasing variety of platforms. This is especially acute against ATMs, due to the high monetary value they represent.


Multi Modal Delivery with SAFe 4.0

To create an integrated system that actually creates value for customer and business takes capabilities that take trips piercing multiple layers, touching multiple systems, each with their own ingest and delivery model for new functionalities. In the example above, generated from a real customer situation, the process layer comprises a team of teams that in itself operates as an Agile Release Train. However, this needs to be timing orchestrated and technically integrated with deliveries from other groups. The customer facing front ends are delivered by an external supplier who is running traditional Scrum on a 2 week iteration cadence, while the back end Mainframe Services delivery has not yet transformed, and is operating on a traditionally planned project basis.


Here are the biggest IoT security threats facing the enterprise in 2017

In 2017, the IoT device security debate will escalate, putting pressure on manufacturers to architect fundamental security principles into the designs of internet-connected products. We may even see governments around the world take an active role in IoT safety legislation. Everyday appliances (e.g., the iron, washing machine and dryer) are subjected to rigorous testing, both by the manufacturer as well as independent testing labs, but a similar approach is not being taken with respect to cybersecurity for IoT devices. As a result, most are unsecure by design, and many vendors choose convenience (e.g., using default credentials in their appliances) over implementing proper security measures—a flagrant violation of best practices in product development.


Nokia and Apple trade accusations in patent lawsuits

The eight patents covered in one of Nokia's Texas lawsuits, filed Wednesday, are related to the H.264 Advanced Video Coding standard approved by the International Telecommunication Union, according to Nokia's complaint. A second Texas lawsuit covers 10 patents for a range of other technologies. Apple products using the H.264 video codec include the iPhone, iPad, iPod, Apple Watch, Macs, and Apple TV, Nokia said in its complaint. "Despite all the advantages that have been enjoyed by Apple, Apple has steadfastly refused to agree to license Nokia's H.264 patents on reasonable terms," Nokia's lawyers wrote. "Dozens of companies have licensed Nokia’s patents for use in their products ... Apple, however, refuses to pay Nokia's established royalty rates."


Cybersecurity Confidence Report Card

For the second year, practitioners cited the “overwhelming cyber threat environment” as the single biggest challenge facing IT security professionals today, followed closely by “low security awareness among employees” and “lack of network visibility” due to BYOD and shadow IT. No doubt, the dangers are real. Just last week Yahoo disclosed that over a billion user accounts had been stolen – back in 2013. Quest Diagnostics says that the hack of an internet application on its network exposed the personal health information of about 34,000 people. Venafi CISO Tammy Moskites doesn’t like assigning scores, but she does acknowledge that she’s constantly challenged with “making sure that we’re doing the right things right.” “We’re going to be more challenged with making sure that we’re able to be quick and agile when and if an attacks occurs,” Moskites says.



Quote for the day:


"Be sure you put your feet in the right place, then stand firm." -- Abraham Lincoln


Daily Tech Digest - December 21, 2016

Why every CIO needs to be a hands-on leader to succeed

If you looked at the job descriptions and expectations for CIOs of the past, almost all of them required the incumbent to be a master builder. A person had to know how build and manage data centers, buy hardware – large and small, and be a virtuoso of disaster and business continuity plans. Today, the cost savings, let alone the flexibility, of utilizing cloud resources for almost everything is just too hard to ignore. While vexing to consider for veteran CIOs, the epic of building physical empires within IT has passed. But this change represents a tremendous opportunity for even the most strategic IT leader to get into the trenches in a meaningful way. By going through data centers, CIOs can be on the frontlines of shutting them down.


10 Cybersecurity challenges from IoT, DDoS, autos and more

We recently saw some of the largest DDoS attacks on record, in some instances topping 1 terabit per second. That’s absolutely massive and it shows no sign of slowing. Through 2015, the largest attacks on record were in the 65 gigabit per second range. Going into 2017, we can expect to see DDoS attacks grow in size, further fueling the need for solutions tailored to protect against and mitigate these colossal attacks. Math, machine learning and artificial intelligence will be baked more into security solutions. Security solutions will learn from the past, and essentially predict attack vectors and behavior based on that historical data. This means security solutions will be able to more accurately and intelligently identify and predict attacks by using event data and marrying it to real-world attacks.


NICE Robotic Automation Improves Interaction Experience

NICE, a longtime contact center systems vendor, has offered real-time process automation since 2001, and it recently launched a new product in this market. It now has three products in this space – desktop analytics, desktop automation and its latest, robotic process automation. NICE Desktop Analytics captures information about what agents, or other designated users, do on their desktop, including systems they access, information they look up, data they enter, information they give callers, and systems they update after finishing calls. The analytics enables organizations to track the four basic components of a call – identifying the caller, identifying the caller’s issue, providing a response and completing any required after call work. The analytics component thus can identify best practices for interaction handling and agent performance, and recommend changes to processes or coaching and training.


Tech companies like Privacy Shield but worry about legal challenges

While U.S. companies are embracing Privacy Shield, many European businesses are "still concerned that Privacy Shield will not hold up under court scrutiny, and they will find themselves in the same scenario as they were in October 2015, when the Safe Harbor agreement was struck down," said Deema Frei, ... Some European companies see Privacy Shield certification as a "tick box" compliance exercise, she added. With some doubts about its long-term viability, companies should also consider other data transfer agreements, such as EU model clauses or binding corporate rules, she recommended. However, if companies can get certainty about Privacy Shield's future, and if it won't be "attacked in the long term by data privacy activists trying to discredit it and challenge its validity, I believe it will work in the long run," Frei added.


Never Fear, Vulnerability Disclosure is Here

There is no excuse for organizations letting fear of working with hackers prevent them from doing so for defense. There is no excuse for lacking a vulnerability disclosure policy, in any organization, private or public sector. The only barrier is building capabilities to handle what can be daunting in terms of facing the world of hackers. Big companies like Google, Apple, and Microsoft have had to deal with this issue for a very long time, and have worked out systems that work for them. But what about smaller organizations? What about other industries outside of the tech sector? What about IoT? And what about governments, who must walk the line between getting the help they need from the hacker community without accidentally giving free license to nation-states to hack them with an overly permissive policy?


Contactless Payments: Addressing the Security Issues

In a contactless environment, on mobile devices in particular, biometrics authentication can replace the need to use PIN entry as an additional authentication layer, King says in this interview conducted at Information Security Media Group's recent Fraud & Breach Prevention Summit in London. "The challenge there is, 'How do you ensure the security and the authenticity of the biometrics?'" he says. "Biometrics have been around for a while, in terms of authentication. ... They are static information. My fingerprints don't change. Now, if I lose my PIN, I can go into the bank and say, 'Can I have a new PIN?' If I lose my fingerprint, if that is compromised, then there's not much I can do." As contactless mobile payments become more commonplace in Europe and elsewhere, card networks and issuers are rethinking how they secure payments, turning to biometrics and, in some cases, transaction and behavioral analytics, he adds.


Google releases Project Wycheproof: Security tests to check cryptographic libraries for known attacks

Project Wycheproof includes over 80 test cases, and Google says they have already uncovered more than 40 security bugs. The list of bugs is available here, though Google notes not all are currently listed as some are still being fixed by vendors. The same goes for some of the tests — they will be released once the affected cryptographic libraries have been patched. The tests encompass the most popular crypto algorithms, including AES-EAX, AES-GCM, DH DHIES, DSA, ECDH, ECDSA, ECIES, and RSA. The tests detect whether a library is vulnerable to many attacks, including invalid curve attacks, biased nonces in digital signature schemes, and all of Bleichenbacher’s attacks. In short, Project Wycheproof allows developers and users to check libraries against a large number of known attacks without having to “sift through hundreds of academic papers or become cryptographers themselves.”


Mobile banking trojans adopt ransomware features

Cybercriminals are adding file-encrypting features to traditional mobile banking trojans, creating hybrid threats that can steal sensitive information and lock user files at the same time. One such trojan is called Faketoken and its primary functionality is to generate fake login screens for more than 2,000 financial applications in order to steal login credentials. The malicious app also displays phishing pages to steal credit card information, and it can read and send text messages. ... File encryption is not as popular as screen blocking techniques in mobile ransomware because many of the files stored on mobile devices are backed up to cloud services and can be easily restored, according to Unuchek. That doesn't seem to stop developers from experimenting with such techniques, though. Researchers from security company Comodo have recently analyzed another mobile banking trojan called Tordow 2.0 that has the ability to encrypt files.


Raspberry Pi in 2017: New boards, new OSes and more

Expect to see the Raspberry Pi powering far more appliances in 2017, following the release of the Compute Module 3 (CM3). Due to be launched "very early next year", the CM3 will pack the same quad-core Broadcom BCM2837 processor and 1GB memory used on the Pi 3 onto a slimmer and smaller board. The compact design of the Compute Module, which comes with 4GB eMMC Flash storage, makes it better suited to being built into electronic products. The CM3 marks a significant leap forward in processing power, since the previous Compute Module was based on the first-generation, single-core Raspberry Pi, which is up to ten times slower than the third-generation board. When released, it will also be the first Compute Module to run Windows 10 IoT Core, a cut-down version of Windows 10 designed to support Internet of Things appliances.


Automating the Database: A Win-Win for DBAs and DevOps

In most cases, the DBA invests a lot of time and effort in manually reviewing code from the developers and preparing the deployment script. At times, this goes beyond fine-tuning and actually involves rewriting entire code segments, simply because the DBA has a better understanding and overview of the database. Similarly, when database problems arise during deployment or production, DBAs may be called upon to resolve them by fixing unfamiliar code without access to the original developers. No matter the number of development teams and their potentially overlapping needs, the DBA is tasked with protecting the integrity of the data and ensuring availability. In order to perform this behind-the-scenes “traffic duty”, the DBA must balance the requirements of the various development teams with daily database maintenance routines and administrative responsibilities.



Quote for the day:


"Don't judge me by my past. I don't live there anymore." -- Petteri Tarkkonen


Daily Tech Digest - December 20, 2016

Privacy groups complain to FTC over Google’s 'deceptive' policy change

“Google is a serial offender, and the action that the FTC has taken to date has done nothing to slow Google’s intrusive violations of its users’ privacy,” according to the groups. Google could not be immediately reached for comment. Describing the June move as highly deceptive, the groups said the announcement “intentionally misled users,” who had no way to figure from the wording that Google was in fact asking users for permission to link their personal information to data reflecting their behavior on as many as 80 percent of the Internet’s leading websites. The groups have asked the FTC to investigate the changes to Google’s data collection policies as a result of the June policy shift, stop the combination of data from DoubleClick without proper user consent


IP Reputation and Mitigation API

Knowing that your network is under attack or may come under attack by certain hosts doesn’t do a lot of good if your network can’t use that information. When a host or connection is known to be a bad actor, your network must mitigate the situation. This is where Mitigation Cybersecurity comes into play. The basic concept is that there is some intelligence gathering application or service (either internal or external) is providing information about current threats. Cybersecurity intelligence can then be used in a variety of places to help protect your hosts. This information should be used wherever it can to protect your network. Ideally, the mitigation of attacks and threats should be layered from your Internet routers and firewalls right down to the hosts with each providing protection using their greatest strengths.


Privacy in the digital age: honouring the customer

Using customer data in the right way but also to the benefit of the organisation is achievable. Personalising offers or customising promotions is not an abuse if a company is transparent about how it will use a person’s data. It shouldn’t be moving in the shadows. The ICO highlights the necessity of transparency in complying with both the Data Protection Act 1998 (DPA) and, even more so, the impending GDPR. The most common way to provide this information to a customer is via a privacy notice. Under the current law of the DPA, an organisation must detail who they are, what they are going to do with a person’s information and who the information will be shared with. These are the basic foundations on which all privacy notices should be built. Post-GDPR, however, these basic moral principles, like the more stringent financial consequences, will be expanded and enhanced.


Digital marketing's biggest wins and losses in 2016

“The biggest advancement [in digital marketing is] the shift to and adoption of video and particularly live streaming,” Jake Schneider , Director of Digital Strategy and Innovation at The Marketing Arm told Marketing Dive. “Brands and marketers can no longer rely on static content to make an impact with audiences,” he said. “Live streaming provides an authentic and immersive experience that resonates with audiences, giving brands an opportunity to connect in a more intimate way.” ... “[The biggest surprise was] the perfect storm — i.e. the summer season, the power of brand nostalgia, etc. — that helped propel Pokémon Go to the top of mind and home screen of consumers and brands,” said Fishman Zember. “...it was a powerful moment for augmented reality and a chance for consumers to engage with technology, even if they didn't know they were, that has incredible potential to add new layers, dimensions to their everyday realities and very real world.”


Shedding Light on Dark Data: How to Get Started

We have at our disposal all manner of unstructured data for which text analytics are uniquely suited to organize and understand, including images and video—without any enrichment or visual content analysis. ... Dark data can be Big Data. And very Big Dark Data can prove daunting (that’s partly why it stays dark in the first place). But dark data can also be quite small we’ve found. And just as Big Data isn’t necessarily valuable just because it’s big, dark data certainly isn’t valuable just because it’s dark. Lastly, technology can’t make garbage data valuable and the complexities involved in analyzing some forms of dark data often require taking a sample or deciding exactly which parts of the data might prove most interesting to analyze. There are tons of ways to start putting dark data to work for your organization. Here are recent examples of how clients are using OdinText currently to shed light on their dark data.


A DevOps Approach To Digital Transformation Success

In this digital age, it has been estimated that 6 of the top 20 companies in every industry will face serious disruption. Now more than ever, organisations are measured by the speed at which they deliver new products and services. A failure to digitally transform the enterprise could be catastrophic. ... DevOps addresses the missing element that many Agile projects suffer at the execution stage, (when code is released into production) - by including operational teams early enough in the development cycle - thereby avoiding deployment bottlenecks. • Digital Transformation needs to be underpinned by a solid platform to deliver and support new applications, services and technologies. DevOps provides this, allowing organisations to release updates frequently, glean customer feedback, improve and iterate.


Why Technology Won't Displace Human Artists

It's possible to teach a machine Van Gogh's painting technique, but only if it already exists. An algorithm can write chorales like Bach because it can "study" Bach. Even when the work produced by AI is less specifically derivative than it is today -- say, when the algorithms learn to combine various techniques they learn in an intelligent manner -- they will never rise above previous work because the way they work is based on experience. They are constrained by Hume's piece of wisdom. The one way in which we're radically different from machines is in our ability to step into the unknown, to do things that have never been done before with paint, form, sound and the written word. Most of the rewards to creative professionals today accrue to that ability, not to skill or the extensive knowledge of predecessors' work.


Virtual reality is actually here

Virtual reality is an excellent tool when the task is dangerous or the equipment involved is expensive. The U.S. Army is piloting a fully immersive VR system to augment soldier training. The Army asserts that VR makes training more efficient and effective; the military scenario can be changed dynamically to provide different challenges. The actions of each participant can be tracked for later analysis. Moreover, after the initial scenario is developed, the system requires very little time to restart. Practicing the demolition of a building, for example, used to require days to rebuild the target structure before the next training exercise could occur. With VR, the scenario is just restarted, saving time and money and reinforcing trainees’ performance as they repeat the exercise.


Cyber Insurance Now Critical as Data Breaches Wreak Havoc

Nonetheless, insuring against data breaches and other attacks presents its own set of challenges and complications. In particular, the constantly changing range of perpetrators, targets and exposure values, a lack of historical actuarial data and the interconnected nature of cyberspace, combine to make it difficult for insurers to assess the likely severity of future cyberattacks. While most traditional commercial general liability policies do not cover cyber risks, standalone cyber insurance policies typically address a number of risks associated with data breaches or attacks. Chief among these is liability insurance to help companies cover costs, such as legal fees and court judgments, that may be incurred following the theft of enterprises data and the unintentional transmission of a computer virus that causes financial harm to a third party.


5 Data Governance Pitfalls to Avoid

Data Governance can be looked upon as building standard practices, processes and frameworks to facilitate the collection, identification, storage and usage of business information that an organization holds. The concept revolves around a simple objective – to make the right data available at the right time, to the right people, and in the right format. Data governance program is an important step to establish control over information flow by putting up rules, policies, and procedures to safeguard the access and usage of data. Lots of organizations have tried to implement enterprise data governance practices, but only a handful have succeeded in reaping the rewards. What’s the reason behind all these failures? In this article, we will take a look at the crucial mistakes that you must stay away from while implementing a data governance program for your organization.



Quote for the day:


"The hard part isn't making the decision. It's living with it." -- Jonas Cantrell


Daily Tech Digest - December 19, 2016

Aiming for resilience

For years we've been aiming at making our data centers more secure and rugged -- striving for high availability, reliability, and redundancy. Resiliency moves the goal of the truly secure data center one step further. Resilience -- the ability of a substance or system to spring back into shape -- is a measure of our ability to survive a serious threat and, in the case of EMP, to continue functioning in the face of a severe threat to just about every piece of equipment that we use. Setting up a data center to survive an EMP attack is not a simple thing, but some companies (e.g., see reference to Iron Mountian below) have done it. Pushing for needed upgrades to the grid is another matter. Making some assessment of your vulnerability -- business and personal -- is nearly unavoidable.


5 enterprise technologies that will shake things up in 2017

Prepare for the same thing to happen with virtual reality (VR) and augmented reality (AR)—with tablets and smartphones as the vehicle. According to IDC, 25% of enterprise IT organizations will be testing augmented reality business applications for use on smartphones by the end of 2017. “This may sound relatively aggressive, but the conversations I’m having with the industry and some surveys that we’ve run talking to IT decision makers show that there’s a really strong interest around augmented reality,” said Tom Mainelli, program vice president of the devices & AR/VR group at IDC, during a recent webinar, IDC Futurescape: Worldwide Wearables and AR/VR 2017 Predictions. The end game is head-worn AR hardware, such as the Microsoft HoloLens, he said.


Facial recognition to kick in for 2017

Facial and eye tracking will be used to augment childrens’ school tests, says Hong Kong-based F.S. Artificial Intelligence Ltd., an organization I met with at a TechCrunch Disrupt startup fair earlier this month. The organization has developed a way to use an off-the-shelf tablet device with a standard camera to capture feelings expressed by the kids as they answer questions. Gaze tracking evaluates the emotion of the individual while capturing the test responses and lets teachers analyze how receptive the kids are to the questionnaire. The company says it helps with mental health alerts and the effectiveness of the test design. For example, it can see if the kids get distracted because the questions are too easy. I had a chance to try the technology at the show. They used arithmetic on me, and I reckon the results pretty accurately reflected how I felt: I registered surprise when I saw the first (slightly difficult) question and happiness when I got the second (easy) question correct.


World will need to secure 111 billion lines of new software code in 2017

When an app has been fully coded, there's a rush to get it out the door. That's hardly the best time to start thinking about security. At that point, it may be too late. "The best thing (for software developers) to do is accept that security is just as critical to building software as safety is to building airplanes, and make a conscious decision to build security into your software development process" stated Frank Zinghini, founder and CEO at Applied Visions, Inc. (AVI), a software development company focused on cyber security, business applications, and command and control systems to government and commercial customers worldwide. "Worry about software security before you even start writing code, incorporate vulnerability scanning tools into your continuous integration system, and integrate security testing with your quality assurance process" added Zinghini.


This Free New Software Protects Your PC Against Ransomware

By default, the program suspends any activity it deems suspicious—even if it’s a legitimate encryption program that has some behavior in common with ransomware. It’s then up to the user to either enable the program, or allow RansomwareFree to permanently quarantine the malware. Using this approach, Eilat says that with RansomwareFree enabled about four files can end up encrypted before the security program detects the problem and stops it; however, he says, for most ransomware strains “RansomFree manages to stop the ransomware even before any file is encrypted.” ... It alerts you that the program placed some specially constructed files on your system that help RansomwareFree do its job. Eilat wouldn’t go into too much detail about what these files do. He would say they were there to be the “victims” of potential ransomware infections and to slow the malware down.


Human-less stores are now possible — and it might be the end of retail

The first, from Amazon, was a fully self-checkout store, where items are logged as they are placed into a cart. It uses a network of cameras and motion sensors to guess when something is purchased. The flaw? There are no people to clean up the mess when the software guesses wrong. It's like the world's largest vending machine. The second move was revealed a few days ago in Osaka, Japan, courtesy of Panasonic and the Lawson convenience chain. According to a report from The Wall Street Journal, which attended the Osaka unveiling, the reduced-associate stores are powered by an unspecified kind of electronic tag. The article didn't say whether they were RFID tags or not, but that is a likely candidate. It's item-level tagging, which is more accurate — and more expensive — than Amazon's camera approach.


Microsoft opens dataset for teaching computers to talk

Right now, the dataset is free to download for people who plan to use it in a non-commercial manner. Microsoft is sharing it in the same way it shares other open data sets that are used for training artificial intelligence programs. One of those is ImageNet, a database of tagged pictures that’s used for training image recognition algorithms. Microsoft used that database in developing the image recognition technology that now underpins products like Microsoft's Computer Vision API. People who want to read more about MS MARCO can download a research paper written by the team at Microsoft that built it. The team is also putting together a challenge that will evaluate models trained using the MS MARCO data. Evaluation scripts for that challenge are still under development.


It’s Time For Organizations To Automate Security

Security automation makes more efficient use of scarce resources, freeing them up for more proactive tasks. Existing threat defenses are already doing this, automatically and continuously watching for known attacks and blocking them before they get inside. Building on this, advanced threat defenses dynamically watch for anomalous behavior and act quickly to contain unknown threats from inflicting serious harm. Security information and event management (SIEM) software takes this a step further, applying new threat intelligence to historical events to see if any systems were previously affected, and applying appropriate countermeasures. The scale of these actions is beyond the capacity of even the largest, most experienced security team to complete manually in a reasonable timeframe.


Banks Turn to Mind Reading to Source Top Tech Graduates

“There’s definitely a challenge in the sector that’s born out of historical reputation and some of the legacy impact from the global financial crisis,” said Paul Aldrich, head of financial services technology at search firm Odgers Berndtson. It’s not just new tech firms that are looking to poach talent. New banking startups are also competing for young programmers. “We tend to find it easier to attract and retain people than the bigger banks,” said Tom Blomfield, a 31-year technologist who secured a license from the Bank of England for Monzo Bank Ltd. earlier this year. “People want to work on really hard problems from scratch with other talented people, rather than be small fish in a big pond, maintaining software that’s been there for 30 years.” Monzo also publishes its technical plans on the internet, which leads to developers seeking to join the firm, according to Blomfield.


MPLS routing undergoes change, as SD-WAN gains traction

The advent of SD-WAN means a recalibration of how enterprises deploy MPLS routing, which has been the most widely used WAN technology. It provides reliable performance, with QoS guarantees specifying throughput, delay and jitter. ... Internet access is much less expensive and can be put in place more quickly. Price per megabit can range between one-tenth to one-hundredth the cost of MPLS routing, but internet links do not offer throughput and QoS guarantees. To that end, enterprise traffic moving across the internet shares the same links as movie downloads, streaming video and vacation-picture uploads. Despite the lack of guarantees, SD-WAN customers have found that combining multiple internet or LTE connections alongside an MPLS link can achieve higher throughput and yield adequate QoS at a much lower cost than simply increasing MPLS capacity.



Quote for the day:


"If the doors of perception were cleansed everything would appear to us as it is: Infinite." -- William Blake


Daily Tech Digest - December 18, 2016

Information Is Now The Core Of Your Business

In many industries, the information collected by business is now more valuable than the products being sold – indeed, it’s the foundation for most of the free consumer internet. Traditional industries are now realizing that the data stored in their systems, once suitably augmented or anonymized, can be sold directly. See this article on the Digitalist magazine, The Hidden Treasure Inside Your Business, for more information about the four main information business models. Traditional IT systems were about efficiency, effectiveness, and integrity. These new context-based experiences and more sophisticated products use information to generate growth, innovation, and market differentiation. But these changes lead to a difficult cultural challenge inside the organization.


Swift and Objective-C Runtime Programming

In a highly dynamic language like Objective-C, the programmer has incredible power. You can open up core system libraries and place your own code inside of them. You can hook into the very fabric of method invocation itself, creating objects with an infinite number of methods, or create methods that wink in and out of existence over the lifecycle of an object. It is a staggering, dizzying level of power. But with great power comes great responsibility. The more power you have, the less power is left for the compiler. And so the Objective-C compiler has blinders on. Your code *looks* like a simple for-loop through an array. But how do we know you have not replaced NSArray with some object that has an infinite number of methods? How do we know the array is not procedurally generated and has an infinite number of elements? 


Bangladesh Bank Heist Probe Finds 'Negligent' Insiders

Former Bangladesh central bank governor Mohammed Farashuddin told Reuters that the government-appointed panel investigating the heist blamed, in part, the five low-level and mid-level officials. "They were negligent, careless and indirect accomplices," he told Reuters, adding that attackers had exploited vulnerabilities in the bank's information security defenses. "The committee came to the conclusion that the heist was essentially committed by external elements." A Bangladesh Bank spokesman didn't immediately respond to a request for comment on the commission's findings or with whom they've been shared. In the February heist, hackers attempted to steal $951 million from Bangladesh Bank's Federal Reserve Bank of New York account and move it into five accounts held at Rizal Commercial Banking Corporation in the Philippines via the SWIFT interbank messaging network.


60 Keyboard Shortcuts That Will Make You More Productive

Every day your work probably requires you to navigate lots of different operating systems, browsers, and software. That's why I've previously shared some brilliant hacks to make your life simpler--especially if you use Gmail, Excel, Word, Twitter, and Google search. Think about it. All that time you take hunting around through pulldown menus with your mouse adds up. Where the heck is that thing you're always looking for? Is under File, Edit, View, or somewhere else? This way of doing things is for the donkeys. Don't be a donkey! Wouldn't it be great if there were a "cheat sheet" that compiled the most essential keyboard shortcuts? Lucky for you, someone has done just that. Essay Writing Service Pro has created an infographic that compiles 60 essential keyboard shortcuts every office worker needs to know.


Predictive Marketing: The Next Must-Have Technology for CMOs

The real value lies in finding a predictive platform with open architecture — one that integrates with your applications for things like CRM, marketing automation, or business intelligence (BI) and uses them to make accurate and actionable predictions. Reliable first-party data on wins and losses is especially important for the success of predictive models. To understand which leads will convert to customers in the future, predictive tools have to pull data from a system of record like Salesforce, Microsoft Dynamics, Insightly, Marketo or HubSpot and identify the characteristics and behavior of prospects that closed. An open architecture also means you don’t have to disrupt current workflows adding more complexity to daily activity. Your marketing team can see predictive insights like lead or account scores and compare them to campaign conversions, right in the tools they are accustomed to using.


Three Ways To Ensure Your Data Tells The Right Story

Good visualization tools can help you create and choose graphs and images that will help clarify the data rather than confuse it. But, as I said above, be careful not to equate more visualizations with better storytelling. Too many companies give their audience the data all wrapped up in beautiful graphs — without any context. The goal of visualizations should always be to provide context and clarity to the story being told. Companies are moving fast to fill the knowledge and skills gap left by the lack of qualified data scientists by creating DIY data reporting and visualization tools. These tools are important and help everyone within a team be able to access their data and probe it for associations and insights. But the downside of these tools is that companies see them as a replacement for the data scientist, who is in actuality the data storyteller.


Time for change

In progressive organisations, Lötter states, more visionary CIOs have embraced a cloud strategy to maximise the value for their organisations. "In these organisations, we've seen enterprise architects educated on cloud, delivery options, integration and security. They work with business to understand requirements and help introduce cloud in a structured manner. Maturity levels of enterprise architectures vary significantly across South African business, and we believe when applying enterprise architecture in the full sense, it means translating business strategy into an operating model supported by process, people and technology architectures. When enterprise architecture is applied in this way, cloud is seen as an enabler and not penalised by a narrow IT-focused enterprise architecture to gain control over the IT landscape and budget."


Artificial intelligence finds its way into business through sales

“With AI, customer interactions become fine-tuned and ultimately smarter with every interaction and additional piece of data,” she said. It’s about using the power of that platform to be a better salesperson, and giving them more time to spend working with customers and closing sales. “For a salesperson to predict where to spend their time or take next best action — they need the right data at the right time. They have to take data from every data source and they have to have a cognitive platform in place to evaluate that data to make decisions,” she explained. We are also seeing intelligence being applied to customer service with the increasing use of bots to handle initial contact with customers. The idea is to have the bot deal with simple tasks, handing off more complex interactions and requests to human operators to handle.


Buyers Beware: Data Visualization is Not Data Analytics

For an analysis tool to be truly useful to an organization it must be updated constantly to account for changes. But this can easily lead to bottlenecks forming in businesses when updates are left to be done by a single factor or department such as IT. Visualization tools that don’t have preparation capabilities will pull their data from decentralized sources that can easily fall out of sync with a number of collaborators accessing them. Then you get a big mess of different data with unreliable dashboards and reports because it becomes extremely hard to keep on top of who has the latest numbers. The more users you have accessing the data sources and changing or updating it, the more errors you get, and the harder it becomes to use the system.


Polymorphism of MVC-esque Web Architecture: Real Time Reactive Fulfillment

At the heart of MVC architectural approach is observable event-driven fulfilments of synchronization between the user’s views and their related real or virtual world that the views reflect upon. The views are expected to, with or without additional commands from the user, react to the changing world. This ideal has been reflected in many MVC realizations from the original desktop GUI to modern augmented and virtual reality. As discussed in the WMVC classification article, this fundamental idea had been largely absent in web applications over the first two decades of the web age. During this time, web applications are dominated by sWMVC-based approach. It has been somewhat revitalized in WUI application development community in recent years. This new movement has been driven by a number of recent technological offerings and standardized protocols.



Quote for the day:


"Think like a man of action, act like a man of thought." -- Henri-Louis Bergson


Daily Tech Digest - December 17, 2016

Bitcoin Is Being Monitored by An Increasingly Wary US Government

This ability to financially disrupt, disable and dismantle nefarious networks, is crucial to U.S. national security, Treasury officials say. It has proven effective for more than a decade and is often strongly preferable to deploying troops. “We have made it very difficult for members of the Islamic State to raise or move money around the world these days,” Zarate says. “Even Iran had a hard time finding safe havens.” In fact, years of financial pressure from the U.S. and its allies helped force Iran to negotiate with the White House and sign a landmark nuclear deal last year. The biggest concern the U.S. has about virtual currencies, Zarate says, is that terrorists and other enemies might create one so powerful and so untrackable, that they’ll no longer need the global banking system, which the U.S. uses to financially starve them.


10 Steps to Train a Chatbot and its Machine Learning Models to Maximize Performance

The Watson services rely on a variety of machine learning algorithms, most of which fall in the supervised machine learning category, which learn the specifics of the problem from sample labeled data and help make predictions on unlabeled data. Training a supervised machine learning system involves providing it with representative inputs and corresponding outputs and the system will learn by example. These pairs of representative inputs/outputs constitute the “groundtruth” from which the system learns. ... Training NLC would require providing a groundtruth which includes representative utterances (input) and the corresponding intents (output). NLC would then learn which utterances map to which intents. Note that it not only will be able to extract intent from utterances it has seen but it can also extract intent from any utterance based on similarity of such an utterance to what is available in the training data.


Talent Development for the Digital World

From a skills perspective, innovation and learning ability are becoming key requirements. Innovation is not limited to products anymore: It cuts across processes, organization design, reviews, performance management, and rewards. Hence this has become a requirement across all functions within the organization. While the debate on whether innovation is a trait or a skill that can be developed is still raging, the need for it is only burgeoning. In a tongue-in-cheek manner, we can certainly say that learning new skills is necessary to a company’s success. How organizations can create a platform that propels employees to learn and adapt is becoming a key success factor in reskilling the existing workforce and preparing them for the digital future.


How to Use Thought Experiments to De-Risk Your Startup

Sometimes you miss signs that things aren't working. Maybe engineers keep going to Google or Twitter instead of accepting your job offers, or maybe very few customers agree to see your demo after an initial discovery call. When you're scrambling day-to-day, you might think, "if 5% of people want to see a demo, then I should call at least 40 people daily." Months later, you realize that the low demo rate was a sign that your product didn't fit the market's needs. It's helpful to step back and ask yourself if the things that you're struggling with today are a sign that you need to optimize or double down on your processes, or if they're a sign of something more significant, like working on the wrong product or targeting the wrong job candidates.


Artificial intelligence creeps into daily life

A self-driving car, for example, can easily navigate around Google's home base in Mountain View, California, but may have more problems around the Arc de Triomphe in Paris, where driving behaviors are less predictable. Alahi said robotics needs to understand the unwritten social behaviors used in daily life, which can vary from one culture to another. A robot, for example, might cut through a group of people in a train station to find the most efficient path, unknowingly violating social rules on personal space. "There are situations where technology is not yet capable of understanding human behavior," said Alahi, who is part of a research project using a robot, with the aim of understanding pedestrian behavior. These kinds of robots may be technological marvels, but they also raise fears that they could get out of control, concerns heightened by movies like "Terminator."


Worm on the sensor: What happens when IoT data is bad?

The harsher the surrounding conditions and the more isolated the device, the worse the bad-data problem is likely to be. In addition to agriculture, industries like oil and gas and energy distribution face this. But it’s not just far-flung sensors that have problems. Even in a hospital, a blood oxygen sensor clamped on a patient’s finger can start giving bad data if it gets bumped into the wrong position. On top of that, some IoT devices malfunction on their own and start spewing out bad data, or stop reporting at all. In many other cases, human error is the culprit: The wrong settings mess up what the device generates. ... John Deere equips its giant farm tools with sensors that detect whether the machines are working right. The company’s ExactEmerge planter, which rolls behind a tractor planting seeds across a field, has three sensors per row of crops to detect how many seeds are being planted and at what rate.


Africa 2017: Smartphone penetration, Open Data and less online freedom

The demand for cheap smartphones is boosting penetration rates and is affecting the data bundle business for the majority of telecom companies. Safaricom, Kenya’s largest telecom company has seen its profit shoot up through mobile internet services. The company said during its half year result ending September 2016 that: “Mobile data revenue, which accounts for 13.7% of the firm’s service revenue, grew at 46.3% to Sh13.4 billion (US$134 million), driven by growth in active mobile data customers to 14.9 million, increased bundle users and smartphone penetration.” According to research firm Ovum, the smartphone penetration rate will grow at 52.9% year- on-year. Currently there are 293.8 million smartphone users across the continent. Ovum predicts that there will be 929.9 million smartphones by the year 2021.


Self-Driven Car Simulator Using a Neural Network and Genetic Algorithm Training

Artificial Intelligence impacts human life in many ways nowadays. An example is in the auto industry; many companies are trying to make their cars smarter. The cars can self-drive, avoid obstacles, find destinations … without controls from human. This paper is about a car simulation program in which the car itself will move without any controls from outside. The approach uses a Neural Network and a Genetic Algorithm to train the car by making the car learn after each time it fails to finish the track. ... Every computer has different speeds so we need a mechanism to normalize that to make the game run at the same speed in any computer. We have 2 main methods: update and render. Usually, the game runs at 60 fps so the update method will be called 60 times per second and the render method will be called as fast as the computer’s speed.


Getting Started With JMeter: A Basic Tutorial

Performance testing and load testing are the practices of ensuring that websites and apps perform under heavy loads, from different geolocations, and for different user scenarios. If you followed the Pokemon Go craze or heard about Macy’s crashing during the last Black Friday, you know the importance of performance testing and how crucial it is for businesses. Poor performance, whether website crashes or slow page loading, equals an immediate and long-term loss of revenue, as it creates a bad reputation and immediate churn. ... Open-source and JAVA-based, JMeter simulates browser behavior (though it’s not a browser!) by sending requests to web or application servers for different loads. JMeter can also parse the responses. On your local machine, you can scale up to approximately 100 virtual users, but you can go up to more than 1,000,000 VUs with CA BlazeMeter, which is kind of a JMeter in the cloud.


Why Artificial Intelligence Will Be Analog

In essence, analog is similar to the human brain. Consider the human body in comparison to a fitness monitor, like a FitBit. These devices are both analog and digital. The analog sensors are what collects the data about the number of steps your take, your heart rate, etc. That data is then converted using an analog-to-digital converter, so that the readings can be more easily processed using the algorithms in the microprocessor of the device, putting the raw data into a form that we can use. Over time, the device “learns” your patterns, so it can make recommendations as to the number of steps you should take, how much sleep you need, etc. This is a form of artificial intelligence, and the same concepts apply to other AI devices as well. Essentially, as science historian George Dyson points out, the brain itself is an analog computer. Our senses take in information in analog format, whether a sight, sound, smell, etc., which is then processed by the neural pathways of the brain.



Quote for the day:


"Judge your success by what you had to give up in order to get it." -- Unknown


Daily Tech Digest - December 16, 2016

How Startups Can Use Big Data To Their Advantage

Not using big data is no longer an option; it is a necessity. Taking into account the amount of data that is generated every year and the key information they are missing out on could prove to be disastrous for the future success of the company. Today, the world is all about making well informed decisions and delivering customers with the most efficient and robust service. These can only be achieved by carefully studying the market trends, deriving key insights and building business strategies upon them. Small businesses can use big data solutions as they have become much more affordable in recent years. Additionally, they are simple to implement and use and are many times automated. These surely eliminates the biggest fears of startups thinking of using big data. It also gives them all the reasons to use it as long as they know how to best use it for their business.


The next wave of IT: Where do we go from here?

The tightly coupled, procedural, synchronous computing models we've been using for decades don't just stop working, where they do still work, they become inefficient. They're also associated with a new set of endpoints, not just the familiar PCs and smartphones, but also wearable devices, wall screens, and a whole host of IoT hardware, from devices like Amazon's Echo to Apple's Watch, and to the screens in your car. One aspect of this shift is that it no longer matters where an application is running. Thanks to virtualised userlands via containers the same code can run on a phone, on a PC, on a cloud server - and now it can also run in the network, thanks to container support in the latest core routers and switches. We've virtualized not just compute and storage, virtualized networks are at the heart of our modern clouds. User interfaces can take advantage of flexible web technologies, bringing responsive design across all our platforms.


GitHub Is Building a Coder’s Paradise. It’s Not Coming Cheap

In GitHub’s cultural hierarchy, the coder is at the top. The company has strived to create the best product possible for software developers and watch them to flock to it. In addition to offering its base service for free, GitHub sells more advanced programming tools to companies big and small. But it found that some chief information officers want a human touch and began to consider building out a sales team. The issue took on a new sense of urgency in 2014 with the formation of a rival startup with a similar name. GitLab Inc. went after large businesses from the start, offering them a cheaper alternative to GitHub. “The big differentiator for GitLab is that it was designed for the enterprise, and GitHub was not,” says GitLab CEO Sid Sijbrandij. “One of the values is frugality, and this is something very close to our heart.


Ten Myths of Cloud Computing

The cloud can be cheaper, but the reality is that when you look at total costs, you could very well end up paying more. Chances are you are paying more because you are getting more. Being in the cloud allows a greater degree of agility and scalability; it provides access to security, storage, applications, and other benefits supplied by your cloud provider. It is possible that moving to the cloud will save you money, but it should not be your organization’s primary goal. The decision should be driven by benefits available through cloud computing – benefits that are not free. You might save money if, for instance, you have variable workloads and variable demands. A cloud service provider (CSP) can enable you to switch servers off during times of low demand, and to spin up more virtual machines at high-demand times, charging you only for the computing power you use.


Thanks to mobile computing and the cloud, we’re all starting to work from home more

What’s surprising, however, is that the biggest increase won’t be coming from trendy new alternative workspaces or other nontraditional worksites. Instead, it’s working at home. Toiling in your PJs (or whatever attire you choose to wear at home) is expected to jump from 11 percent of the total work week to 16 percent in two years.  ...  Not surprisingly, when people were asked in a separate question about the benefits of working at home, the top reason they cited was — you guessed it — work-time flexibility. Clearly, the move to mobile computing devices, more cloud-based applications and internal IT support for enabling work from remote locations has had a large impact on employee’s expectations about how, when and where they can work. And, well, there’s no place like home.


The Shift to Cloud Security Spend Continues

According to the IDC report, the business segments that will have made the largest investments in security this year include banking at roughly $8.6 billion. Banking is one of the four industries that will constitute nearly 40% of global security spending in the next five years, followed by discrete manufacturing, government, and process manufacturing. The industries that will grow the most rapidly in the next five years, each growing more than 9% annually, include: healthcare, telecommunications, utilities, state and local government, and securities and investment services. ... I think another aspect of the spend is the result of a little fighting the battles of today with the strategies of yesterday when it comes to cloud security. Too many organizations are investing in legacy toolsets that have been “cloudwashed” as cloud security alternatives.


How DevOps is changing business and moving companies towards a cloud-first strategy

The shift in moving to a DevOps-oriented view of systems development and management requires that teams align according to the products they are working on rather than by technical or functional discipline. Historically, software design and production environments are owned by two disparate teams; so removing the separation between Development and Operations gives developers the responsibility for the operational system and gives operations teams the ability to influence and work within the development lifecycle. DevOps is not just a realignment of teams; it is also a cultural shift. To be successful, businesses have to be able to take advantage of this shift. Change is hard and is something that people generally struggle with. The key is to find tangible ways to help teams connect with the value of the transformation on a business, technical and personal level.


Lessons learned from the 7 major cyber security incidents of 2016

Cyber incidents dominated headlines this year, from Russia’s hacking of Democrat emails to internet cameras and DVRs launching DDoS attacks, leaving the impression among many that nothing should be entrusted to the internet. These incidents reveal technical flaws that can be addressed and failure to employ best practices that might have prevented some of them from happening. The most important lesson is that cybersecurity is a perpetual battle in which neither side gets the upper hand for long and that requires constant incident post-mortems to discover the next measures to keep data and communications safe. Here is a look at seven such incidents and what lessons they afford.


Conduct a power cycling test to stay ahead of hardware failures

If an unexpected system crash or power disruption causes an unplanned system reboot, the system's internal firmware may see these problems and refuse to complete the boot process. For example, if the server's south bridge chip fails and USB or onboard disk controller functions don't initialize or respond, the boot process will stop, even though the enterprise may not use the server's USB ports and accesses storage across a network instead. Now, IT must attempt to recover from an unexpected disruption and address defective systems at the same time. To avoid this, conduct a periodic and proactive power cycling test to force a system restart in low-level hardware. Instead of scrambling during unplanned outages or downtime, use planned restarts to ensure data protection and migrate VMs or storage instances off target devices in an organized manner.


Quantifying Cyber Risks

“Cyber is absolutely a top risk in the organization. In fact, we’ve actually begun disclosing it as such in our public filings, alongside our business and operations risks,” said Eric Dobkin, the director of insurance and risk management at Merck. “It’s gotten attention from all levels.” Similarly, Laura Winn, the director of risk management and treasury at Time, said the media giant’s board considers attacks on the company’s computer systems a “top-three risk.” Prompted by the board, the company’s risk management department is working to quantify the company’s exposure to cyber attacks so that it can transfer some of the risks to insurers, she added. Culling the media company’s cyber-risk-management information together in a meaningfully predictive way is a tough task, however. That’s because “our organization is siloed,” she said.



Quote for the day:


“Too many of us are not living our dreams because we are living our fears.” -- Les Brown