August 17, 2015

Five Critical Layers of Next-Gen Data Center Automation and Orchestration

If you look at the modern data center and cloud landscape you’ll notice a lot more interconnectivity and new capabilities to dynamically pass resources. Some solutions even allow for cross-connects for the easier flow of data. The interesting piece here is how all of these technologies, which are currently influencing the end user and corporation, are directly pushing for the evolution of the modern data center through data center automation. Cloud computing, Big Data and IT consumerization have transformed the data center into the central hub for everything. Today, there are entire organizations that are born from a cloud model which resides within the data center.


Polyera Wove Band Boasts Flexible Display

At a basic level, a display is made up of two parts: The first is a frontplane, which is the layer that makes the image you see. The second is a backplane, which is an array of TFTs that control which pixels in the frontplane turn on and off. With Polyera Flexible TFTs, the backplane can be made flexible, making the full display flexible, in contrast to traditional display technologies where the backplane has previously been a constraint. "Most attempts to make flexible displays have relied on depositing traditional electronic materials, such as silicon, on plastic substrates," the company explains on its website. "This approach allows the creation of products with displays in a fixed curve, but the brittleness of these electronics layers makes them unsuitable for products which are dynamically flexible.


Key findings from the 2015 US State of Cybercrime Survey

It’s no wonder, then, that we found rising concern among the 500 US executives, security experts, and others from the public and private sectors who participated in the 2015 US State of Cybercrime Survey. In fact, 76% of respondents said they are more concerned about cybersecurity threats this year than in the previous 12 months, up from 59% the year before. Organizations must summon the vision, determination, skills, and resources to build a risk-based cybersecurity program that can quickly detect, respond to, and limit fast-moving threats. The US State of Cybercrime Survey is a collaborative effort with PwC, CSO, the CERT® Division of the Software Engineering Institute at Carnegie Mellon University, and the U.S. Secret Service.


Target launches new beacon program using a system in need of change

This is the world we live in now. With each new evolution of The Internet of Things, we have to face the fact that every step forward will be faced with a step or two backwards, as those that can... do. Unfortunately, there is no getting around it. Hacks will happen. Should you create something of interest, something on a network, it will be found and it will be cracked. The more you advertise something, the more will know about it.And if you think there isn't a monetary gain to be had from hacking your system... think twice. Your swell new app or system has a user-base, that means there's a database of users that can be sold to the highest bidder.


Are comatose servers your next big IT headache?

To get a sense of the cost of the problem, think about how much you could save if you just turned off a third of the hardware that you manage – got rid of or re-used the licensing, unplugged the hardware, and liquidated the rest of it. It’s a problem with an enormous cost, and even if the study is half wrong, at 15 percent, that’s still a significant cost. Why does this happen? Fundamentally it comes down to the problem of not knowing what you have and what it is doing. It used to be a little easier to keep track of things because in order to roll out new servers, you had to requisition one, send a PO, receive it, inventory it and mark it, so at least you knew what type of silicon you had on your server closet racks. The operating system and software was another story, but at least you had a fighting chance.


For CIOs invested in digital transformation, think platform

It's the technology, the data, the people and the processes that hardwire some capability into your organization. One place where this was attempted in many companies was the implementation of an ERP and the associated transformation. Companies that had all of these processes were messy, disjointed and they suddenly said, 'We ought to have standard processes around finance, around supply chain.' So they built platforms. Some of them were really good -- this is why I've so enjoyed studying Lego; they went after their supply chain and fixed it. Campbell's Soup went after theirs; Nordstrom has an unbelievable supply chain platform.


3 security mistakes developers make with online services

One big danger with online source code comes from the data that is committed there. For example, if developers use a public repository to host the code of an internal application, they could be inadvertently exposing corporate infrastructure details on the internet. Sometimes configuration files refer to internet-facing test systems, user names, passwords, or hidden interfaces. Other intellectual property includes proprietary algorithms, undocumented APIs, or even production data that is being used as test data. Private keys (for SSH, for TLS web servers, for mobile app signing, and more) are found frequently in online repositories, where it is easy to search for them. Small to medium-size businesses are especially likely to leverage free or nearly-free online services this way.


Can big databases be kept both anonymous and useful?

This is a true dilemma. People want both perfect privacy and all the benefits of openness. But they cannot have both. The stripping of a few details as the only means of assuring anonymity, in a world choked with data exhaust, cannot work. Poorly anonymised data are only part of the problem. What may be worse is that there is no standard for anonymisation. Every American state, for example, has its own prescription for what constitutes an adequate standard. Worse still, devising a comprehensive standard may be impossible. Paul Ohm of Georgetown University, in Washington, DC, thinks that this is partly because the availability of new data constantly shifts the goalposts. “If we could pick an industry standard today, it would be obsolete in short order,” he says.


Hackers Find Infiltrating Government Computers is not Mission Impossible

“You would think the federal government would have better safeguards, but ultimately they are only as strong as their weakest employee,” says Daugherty, who has spoken at cybersecurity gatherings. “That boils down to knowledge and training.” Daugherty says security risks are one reason there are concerns about Hillary Clinton using a private server for her e-mail when she was secretary of state. “The potential for sensitive e-mails to be lost is the issue,” he says. “Whether they actually were or were not lost is not the issue, so Hillary's e-mail headache isn't going away anytime soon.” He suggests tips that both government agencies and private businesses need to remember to defend against hackers:


Optimization Analytics Comes to the Mass Market

As computing capabilities became increasingly affordable, companies could use more complex algorithms to handle ever more difficult optimization problems. For instance, the airline industry used it to determine how best to route aircraft between two cities and to staff flight crews. Not only can software find the best solution for scheduling these assets in advance, it also can rapidly re-optimize the solution when weather or mechanical issues force a change in how aircraft and crews are deployed. Airlines were also in the vanguard in the 1980s when they started using revenue management techniques. In this case, the optimization process was designed to enable established airlines to compete against low-cost startups.




Quote for the day:

"The Internet, mobile and social media have ushered in a new normal when it comes to customers' expectations." -- Paul Cho

August 16, 2015

Visa to Deploy Blockchain Research Team in Bangalore, India

Considered the innovation hub of India, Bangalore, which was selected in November to host Visa’s technology center in that country, offers Visa the ability to attract world-class talent in a thriving community with world-class innovation centers and technology facilities. Other Indian technology companies, such as Tata Consultancy Services and Infosys, have invested in blockchain technology. In fact, almost a third of the work done by Indian IT firms is for global banks, and many global banks are trying to jump on the blockchain bandwagon before it’s too late. Visa itself, which outsources part of its technology development to Infosys and other Indian firms, said it is open to working with some of them on blockchain-related developments.


Andrew Duguay, Prevedere on Economic Intelligence from Integrating Public Datasets

The sheer volume of analysis would have taken a detrimentally long time to do with traditional tools such as Excel or legacy statistical packages, making this a new and unique way of harnessing and finding analytical value in Big Data. Our patent pending software uniquely provides any company a competitive advantage. ... Prevedere is a gathering place for publicly available data that is structured, time series, and could possibly relate to businesses.  Businesses are using Prevedere to see how their internal metrics are relating to common economic indicators such as Gross Domestic Product, Housing Starts, Consumer Sentiment, Disposable Personal Income and the Purchasing Managers Index.


How Big Data is Driving the Consumerization of Health Care

In conjunction with mobility, big data is changing the way patients engage with their doctors and experience their treatment. Research has found that three out of five patients would choose telehealth visits over in-person appointments for minor check-ups and follow-ups. In PwC's survey, more than 50 percent of respondents would feel comfortable sending a digital photo of a rash or skin problem to a dermatologist for an opinion. Not only is the technology for "virtual treatment" available, but 64 percent of surveyed patients expressed their willingness to adopt new, non-traditional ways of seeking medical attention. In a world where services are available in an instant, doctors must start treating their patients as a customer to continue to meet their needs.


3 Business Alignment Opportunities for CIOs

Most CIOs agree that they need to focus most intently on aligning with the line of business. “While CEOs can have a strategic plan, they do not operationalize it into strategic objectives. It filters down and becomes operationalized by the line of business.” However, CEOs and CIOs need to connect what IT is doing better to their business strategy. This is exciting because it is a new window of opportunity for the CIO to get IT’s priorities right and thereby, secure a better relationship with their CEO. This matters because the CIOs that I am talking to see a strong CEO relationship as being critical to having IT viewed as a strategic business unit.


Bruce McConnell Interviewed by The Open Group

There’s also a reflection of the lack of trust between the major cyber powers these days. How do you build trust? You build trust by working together on easy projects first, and then working your way up to more difficult topics. EWI has been promoting conversations between governments about how to respond if there’s a server in one country that’s been captured by a bot and is attacking machines in another country. You have to say, ‘Could you take a look at that?’ But what are the procedures for reducing the impact of an incident in one country caused by malware coming from a server in of another country? This assumes, of course, that the country itself is not doing it deliberately. In a lot of these attacks people are spoofing servers so it looks like they’re coming from one place but it’s actually originating someplace else.


Secure or not, IoT is everywhere. Get used to it.

One of the ways we can avoid IoT security paranoia -- in addition to standardizing on better authentication mechanisms is to move to the IPv6 stack for all IoT devices and to have IPSec be a requirement for device to device and device to cloud communication. And to use much stronger and longer encryption keys. This is really a necessity because we've effectively run out of IPv4 address space and device proliferation is going to make IPv6 a virtual requirement. But that means broadband and wireless service providers as well as consumer and carrier network equipment manufacturers and the IoT vendors need to get on board with this quickly. And yes, longer/stronger encryption keys for Wi-Fi networks as well as standardizing devices on the current WPA2+AES+CCMP implementation and using end-to end,


Clearing Pathways for Entrepreneurial Innovation - Introduction

Disruptive, transformative innovation is by definition unchartered. Entrepreneurs who propagate revolutionary ideas have the power to reshape markets. This can unseat incumbents and have a short-term, negative impact on jobs. It is no surprise that policy-makers and regulators in many cases have an uneasy relationship with this kind of innovation. ... This report is part of a larger effort by the World Economic Forum to understand entrepreneurship and how policy-makers can best support it. The report focuses on disruptive entrepreneurs, due to their outsized impact on industry transformation and the current scarcity of an effective policy discourse regarding disruptive innovation.


Biometric security: Authentication for a more secure IoT

Consumers are becoming more familiar with, and comfortable with, on-device biometrics. The latest Apple and Samsung mobile phones, as well as many new desktop and laptop computers, contain embedded biometric sensors. These devices also include a Trusted Platform Module, or Trusted Execution Environment, that handles the validation of biometric information separately from the device’s core operating system. This is an important distinction, as those core operating systems are susceptible to malware. When it comes to verifying identity, the IoT has another important distinction. When authenticating to a smart lock, or even a smart car it is important that authentication take place on the smart device rather than on the user’s end.


Seven sins – 4: The Meaning Mistake

Once again, though, don’t laugh at other people’s mistakes, because the enterprise-architecture field is barely any better. If you ask for a standard definition of obviously-important terms such as process or service or capability – let alone enterprise or architecture – you’ll discover very quickly why the collective-noun for people in our trade is ‘an argument of architects’. It’s possible, with some care, to build definition-sets that are consistent within themselves for some aspects of architecture: but there’s still no consistency across the overall space at all – and, by the nature of what we’re dealing with, probably never will be, either.


5 things only disruptors know about the future

There is no “common thread because disruption can come from different directions”, believes Bill Gurley, investor in Uber, Zillow and OpenTable. “Industries get disrupted for different reasons. Technology can disrupt an industry” but so can other things, as explained by Clay Christensen’s Innovator’s Dilemma. To identify opportunities for disruption Gurley proposes to ask, “Where does technology have the opportunity to materially change the user proposition or the user experience? There is so much venture capital available today that you’ll see “Uber for this, Uber for that” but I’m not a believer that every industry needs disruption. ...”



Quote for the day:

"The quality of the company?s board has now become an important evaluation factor for institutional investors." -- Russel Reynolds 

August 15, 2015

Refactoring for Software Design Smells

Design smells can have many roots, some are caused by limitations in the programming language (e.g. lack of generic programming support in early Java versions, or the missing lambdas prior to Java 8) others by inexperienced programmers (e.g. applying design patterns without understanding their drawbacks) or quick hacks that are made under time pressure. The book focuses on structural design smells in common object oriented languages like Java, C# and C++, so it's not about software architecture or implementation smells specific to a programming language.


The Promise and Peril of IoT

Healthcare providers are among the earliest to adopt the IoT. The wider deployment of electronic medical records (EMRs) and deployment of telemedicine technology that relies heavily on the type of remote data collection needed IoT to take it further and this convergence is expected to fuel the growth of IoT. With IoT, patients can submit their vitals from home without having to personally visit their physician and thus experiencing an enhanced and timely care, which could be life saving many times. This also helps in healthcare providers innovate further and come up with preventive care plans. Typical IoT devices that we see now are the fitness trackers, smart watches and other wearable devices like smart shoes.


Disrupting beliefs: A new approach to business-model innovation

Executives can begin by systematically examining each core element of their business model, which typically comprises customer relationships, key activities, strategic resources, and the economic model’s cost structures and revenue streams. Within each of these elements, various business-model innovations are possible. Having analyzed hundreds of core elements across a wide range of industries and geographies, we have found that a reframe seems to emerge for each one, regardless of industry or location. Moreover, these themes have one common denominator: the digitization of business, which upends customer interactions, business activities, the deployment of resources, and economic models.


Top 5 trends that are making life easier for data professionals

Data engineers design, build and manage the data infrastructure. They develop the architecture that helps analyze and process data in the way that's most appropriate for the organization, while making sure those systems are performing smoothly. As a result, they work closely with the developers. The application developer creates, tests and programs applications software for computers. At the end of the priority list comes the application designer. Applications fueled by data need to be usable by everyone; it’s said that the app should be so well designed a cat could use it. As business requirements move us into a truly insight-driven economy, data professionals must alter their work methods accordingly.


Interview: Government digital chief Mike Bracken – why I quit

“It is a matter of fact, not opinion, that despite spending over £6bn a year on technology, digital and associated operations, there isn't a government service [developed by a department] that could be considered as a platform, as in that it works for all parts of government. That is a matter of fact,” he says. “We can't just keep making or buying technology solutions in one department and then just chucking it over the departmental wall and saying, 'That will work for the rest of government', because it never does. Ever. New platforms for all of government have to be designed and architected thoughtfully, and probably not by the same people who are fixated, rightly, on in-year policy delivery and massive change to existing service provision.”


Want to be totally secure on the Internet? Good luck

So if I wanted to stay as safe as possible, I would never use Wi-Fi. Experts say most Wi-Fi isn't trustworthy, particularly if it's accessible to the public. When you walk around with your phone's Wi-Fi turned on, your device constantly "probes" for the nearest signal. You've turned your phone into a wandering baby bird, who walks around with a giant name tag asking every signal it finds, "Are you my mother?" Hackers are walking around trying to scoop up those signals. .... I also try to avoid email-based attacks. Called phishing emails, they're emails that seem legitimate but actually contain hacking code or a link to a fake website. So, don't click on links from unknown senders (and be aware that Internet ads might be malware in disguise). Click at your own peril.


Hybrid API Management Architectures Done Right

This pattern is as old as networking itself with a separation of the control plane and the data plane, but it is different to the way most vendors apart from ourselves have architected API management today. These other approaches have essentially fallen into two camps: 1) “route all API traffic through our cloud” or 2) “deploy numerous individual on-premises gateways with a cost per gateway”. Both of these cause single points of failure, deal poorly with scale and end up with oversized costs. When considering APIs for Microservices, IoT and many other modern challenges, it becomes even more obvious that separating how traffic is tracked and controlled from the point of delivery makes even more sense. Control and Data planes should be separate but talk to each other.


Incentivizing Performance in Cloud and Outsourcing Contracts: Key Points

To augment those performance warranties, a common approach is to use a “service level agreement” (SLA). The SLA is a familiar and essential feature in information technology-oriented agreements, such as outsourcing, cloud computing, software-as-a-service and the like. When properly structured and negotiated, SLAs can be an effective tool for more nuanced vendor management than a performance warranty alone could afford. This article will catalog some of the best practices for structuring a service level agreement, and discuss elements enterprise corporate counsel can put to use in the IT and service contracts that come across their desk.


Cloud Computing and the Digital Enterprise:Security Challenges and Opportunities

Digital transformation is leading organizations to adopt cloud, SDN, converged infrastructure and containers. This IT transformation has opened the door to new threats and cyber attacks. Security needs to be built into the fabric through a distributed system that enables visibility and control to ensure comprehensive protection of virtualized and cloud assets. Join this webinar to find out:
What are the top enterprise trends in data center transformation – regarding leveraging cloud, SDN, converged infrastructure and containers?; What are the current technology gaps in today’s security and visibility solutions?; Why are they needed?; and What is the business impact of these gaps?


Analytics Success Requires 3 Types of People

The human element of big data and analytics is probably the most critical factor in building a successful program, but it’s also the least understood. When people think of analytics, they often think of technology and data – and while the sophistication of technology is enabling the capability, the true value lies in the hands of the human beings interpreting and applying the analytics. In other words, analytics provides the greatest value when big data enables big judgment. However, that value will always be limited by how well team members are prepared to work in an analytics-driven business. So where does an organization start? Leaders must first recognize that analytics skill sets must be developed in all of their people, not just the data analysts.



Quote for the day:

"The safest way to get what you want is to deserve what you want." -- Charlie Munger

August 14, 2015

Federal CIOs embrace IT reform, but struggle to move forward

"Federal agency IT execs are neck deep in compliance requirements and mandates," O'Keeffe says. "The history of federal IT is littered with empty, unfunded mandates that failed to deliver value." A common refrain heard in federal IT circles is the admonishment against trying to "boil the ocean." That amounts to an appeal to take large, sweeping calls for reform like FITARA and break them down into smaller, more manageable pieces, and act on them iteratively. In a statement, Rep. Gerry Connolly (D-Va.), one of the authors of FITARA, praises the administration's "efforts to kick-start implementation," but says the low levels of awareness among agency executives about OMB's guidance are a cause for concern.


Rent-A-Botnet Free Cloud-Based Servers May Encourage Cyber Warfare

Cyber warfare extends beyond the virtual and can have a real-life impact on the lives of real people. It's not impractical to assume that within the next 10 years, a widespread attack will be launched against a nation and its people. This attack can result in widespread harm that results in a loss of life or property with a financial impact of billions of dollars. Consider a cyber attack where a nation's transportation system is controlled by an external group of hackers, and you can begin to see how a scenario could unfold that is scarier than the prospect of nuclear detonations. Free servers can be used to heist intellectual property, infiltrate infrastructures and jeopardize high profile individuals email accounts and personal data.


How to hack a Corvette with a text message

This isn't the end of connected car security problems this year. On Tuesday, researchers from the University of California demonstrated at the USENIX security conference how to tap into cellular networks in order to gain wireless access to vehicle driving functions. A dongle, available commercially, is often used by corporations and insurance firms to monitor where and how a car is being driven by employees. Cheap and convenient, nevertheless, security vulnerabilities could place these fleets and their drivers at risk. The control unit is plugged into a vehicle's onboard diagnostic (OBD-II) port, allowing the device to monitor speed, distance and braking -- before sending this data to insurance companies.


Cloud Native Application Platforms – Structured and Unstructured

With so many choices in the market, it’s critical to have alignment between business goals and technology-decision-makers. Instead of measuring the Cloud Native platform based on traditional IT metrics (e.g. cost-reduction), technology teams need to think in terms of business metrics (e.g. time-to-market, market-penetration, customer-satisfaction). Platform vendors, whether they deliver Structured or Unstructured architectures, must be able to clearly show how their technology enables those critical business metrics. ... For many CIOs, creating a PaaS platform strategy will be a top priority in 2015 and 2016. This strategy is an opportunity to reshape how IT is viewed within the business, and an opportunity to redefine processes that are not aligned to quality and throughput of application delivery.


Value disciplines and the operational excellence model for BPM

In this webcast presentation, Ken Lewis, ITIL consultant at PA Consulting, advises businesses to figure out how they're creating value for their customers and to focus on a "value discipline" -- first described by Michael Treacy and Fred Wiersema in a February 1993 Harvard Business Review article -- where customer engagement and experience is key. Here he explains Treacy's and Wiersema's three value disciplines -- operational excellence, product/service leadership and customer intimacy -- and delves into goals for a company that prioritizes the operational excellence model.


Data And Analytics Strategies: What Investors Think

The report indicates that data and analytics strategies are affecting organizations across industries. While the data-driven maturity of companies varies from industry to industry and business to business, momentum is building. Failing to have a data and analytics strategy, or executing one poorly, can negatively impact a company's ability to compete -- and therefore its value. "Data strategies are here to stay across a number of different areas [where] we're going to continue to invest, and it will be a bigger part of our investing thesis as far as where we put our time and energy in the portfolio," said Ron Heinz, managing director at venture capital firm Signal Peak Ventures. Data and analytics strategies need three key elements to succeed: The technology, the ability to execute, and a culture that embraces data-driven decision-making.


Buffer Overflow

In the classic exploit, the person attacking the program or system sends information to the targeted application that is stored in an undersized buffer. The information on the call stack will be overwritten to include the return pointer of the function or method. The information that the attacker sent will set the return point’s value to transfer control to the computer malware or other malicious code stored in the attacking information. At the program architecture level, a buffer overflow vulnerability normally occurs when an attacker successfully finds a violation of the programming assumptions that error checking did not catch or when there is faulty memory manipulation.


US Commerce Department proposes multistakeholder control of ICANN

The most recent development is the July 2015 Proposal to Transition the Stewardship of the IANA Functions from the U.S. Commerce Department's NTIA to the Global Multistakeholder Community (PDF), a 199-page document by the IANA Stewardship Transition Coordination Group (ICG) offering suggestions of how to fulfill the Commerce Department's 1998 Statement of Policy regarding ICANN. The ICG is soliciting public comment about having a multistakeholder group oversee IANA functions. The last date for commenting is September 8, 2015. As to what multistakeholder means, Claburn quizzed Mueller about it. "Multistakeholder is a code word for self-governance by the Internet community," said Mueller. "That's new [as a governing structure] and that's why we're kind of groping along here."


Android, you have serious security problems

"The rash of vulnerabilities being reported in Android and the difficulty in getting them installed on end-user devices is taking its toll on the mobile OS. Fortunately, there are no current indications that such vulnerabilities are being actively exploited in the wild. Still, Android users -- this reporter included -- have reason to be concerned and to remain wary," Goodin wrote. ... Device manufacturers that were slow to issue patches, and telcos that were even slower -- if they even bothered at all. Even though Samsung and HTC had announced that they'd be moving to a monthly patching cycle -- welcome to the best practices of 2003, guys -- Android end-user security would still be at the mercy of the telcos.


Agile Coaching - Lessons from the Trenches

Agile Coach is not a role mentioned in Scrum, Kanban, XP or any other agile framework or practice. It’s grown organically as larger organizations have realized the benefits of agility and appetite has increased for long-lasting change. Coaching can reap amazing rewards if done skillfully. What does a skillful coach look like? Companies that rely on external agile consultants want to know if they are acquiring good coaches with a proven track record and broad industry experience. Companies that prefer raising their own coaches want to identify the people with coaching aptitude. Individuals that pursue the career of an agile coach wonder if they have what it takes to become a coach.



Quote for the day:

“Leadership Principle: As hunger increases, excuses decrease.” -- Orrin Woodward

August 13, 2015

6 Signs You're Going to Fail At Big Data

"Who is getting Big Data right, and what are they doing differently to get positive results?" I'm asked this question often enough to get the sense that few organizations seem to be seeing positive results from their big data efforts. This in spite of the fact that they are investing millions of dollars, spending thousands of hours and betting their business' future on the success of these analytic efforts. While I've tried to articulate how I have seen some organizations get big data "right," it's frequently more compelling to explain how others seem to be getting it terribly "wrong." In this vein, I offer the following six signs that an organization will likely fail at big data, and a bit of guidance on how not to join them.


New Android Serialization Vulnerability Gives Underprivileged Apps Super Status

Vulnerable classes can be found in specific apps or frameworks, implying a more restricted targeted attack. We therefore decided to analyze 32,701 popular Android apps from top developers in order to find such classes. Since using our aforementioned runtime technique to conduct this experiment would take hours to complete, we decided to use a different approach. We created a tool that runs dexlib2 over the apps’ dex files in a mere 93 minutes. The experiment is so fast because it simply performs a very shallow static analysis, whereas adhering to the previous experiment’s technique would have required installing each app on an Android device — an incredibly slow process.


Cybersecurity’s Human Factor: Lessons from the Pentagon

One key lesson of the military’s experience is that while technical upgrades are important, minimizing human error is even more crucial. Mistakes by network administrators and users' failures to patch vulnerabilities in legacy systems, misconfigured settings, violations of standard procedures—open the door to the overwhelming majority of successful attacks. The military’s approach to addressing this dimension of security owes much to Admiral Hyman Rickover, the “Father of the Nuclear Navy.” In its more than 60 years of existence, the nuclear-propulsion program that he helped launch hasn’t suffered a single accident.


Flash-Based Data Storage is Growing Faster Than Anticipated

"The No. 1 reason why customers are adopting it is because of performance," said Arun Chandrasekaran, an analyst at Gartner Inc. "The second reason is ease of use and management. The products are inherently fast and easy to manage." Flash storage lets companies compress data more efficiently and remove duplicate copies of files. The machines are also cheaper to manage and replace; they take up less space in data centers, and require less electricity and cooling. While flash-based storage remains more expensive than hard disk-based systems, prices are declining and drawing in more customers. "The all-flash array market did grow faster than we thought it would," said Eric Burgener, an analyst at IDC.


DOJ wants encryption that still allows law enforcement access

The DOJ is not asking companies to stop offering encryption, a second official said, but to balance the cybersecurity benefits of end-to-end encryption with the risks of losing valuable evidence in child pornography, terrorism, organized crime and other cases. There may be "theoretical risks" with companies retaining access to customers' encrypted data, one official said. "Are there costs and benefits associated with certain implementations of encryption, and are there costs and benefits associated with lack of law enforcement and national security access to communications in crucial cases?" the official added.


AHIMA: Information Governance Earns High Executive Attention

While there are significant numbers of organizations not yet formally on the IG path, there is evidence that growing numbers are prioritizing information governance. For me, among the most significant findings is that 36 percent of the respondents indicate that a senior executive has been designated to sponsor IG. That’s a major sign that IG has established a toehold in healthcare. This means more than a third of the organizations represented are sufficiently convinced to take this step because they see the value of information as a strategic asset. I hang a lot of hope on this indicator, because without senior sponsorship, IG will not move within the organization.


Enterprise data security best practices mean IT teamwork

When the network, security and other specialists collaborate, security reaps the benefits. A Windows administrator is routinely called upon to allow or deny execution of certain file types based on a user's role within a network, for example. The admin may need to deny permission to run executables from end-users' workstations. This gives the enterprise a file-based security control. The network administrator also denies entry of certain executables at the firewall. In this case, network-based security controls are exercised in tandem with the file-based controls for multiple layers of IT security.


A strategy for thriving in uncertainty

In uncertainty, both the strategy process and the strategy itself need to change. The most effective leadership teams focus on the vital few uncertainties that matter, understand the possible scenarios that could develop and identify the critical trigger points that signal a swing to one scenario or another—we call these signposts. This leads to a clear and actionable portfolio of strategic actions that balance commitment with flexibility. And the process shifts from an exercise defined by conditions at a discrete point in time to a cycle of “execute, monitor and adapt,” redirecting the company toward the best opportunities over time.


10 scary hacks from Black Hat and DEF CON

SMB relay, the network version of a long-time hacker favorite attack called "pass the hash," was believed only to work inside Windows networks. Security researchers Jonathan Brossard and Hormazd Billimoria found that that's not actually true and that an attacker can harvest Active Directory NTLM (NT LAN Manager) credentials from the Internet by simply tricking a user to visit a Web page in Internet Explorer, open an email in Microsoft Outlook or play a video file in Windows Media Player. SMB Relay involves using man-in-the-middle techniques to capture authentication requests from a Windows computer to a server and then relay those requests back to the server in order to be authenticated as the user.


Instrumenting the human and socializing the machine

As consumers, we’re all becoming instrumented and taking advantage of the wealth of wearables and sensors now on the market. This “quantified self” concept helps us monitor our health and fitness and take advantage of the masses of data that are produced as we go about our daily lives. The pace of instrumentation is picking up in the workplace as well as employers seek to track employee behavior and optimize work activities. ... Even when we look at fully autonomous vehicles such as self-driving cars, the cars are being socialized to be overly cautious when maneuvering to help avoid surprises for passengers and pedestrians alike. Soft robotics is another area of innovation where robots are being designed with soft and deformable structures to work with unknown objects, in rough terrains, or with direct human contact.



Quote for the day:

"If you don't build your dream, someone else will hire you to help them build theirs." -- Dhirubhai Ambani

August 12, 2015

Digital Business is Creating a Profoundly Different Security & Risk Environment

We are on the cusp of a new era – the convergence of IT, OT and Internet of Things (IoT). While IoT is relatively new, the biggest challenge for security and risk professionals to figure out how to bring OT into the fold in a broader security management program, which was traditionally managed by engineers. These roles are expanding and getting more complex.  Security has historically being about confidentiality, integrity and availability, but cybersecurity – where IT, OT and IoT come into play – is bringing safety to the forefront as the fourth element. As digital blurs with physical, it becomes possible for digital means to effect kinetic changes, for the technology and automation of devices, people and physical environments to be used to cause injury or loss.


There is more value in the IoT economy than Big Data analytics

IoT devices aren’t just passive data generators relaying information out to Big Data analytics engines. Control systems are some of the oldest examples of the Internet of Things. For example, 33 years ago in 1982, CMU students built the first Internet Coke Machine, so students could order sodas while still at their desktops, charge the cost, and then go pick it up. At the 1989 Interop conference, Dan Lynch with others created the first Internet ... The value here is in automation and distributed control. Security still needs much more attention when connecting devices over the network, per the recent Wired story on how a car was hacked while being driven.


HP pursues big data opportunity with updated products, services, developer program

"Developers are the new heroes of the idea economy," said Mahony. "Through our Haven and Haven OnDemand platforms, we are empowering these heroes to transform their business through data, by allowing them to harness the value of all forms of information, rapidly connect and apply open source, and quickly access the tools they need to build winning businesses." Also addressing the keynote audience was recent Turing Award winner Mike Stonebraker, CTO and co-founder of Tamr. He said that the development of the column store database was the most disruptive thing I ever did. "It transformed the market," he said, and lead to the Vertica big data platform that HP acquired in 2011.


Digital India: Challenges and Opportunities

As is obvious, digital technology’s impact is visible in a big way due to widespread adoption of smartphones, tablets, and social apps. These offer great ease to customers who can use digital channels for interacting with financial institutions from anywhere anytime. The transformational potential of digital technology had undoubtedly eased the customer connect. Customer convenience is more evident in the smart usage of digital technology, like in the case of online, mobile and now social banking. However the real issue is to offer reliable, secure, and superior customer experience through these new ways, and software testing has a major role to play in ensuring these goals.


Limitations of Technical Debt Quantification: Do You Rely on These Numbers?

Currently available technical debt quantification tools focus only on a few dimensions such as code debt and to some extent design debt and test debt. Such tools do not provide a comprehensive support to detect issues pertaining to other dimensions such as architecture debt or documentation debt. In fact, the comprehensiveness of the supported dimensions is also questionable! For instance, how many design debt issues (or design smells) such tools identify and report? Although, such tools support a set of design rules (that may lead to design smell detection), but such rules are just handful. Further, dealing with false positives (i.e., false alarms) generated by the underlying analysis tools is inherently difficult.


Four Questions to Ask Prospective Storage Vendors

When purchasing storage, there are two main areas of risk: financial and technological. To mitigate financial risk, service providers should ask the vendor about its capacity management and scale model. For example, purchasing too much capacity up front can threaten a provider’s profitability. To avoid financial risk, it is critical that the vendor allows for scaling capacity up and down as needed. To reduce technological risk, service providers should consider if the vendor forces migrations and redevelopment of automation, orchestration and integration when moving from one version to another.


The Internet of Things in Retail

In the next few years, expect to see science fiction become retail fact, as augmented reality enhances trying-on-and-buying everything from clothes, cars and furniture to books, movies, and video games. Expect concerns over privacy (though important) to be offset by the convenience of highly personalized services and customized information. IKEA lets you paint, style and place virtual furniture anywhere you drop their product catalogue through your smart phone or tablet. Lego lets you see and rotate a fully constructed and animated Lego set on top of the box at a kiosk or through your device.


How Wearables Startups Can Overcome The Hardware Challenge

The initial design of a device can take months, along with the time needed to create working prototypes. Hunting for the best manufacturing partners can be challenging, and locating the best materials—at the best price point—is key to production success. Straight-forward design and development costs can start in the hundreds of thousands of dollars. The materials available for the creation of wearable devices, from sharp leather bands to precision-cut stainless steel, form an area ripe for misunderstandings. “You might see some of these materials on an Apple watch, but remember that Apple is getting a volume discount and leveraging their supply chain,” Patel said. "Startups obviously don’t have that advantage, so it’s going to cost more.”


What you need to know about chip-embedded credit cards

The main thing to know is that the chip in the card is communicating with the network behind the terminal to enhance security instead of just forwarding your card number and related data to the network, as with the magnetic stripe approach. ... The chip can communicate a unique encrypted token (or an alias) with the network instead of your actual credit card number. That way, the network, and even the store, won't know your card number. When the token reaches your bank, it is decrypted so the bank can verify your account and then authorize payment. This all happens in a few seconds or less. As to whether the security is necessary, the answer is again, yes, especially for banks, but not necessarily for card users.


Google Cloud Platform's entire big data suite now generally available

Serving as a replacement for MapReduce, Dataflow was designed to analyze pipelines with arbitrarily large datasets, crunching information in either streaming or batch mode. After being pushed out as an alpha release, Google later tacked on an open sourced SDK for Java to make it easier for developers to integrate with Google's managed service in order to port Dataflow to other development languages and environments. Dataflow finally made its way into beta by this April as the ...  As for Cloud Pub/Sub, designed for integrating apps and services to then analyze their data streams in real-time, Google Cloud product managers touted in a blog post on Wednesday this release follows a "decade of internal innovation."



Quote for the day:

“Only by binding together as a single force will we remain strong and unconquerable.” -- Chris Bradford

August 11, 2015

Defusing The Internet Of Things Time Bomb

What complicates the landscape is that the majority of devices are dependent on apps, mobile platforms and back-end cloud services that often integrate with “home automation hubs” — all of which can become an attack vector for any new devices added to the network. Suggested IoT privacy practices parallel those in place today for general web services, yet the sensitivity of IoT data tied directly to an individual and the form factors used present additional challenges and concerns. Key recommendations here include sufficient notice in a format consumers can easily access, limitations on data sharing with third parties, data retention policies and clearly defined implications of a customer’s refusal to accept a privacy policy


To shine a light on cybercrime, go Dark

“The hardest part of monitoring is really learning where to look. Many of the sites on these obscure networks move locations or go offline periodically. However, once an individual has identified a handful of sites, they frequently lead to others.” He also agrees with McAleavey that it is labor-intensive, and does not always yield useful intelligence. On the “slow” days, “you might not see anything of value,” he said. “Furthermore, this requires an analyst's fingers on keyboard. Deploying a 'tool' to do this job is not effective. Scraper bots are detected and regularly purged.” Others are a bit more dubious about the average IT department doing effective Dark Web surveillance, even if the budget is there.


The Key to successful project management is closing the loop

These first six steps include initiation, planning, design, building, testing, and ‘go-live’. The missing step, though, is what I like to call ‘closing the loop,’ or benefits realisation, and is sorely needed to close a project. This missing step is, more often than not, the reason why the rewards of a successfully implemented project are seldom felt by the project management team. Other reasons include the fact that the results are only seen months after the implementation is complete, which means that the team leading the project leave the job with a sense of it never being fully complete, and little sense of achievement. Consequently, they probably will never know if the implementation was a complete success.


Why CIOs Need a Chief Data Officer

The report, titled "The Chief Data Officer: Bridging the Gap between Data and Decision-Making," reveals that CIOs and other senior tech leaders are under pressure to provide better data to the business side more swiftly. However, their efforts are stymied due to a lack of an enterprisewide approach to data management, without any "ownership" over data-driven decision-making. As a result, inaccurate data is causing business-impacting issues while creating regulatory risks. By hiring a CDO who can take command of data management, companies can avoid such outcomes. "Business leaders need to create a culture around data," said Thomas Schutz, senior vice president and general manager of Experian Data Quality.


3 Things Patients Secretly Expect from Healthcare Providers

Over the last couple decades, customer service processes — and the expectations that drive them — have transformed entirely. Attention spans are waning, consumers are becoming more informed,mobile devices consume our every moment and anything less than a Ritz Carlton experience may earn companies a scathing Yelp review. Most businesses have made great waves in responding to these changes, but, up until recently, the healthcare industry has remained mostly exempt. Now, thanks to HCAHPS surveys and popular online review sites dedicated entirely to ranking private practices, the healthcare world is feeling the sting of shifting consumer behaviors. Many organizations are striving to understand what patients want, and discovering it’s not as easy as they’d hoped.


A Gateway to the New Internet: What to know about HTTP/2

While the IETF doesn’t mandate encrypted (HTTPS) web communication for HTTP/2, all browser implementation of HTTP/2 does require a secured (HTTPS – SSL/TLS encrypted HTTP) connection. This means that if a site doesn’t support HTTPS URLs, or can’t be upgraded to support HTTPS, it can’t use the new protocol. In many cases, even if the site can use encrypted HTTPS communication, it may have some severe performance penalties, having to encrypt all communication to/from the server. So only sites that have a good infrastructure that can efficiently handle HTTPS communication will be able to de-facto benefit from the performance boost HTTP/2 has to offer.


The Lean Machine: Bringing Agile Thinking to the Database

Truth is, while Agile and continuous delivery have been sweeping through application development like wildfire, there’s been a lot of Agile movement in the database development arena too. It’s a natural extension because business is moving faster, features need to be released sooner, and the database can’t be a bottleneck. In database development, testing, and deployment, there are tools and processes that can be adopted alongside those used for applications. By treating the database as another piece of source code and using Agile practices, Database Lifecycle Management (DLM) becomes easier. Used correctly, DLM relieves the burden on database administrators (DBAs), makes testing easier and faster, and turns deployments from occasional big bang releases full of worry to frequent releases that are simple and error-free.


Data capitalization makes governance run smarter

Capitalizing on enterprise data gives firms a head start on building and sustaining stronger, more strategic governance Underlying the concerns most firms share about workflow, efficiency, transparency and regulatory compliance is a deeper concern about data governance: where data originates, what processes govern it, whether users are following these rules and whether firms can prove this is the case. Data capitalization helps firms build smarter governance programs. It spurs the investments in time and budget required to map out the entire data environment and start improving it.


Digital certificates key to mobile security, says researcher

Analysis of apps has also revealed that while some claim to encrypt all data in motion, when passwords are changed, this information is sent in clear text over the network. “Having that level of intelligence is key, but it is quite difficult if you are managing an enterprise and all those apps across all those mobile devices to have that level of visibility, it is not scalable, which is why is affirmation services have emerged that analyse apps when they are downloaded and cross-reference it with all known risky apps,” said Raggo. Adding to the complexity of the challenge, he said, is that there are several different ways Apple devices can be jailbroken, there are tools that can hide the fact that devices are jailbroken from enterprise management systems, and there have been cases of brand-new Android devices that have been found to be rooted.


Why Bluetooth could be the game-changer in mobile payments

While both technologies can be used for short-range communication, BLE has a longer distance with a reach of up to 50 meters compared to less than 0.2 meter for NFC. When it comes to mobile payments, using NFC involves having customers tap and pay for their purchases where close proximity to a terminal is a requirement. The longer distance provided by BLE leaves room for creating a truly frictionless experience. The consumer and merchant have the flexibility to manage payments in multiple ways, which includes enabling hands-free payment where the customer does not need to pull out her phone or wallet. This allows for better customer-merchant relationship building during that limited time for interaction during checkouts, since customers are not distracted by their devices.



Quote for the day:

"I have learned that the best way to lift one's self up is to help someone else." -- Booker T. Washington,


August 10, 2015

Scaled Professional Scrum – Nexus Framework

The Nexus framework scales the roles, events and artifacts of Scrum to improve the ability for 3- 9 Scrum Teams to jointly develop and sustain complex products. A Nexus is a Scrum eco-system that produces integrated versions of product from a rigorous focus on people, communication, development excellence and integration of work. From the outside, a Nexus is no different than any small-scale instance of Scrum. All work for the product or system being developed is organized in a Product Backlog. By the end of a Sprint, every 30 days or less, a releasable (integrated) Increment of product is available. Communication is optimized to deal with dependencies, proactively as well as via reification, because dependences are the hidden killer of product development at scale.


What Are the Effects of Computer Hacking?

The big threat that these worms bring is the knowledge that a system is open. This can allow the automated response to install a back door into a system which can allow malicious hackers to gain access to computers as well as turning systems into "zombies" which could be used for various purposes including spamming and masking the actions of the original hacker. Creators of catastrophic software such as the author of the first Internet worm, Robbert Tappan Morris Jr. did not mean to do bad at all. ... Morris created the Morris worm, which was meant to gauge the size of the Internet but had actually gained access to ARPANET by accessing vulnerabilities in Unix based systems which were in use at the time.


The Need For IoT and Social Media Mix

Previously unthinkable business models are changing the way we understand and do business these days. Uber, the world’s largest taxi company, owns no vehicles. Facebook, the world’s most popular media owner, creates no content. Alibaba, the most valuable retailer, has no inventory. And Airbnb, the world’s largest accommodation provider, owns no real estate. It is time to think ahead if you want your business to remain relevant. Enough examples, let’s start by analysing the implications of latest trends in IoT and Social Media, uncovered by WT VOX’s latest survey. Mobile users place a high value on utilitarian content. With the majority of social activity taking place via mobile devices, consumers are increasingly intolerant of social content that doesn’t provide value, especially on larger social networks.


How We Learn to Stop Worrying and Love the Bots

The promise of it all is beyond exciting—we’re living on the brink of incredible change. The flip side is that the stakes couldn’t be higher. Modern technology and connectivity offer both challenges and opportunities to peoples around the globe, with dramatic implications for climate change, wealth distribution, diversity, poverty, health care, security, and privacy. Which means we have some deeper thinking to do and critical choices to make in the years ahead if we want to live in a future rich with human possibility and opportunity.


Does too much technology make a car artificial?

GM's OnStar paved the way, and now it's a rare hybrid or battery electric vehicle that can't use an Android or iPhone as a remote. Of course, this means letting the outside world have hooks deep into a car's control systems, the dangers of which are all too clear thanks to irresponsible stunts like the recent Uconnect hack. All these changes make for awkward times when people happily driving decade-old cars butt up against the modern driving machine. You can see this in discussions on the Internet. The Internet commenter must be heavily underrepresented in car industry focus groups, since most posts about cars tell us that the author wouldn't be caught dead letting a car brake for them, steer for them, or shift their gears.


Why You Need A Data Strategy To Succeed In Industry 4.0

Since the beginning of the industrial age, the manufacturing sector has experienced a number of dramatic turning points, where the introduction of a new invention has radically changed manufacturing processes and output. Today,the manufacturing and high tech sector finds itself at one of these significant turning points -Industry 4.0. If you’re wondering what went before – Industry 1.0 is associated with the beginning of manufacturing where mechanical production systems were powered by steam and water. The next revolution in manufacturing came when the invention of electricity powered specialisation during the production process. Then came the use of electronics and IT to drive new levels of automation in Industry 3.0.


How Flash destroys your browser's performance

In case you needed another reason to uninstall Adobe Flash, we’ve got one: It can drag down your PC by as much as 80 percent. Yes, 80 percent. So not only is Adobe Flash incredibly unsafe, it’s a memory hog. And we’ve got the numbers to prove it. As part of an upcoming roundup of the major browsers, we tested their abilities to handle Flash. Two browsers, Mozilla Firefox and Opera, do not include Flash, although you can download a plugin from Adobe to enable it. A third, Microsoft’s new Edge browser, enables Flash by default, although you can manually turn it off. Both Internet Explorer 11 and Google’s Chrome also include Flash, which you can disable or adjust within the Settings menu.


Understanding The Future Of Mobility

The benefits will be enormous: An 80+ percent reduction in the cost of transportation. Reduced pollution. Reduced stress and road rage. A dramatic decrease in accidents and traffic deaths. Gaining back time lost to commuting — and the associated increase in productivity. Freeing up two lanes on many urban roads by eliminating parked cars. Even the reclaiming of the space allocated to home garages. This future is being driven by the nexus of three significant trends. Each is important in and of itself, but combined they create an unstoppable force for change. As with most significant changes to the way we live our lives, safety and trust and data are key to enabling the potential of on-demand mobility.


Strategy, Leadership and the Soul

Transorganization: Organizations that design both interpersonal awareness and business strategy synergistically are more able to see and sense the macro-environment and are more able to create relevant value. Transleaders: Individuals who understand that their leverage comes from the coordination of getting things done through others through the use of compassion, awareness, developing conduits, acquiring and distributing meta-knowledge, coordinating multiple intelligences and being excellent collaborators. Like a body has capillary systems to exchange oxygen, blood and information, transleaders do the same to create vitality for the bio-organization which we call a “Transorganization.”


Hacking For Cause: Today’s Growing Cyber Security Trend

The reason? The hacker motive for these data breaches is not (primarily) financial gain. No doubt, someone, somewhere, may have made money in the process — especially if a hired hacker was doing the hacking actions for someone else. Why is the motive of the hacker a significant issue? The past decade of data breaches has been dominated by the conventional wisdom and this public perception: “Follow the money.” Specifically, organized bad-guy hacker criminals are looking to rob banks, steal intellectual property, get your social security number, steal credit card numbers or gain your logon credentials to ultimately get to your cash — or better yet, your organization’s cash.



Quote for the day:

"The superior man understands what is right; the inferior man understands what will sell." -- Confucius

August 09, 2015

Where Internet of Things Initiatives Are Driving Revenue Now

79% of enterprises surveyed have Internet of Things (IoT) initiatives in place today to better understand customers, products, the locations in which they do business with customers, or their supply chains. 45% of enterprises use IoT technologies to monitor production and distribution operations. 40% of Enterprises Are Growing Their Services Businesses With Internet of Things Initiatives. Manufacturers expect Internet of Things initiatives to drive an average 27.1% revenue increase by 2018.


3 Skills Every Tech Entrepreneur Should Have

One of the reasons I love being an entrepreneur is that there's an infinite amount I can learn that will help my company. As the CEO, I have the freedom to learn how to build, sell, and market our software. As opposed to working in a corporate environment, in startups adaptability is crucial. You have to be able to change gears quickly, and pick up a new skill on the fly. It can be daunting, but at the same time there's no better feeling than seeing progress through learning. Below, I'll list three skills that are crucial for tech founders, especially CEOs, to learn. Also, I'll go into how you can pick up a foundation for these skills as fast as possible.


Parallel and Iterative Processing for Machine Learning Recommendations with Spark

Spark is especially useful for parallel processing of distributed data with iterative algorithms. As discussed in The 5-Minute Guide to Understanding the Significance of Apache Spark, Spark tries to keep things in memory, whereas MapReduce involves more reading and writing from disk. As shown in the image below, for each MapReduce Job, data is read from an HDFS file for a mapper, written to and from a SequenceFile in between, and then written to an output file from a reducer. When a chain of multiple jobs is needed, Spark can execute much faster by keeping data in memory. For the record, there are benefits to writing to disk, as disk is more fault tolerant than memory.


When a Great Tradition Digitizes: Kakelao Connected at the Dawn of Digital India

The scale of Digital India — attempting to transform the 70% of the population of what is soon to be the world’s largest country who live in ancient villages into a knowledge economy ... In a more gentle, arguably Indian way, Digital India leaves people in place, except as they may migrate to only to neighboring villages with better broadband connections, relying on the attractive power of the Internet to get people to pass boldly into that other world. Our role in the past seven days in Kakelao was to help to make that power as apparent as possible to educators, government, local businesses and students, and to help Kakelao set up structures that will enable passionate pursuit of what its broadband connection will offer.


Attackers could take over Android devices by exploiting built-in remote support apps

The vulnerability was discovered by researchers from security firm Check Point Software Technologies, who presented it Thursday at the Black Hat security conference in Las Vegas. According to them, it affects hundreds of millions of Android devices from many manufacturers including Samsung Electronics, LG Electronics, HTC, Huawei Technologies and ZTE. ... Because Android does not provide a native way for apps to verify each other, manufacturers had to implement the functionality themselves and in most cases made errors that could allow other apps to masquerade as the legitimate ones and interact with the plug-in, the researchers said.


DNS (Domain Name System)

The naming system used by DNS is a hierarchical namespace, called the DNS namespace. The DNS namespace has a unique root. The root can contain numerous subdomains. Each subdomain also can contain multiple subdomains. The DNS namespace uses a logical tree structure wherein an entity is subordinate to the entity which resides over it. Each node in the DNS domain tree has a name, which is called a label. The label can be up to 63 characters. Nodes that are located on the same branch within the DNS domain tree must have different names. Nodes that reside on separate branches in the DNS hierarchy can have the same name. Each node in the DNS domain tree or DNS hierarchy is identified by a FQDN.


Security and the Internet of Things – are we repeating history?

There have been many discussions among cybersecurity experts regarding the security challenges that IoT presents.Gartner forecasts that 4.9 billion connected things will be in use in 2015, up 30 percent from 2014, and will reach 25 billion by 2020. The additions of these devices will make our networks more complex, and in turn, increase the greater potential impact that can occur as a result of a breach. Nevertheless, despite the recent events of cybersecurity failures, we seem committed to adopting IoT technology without having a security plan in place.  The IoT era brings with it more security questions than answers.


Business strategists and even CEOs need to know their chief enterprise architect

So if you are business strategist, you might be asking at this point why you should also want this relationship. The answer is simple, “running the business and changing it are not sequential but parallel pursuits… Managers need to compete for today and prepare for tomorrow with no letup on either front”. And while planning for today requires organization; planning for tomorrow quite often requires the opposite, reorganization. To deliver on this requirement, “organizations must do more than just change. They must transform. As technology’s role in business becomes ever more important, transformations will increasingly be underpinned by significant technology programs.”


How artificial intelligence will impact research industry

For now, Ellipse is a canary down the mine for researchers. In a very short space of time, a more advanced version will collate all online published research, blogs, podcasts, YouTube video and press releases. Insight could be delivered in a cloud-based dashboard allowing any member of the organisation to instantly find answers to their business questions. Insight derived in the same time it would take a human researcher to finish the morning emails. I am calling this new market Insight-as-a-service or the Insight-on-Demand Economy. Neither are particularly catchy, however.


Is there trouble brewing in the land of DevOps?

The first problem is related to containers. I'm not saying containers are a problem - except when it comes to sprawl and app containers - they are in fact an excellent future invisible subsystem focused on issues such as portability. ... Somehow, and this is a more recent phenomenon the idea that you don't need to worry about package management has appeared in certain quarters. Package management is just as important in a world of compute as a utility as it was in a world of compute as a product. Ignoring it has lead to an issue that some IT landscapes contain components that people don't know how to recreate especially since the person that created the component has left the company. This is not healthy.



Quote for the day:

“The more the level of insecurity is reduced, the more the level of faith will grow.” -- Victor Manuel Rivera

August 08, 2015

Agile Value Delivery - Beyond the Numbers

Value is an interesting word and one that generates a lot of different opinions. One of the most common views of value is Shareholder Value, as described by Milton Friedman, in which creating return on investment was the primary measure of value. As counterpoint, Peter Drucker argued that value was determined by the customer. When tested in the real world, an interesting pattern emerges – return on invested capital has steadily declined for the firms focused on shareholder value, while it has steadily increased for those that focus on customer value. So value is not about money; it’s about perception. That was why we added the subtitle “Beyond the Numbers.”


A Security Scanner for Human Vulnerabilities

The security industry does have some established ways to try to rein in what are called social-engineering attacks. Security training has become standard at many large organizations, and some companies occasionally stage phishing attacks to drive home the risks of fake e-mail. But Bell says the continual stream of breaches caused by human slip-ups shows that education doesn’t work. Meanwhile, companies that perform phishing tests are rare, and they are generally one-off, manual exercises, she says.


9 big data pain points

Sometimes, there's a big hole in the side of the ship, and the industry decides to wait until the ship starts sinking in hope of selling lifeboats. At other times, less severe flaws resemble the door in my downstairs bathroom, which opens only if you turn the handle one direction, not the other. I’ll fix it one day, although I've said that for 12 years or so.I can count nine issues confronting the big data business that fall at either extreme ... or somewhere in between.


5 reasons nice guy-project managers finish first

So what do you think…do nice guys finish last? I’ve tried to be a nice guy throughout most of my professional career and I don’t think I’ve finished last. And as I consider those I’ve worked with over the years, most of the nice guys (and women) have done pretty well. Yes, a few hardcore jerks have definitely excelled (“the squeaky wheel gets the grease”), but the nice guys have -- in the long run -- faired better, in my opinion. From a project management or even general business standpoint, here are my top 5 reasons why I think nice guys actually finish first.


Business Intelligence versus Big Data: Intelligent Information

BI is a set of tools and techniques to gather, cleanse and enrich structured or semi-structured data for storage in various forms of SQL type database. The data will be managed in standardized formats to facilitate access to information and processing speeds. The goal of BI is to produce performance indicators to understand the past and analyze the present to extrapolate a long-term vision and define future competitive advantages of the company. BI is used by a large number of internal and external users to support the operational activities of the company using strategic monitoring.


Disruptive Innovation and Competitive Intelligence

While established companies in any sector focus on existing customer needs and sustained innovation at the top of the market, they might leave the space open for new competitors to use simple and disruptive innovation that identify unmet customer needs. ... Now imagine if we apply this paradigm to the world of Competitive Intelligence (CI); a discipline that is supposed to monitor the changes in the market and the competitive threats for its business. Is CI also monitoring disruptive innovations that are creating ripples in its own waters? Let’s look at 3 such companies and 3 specific technology-led ideas by which they could potentially disrupt CI: a) Crowdsourcing, b) Temporal analysis, c) Artificial Intelligence


Why Cyber-Physical Hackers Have It Harder Than You

The risk gets scarier as buildings and cities rely more on computer systems. Some physical devices only use electronics as an added benefit -- they may collect or share more data, for example -- but others -- the cyber-physical devices -- cannot function mechanically without input from the computer.  Either way, another challenge for the physical and cyber-physical hacker is that simply finding a vulnerability in the code isn't enough. "There must [also] be vulnerability in the process," says Krotofil. If the physical processes can continue along even without the correct input from the computer, then the exploit doesn't work. Yet, while vulnerability scanners (and the black market bug bounty business) make it relatively easy to find holes in applications, the same tools don't exist for complex processes and environments like, for example, a chemical plant.


Architects Should Code: The Architect's Misconception

Technical leadership stems from the fact that the architect is often highly experienced in development and delivery. A goal of the architect should be to educate and grow the development team. Sometimes there are specific tech leads that play this role, but why horde the experience gained by the architect? Not only does this interaction benefit the team as a whole, it benefits the architect to understand some of the common issues the development team encounters. Mentoring is a form of non-technical leadership that an architect can impart on a team. Topics like working with non-technical people, embracing Agile principles, defining architecture, and modeling architecture are all important skills for growing developers and future architects.


The Least Worst Way of Letting the Govt Read Encrypted Messages

Most discussion of how a government might get access to encrypted data has focused on designs with what you might call a direct backdoor – the government gets a master key or collection of keys that it can use to directly unlock encrypted messages. ... Denaro says more attention should be directed toward an alternative approach that doesn’t put so much power directly in the government’s hands. It would create a less direct backdoor—giving the government access into the system known as a keyserver that a company uses to manage the keys for an encrypted messaging system.



Shift Your Cybersecurity Focus from the Perimeter to the Interior

With the rapid changes in automating and connecting our systems, the adoption of SaaS and IaaS is only on the rise—and those who want to profit from theft of this data are paying close attention. This is a familiar pattern: One team gets an advantage for a short time, long enough for the other team to find a weakness, and the cycle is repeated.  To put it another way: The cat finds a way to detect malicious behavior, and then the mouse finds a new way to get the cheese. Imagine the cat is the latest VC-backed startup with a new detection strategy and the mouse is a new evasion technique. But the asymmetry created by the way our systems are built is not in the cat’s favor.



Quote for the day:

“You must be willing to give up what you are, to become what you want to be.” -- Orrin Woodward