October 24, 2015

Why Self-Driving Cars Must Be Programmed to Kill

In general, people are comfortable with the idea that self-driving vehicles should be programmed to minimize the death toll. This utilitarian approach is certainly laudable but the participants were willing to go only so far. “[Participants] were not as confident that autonomous vehicles would be programmed that way in reality—and for a good reason: they actually wished others to cruise in utilitarian autonomous vehicles, more than they wanted to buy utilitarian autonomous vehicles themselves,” conclude Bonnefon and co. And therein lies the paradox. People are in favor of cars that sacrifice the occupant to save other lives—as long they don’t have to drive one themselves.


Prepping for Data Driven Innovation

It is important for businesses to understand that data validates theory and give it a perspective. Acting on a hypothesis without validation is close to flying blind. So, it is important to understand what role data plays. For example – In innovation, we have a tendency of going top-down, but more often than not, innovation fails because it is not backed by detailed data points to validate the assumptions. So, businesses should convince themselves to align in a way that facilitates data in decision making processes. For innovation process, it does a couple of things: it validates the assumption; it helps ideas germinate fast and find their product market fit as well as it helps ideas fail quick. So, businesses end up spending less money and time on failed products and more resources on the ones that are closer to their customer’s need.


Deriving Value from Data Before It Goes Dark

It’s much more efficient to derive value from data before it goes dark by implementing a fast data solution in a data pipeline to ingest and analyze data in real time. This allows the enterprise to take action, automatically implement transactions, and make decisions based on information available in live data streams. Rather than losing time waiting for data at rest to be classified and made available for Big Data analysis, the enterprise can immediately analyze and act on real-time information, based on defined business policies. The enterprise can gain instant insight into sales, production and distribution trends, and capitalize on opportunities to create value by leveraging instant insights to shape products and services and steer marketing and sales campaigns.


As sites move to SHA2 encryption, millions face HTTPS lock-out

"Given that many sites are 75 percent through to SHA2 migration, it's likely that those users with old browsers will start to experience problems with increased frequency throughout 2016," said Ristic. Mozilla found out the hard way last year. Last year, the browser maker updated its website with a new SHA2-hashed SSL certificate. But those who were running a browser or operating system that didn't support SHA2 couldn't get onto the website. The upgrade "killed one million downloads," said Mozilla's Chris More in a bug listing at the time. "A lot of the world is still running old browsers and come to our website to get Firefox," he said. And it won't be the last time it happens.


20 hybrid cloud insights from top industry experts

One cloud does not fit all organizations. That’s true whether it is a public or private cloud. A hybrid cloud option allows your business to create a custom solution that fits your organizational needs. However, there are always questions with new solutions. We reached out to industry thought leaders to answer some of the marketplace’s most pressing questions on hybrid cloud. In this eBook, you’ll learn why thought leaders like Kevin Jackson, founder and CEO GovCloud Network, look at hybrid cloud from the viewpoint of hybrid IT. You’ll also hear from Shelly Kramer, co-CEO, V3+Broadsuite, on what CIOs need to consider when adopting hybrid cloud.


Malvertising – the new silent killer?

For sites that use these ad networks, limiting who can advertise on your site can cut back on the chance you're going to serve up malvertising. "Most of these ad networks allow you a wide array of which type of ads you'll accept," says Wilson. "I'll accept ads from IBM, Dell and Oracle, but I'm not going to accept ads from just any random unknown person."  Websites that use ad networks should also make sure their security is up to date, says Kowsik Guruswamy, CTO of Menlo Security. In a March report, Menlo Security found that of the top million ranked domains on Alexa, one third are running software with security gaps. "There are domains out there running software that hasn't been updated in years," he says. "We're seeing sites that are running software from 2010 that have known vulnerabilities."


You’ve Been Misled About What Makes a Good Password

The results show that making a password longer or adding symbols is a better way to strengthen it than by adding uppercase characters or numbers. That’s because people tend to add uppercase characters at the start of passwords and numbers at the end, and password attacking methods can take advantage of that, says Dell’Amico. “Basically you need to make your passwords less predictable,” he says. The new method could be used to create more accurate ways to give people a sense of the strength of a password, says Dell’Amico. A good way of doing that is important but has long proven elusive, says Mark Burnett, a security researcher who published one of the password research databases used in the study.


The Business Value of (Effective) Architecture – Part 2

So here’s how I went about to measure the value of EA. I started with the premise that if we had perfect information and did perfect planning, each project would cost exactly what we projected, it would finish on time, and it would deliver the expected business results. If we take a simple scenario of a $100M annual budget for capital projects and assume that on average the projects take 12 months, have a 12 month payback (business benefits in the first 12 months of operation equal the initial project cost), and have a maintenance cost of 20% of the original project cost, and the cost of capital or the internal rate of return is 10%, then the net present value (NPV) of the $100M investment is $143M which represents a 43% ROI over a 5 year period.


Developing Test Automation Scripts and Automation Frameworks

Framework is so nice word that when you say it – it makes an impression. For instance, the Zachman Framework is not related to any developed components – it’s a methodology to define enterprise architectures. The same goes for in-house automation built frameworks – they can contain both components for test automation along with approaches, describing how to automate something in the best possible way. This is what test automation experts (including me) show to their customers willing to start test automation for the first time or to understand what is going on their current automation project. One more important framework family to mention. Those are tool specific or project specific frameworks and target less coding experienced staff – to enable them write and support automation scripts.


The New Old: High-Tech and Design for Aging

We are entering an age of “invisibility” — automated solutions are disappearing into the fabric of users’ daily lives and allowing someone to live without thinking twice about using them (think Samantha, the OS in the movie “Her”). More and more innovators are coming to us to create health care products that integrate with mobile technology, the cloud and artificial intelligence. As boomers increasingly demand to age in place, however, we’ve found that creating advanced technology isn’t enough anymore — we must spend time talking to aging users and their caregivers and studying the ecosystems of their lives to understand how the new technologies we develop can best service them.



Quote for the day:

“You never win unless you win the hearts of people.” -- Syed Bokhari

October 23, 2015

IT pros weigh Dell versus HP as one swells, the other splits

"One could argue HP is splitting to disaggregate itself so HP Enterprise is free to find more relevant software assets for its portfolio," Woollacott said. "It will be interesting to see who can do a better job at cohesively integrating these assets, identifying the overlaps and creating a roadmap." The acquisition of VMware, long the leader in virtualization, could offer Dell a major advantage over HP, but officials from both companies this week did not clearly spell out what strategic role VMware would play, except to convey that Dell has no plans to change VMware's strategic course. If this hands-off approach, at least for the short term, plays out, some analysts think it will serve both VMware and Dell well.


Defining the "I" In Small Business CIO

A small business typically has no CIO. The company may employ an IT manager, but in many cases owners and CEOs fill the role as they spin different functional and tactical plates simultaneously in a precarious balancing act to prevent overspending and keep the business solvent. While corporations employ CIOs and full tech-savvy teams to focus on infrastructure, innovation, integration and intelligence, SMB leaders don’t have that luxury. Thinking about analytics and its potential benefits may be a plate too many for the SMB owner/CEO. Often, it’s the head of sales or someone in marketing – if there is a marketing department – who starts to wonder how analytics could help the business.


What Dancing Lizards Can Teach Us About Human-Robot Interaction

Living systems famously resist control. Models and robots offer scientists a modicum of command over otherwise unwieldy factors, like when and where a lizard chooses to dance. Robots, the authors argue, are particularly useful when it comes to the complicated world of animal social interactions. They offer amphibian examples: several different studies used “faux frogs” to re-create the visual and auditory cues of a frog mating display. (One robo-frog had pneumatic vocal sacs made of condoms.) Having separate control over the two parts of a frog’s display—the inflation and the singing—allowed researchers to ask which was more important to mating success. This sort of research cannot be written off as only working on “lower” animals either.


Ford Motors, PwC, Starwood CIOs Talk Future Of IT

Klevorn's approach to innovation is partially influenced by her business acumen, which she said has proven advantageous in her role as CIO. "You have to have a hand in both places," she said of today's IT leaders, who have to be strategic and innovative, in addition to possessing technological expertise. "Everything we do -- whether in our fields or outside our fields -- has a huge tech component." Sufficient experience, whether through formal education or on-the-job training, is critical for CIOs. "You can't be a chef without ever having cooked," noted Starwood's Poulter. Future IT leaders can't fill a senior position without knowing firsthand how networking works or how data influences outcomes.


Surface Book vs. Surface Pro 4: Picking the best came down to just one thing

We both agree that the Book’s appeal lies in its discrete GPU, battery life, and laptop-like form factor. The SP4 is slightly cheaper but offers some serious bang for your buck. Gordon and I know both devices: I spent time with the Book, then tested the Surface Pro 4. Gordon owns a SP3 and wrote our Surface Book review.  But a funny thing happened on the way to publication: Each of us became convinced that the other Microsoft product was better. I’m sold on the Book’s long battery life, and Gordon was more partial to the sharp uptick in performance the SP4 offered—without all the cash you’d have to lay out for the Surface Book. So here’s what we decided to do: make our case for each product, and let you decide who’s right.


How Shamsheer Vayalil Built VPS Healthcare into a Billion-dollar Firm

You learn something new every day. As someone who didn’t know how to run a business and had no previous experience of running hospitals, it was a completely new challenge. And I was enjoying that journey — to be there every day, talking to the mechanics, talking to the contracting people, talking to them about construction, learning how the electromechanics work inside an operating room, and how the waste water should be ejected out of the hospitals. So, everything was different. Everything was learning. And I was very keen to learn. I would be there early in the morning, spend 18-20 hours without any problem, fully charged. I didn’t get sleep because of the excitement. This is still the case, sometimes when you have interesting projects.


Are wearables worth the cybersecurity risk in the enterprise?

How can we effectively provide security on devices that appear insecure by design? It seems the safest option is to ban all wearables in the enterprise – there are too many risks associated with them, many of which seemingly cannot be controlled. If this thought has crossed your mind, I may have bad news for you. This isn't really an option for most organizations, especially those looking to stay current in today's fast-paced society. TechTarget's Michael Cobb explains, "Banning wearable technology outright may well drive employees from shadow IT to rogue IT – which is much harder to deal with." If the threat of rogue IT isn't enough to convince you, also consider that there may very well be real benefits of wearables for your organization. 


Digital leaders at DHL, CVS defend against, exploit digital disruption

Increasingly, DHL is turning to technology to build relationships with package recipients. In Germany, DHL is piloting an unusual partnership with Amazon and Audi that would enable DHL to deliver packages to the trunks of Audi customers. "It's something … that might not be recommended for countries with high security issues because you might find the package, but not the car," Ciano joked. "It's on the high end, the extreme of innovation." In the U.S. and Europe, DHL is partnering with third-party delivery locations (Ciano mentioned CVS as a U.S. example) to give customers package pick-up options.


Microsoft has been quietly laying the groundwork to build its own version of Android

What would that mean? The source code for Android is released under an open source license, which means it's freely available for anybody to see and modify. Microsoft would simply take a recent version of it, add links to its own apps and services, and maintain that version in parallel to whatever Google does with the main version of Android. This is exactly what Amazon did with Android a few years ago when it started building the Kindle Fire tablet. Intriguingly, when a reporter asked Microsoft executive Julie Larson-Green about the possibility earlier this month, she didn't outright deny it. Instead, she said only, "We'll go wherever our customers are." While this idea may seem rash, Microsoft has already started laying the groundwork.


How the Internet of Things will Impact our Productivity

The Internet of Things will help individual companies to limit the waste factor in global economies in more effective ways. Products which are connected to the web can communicate how they're being used or their current status. In the near future, Porter predicts that this data will be used to schedule maintenance when it's really needed, not according to a set of inefficient rules that negatively impact the productivity of many a customer service. Usage data, on the other hand, will feed back into predictive analytics which will be used to reduce failures and improve product design. In sum, all those functionalities will boost the efficiency of our products and increase their value, inspiring a surge of productivity and innovation.



Quote for the day:

"Just because something is easy to measure doesn't mean it's important." -- Seth Godin

October 22, 2015

MySQL 5.7 aims at deeper convergence with Oracle tech and NoSQL

“MySQL 5.7 delivers a wide range of innovations, allowing developers, database administrators and DevOps teams to build and manage next-generation web and cloud-based applications capable of processing ever-increasing volumes of data,” said Ulin. “It builds on development milestone releases that have enabled users to preview, test and provide feedback during the development process. As a result, this release has been a collaborative process involving a wide range of members of the MySQL community.” In an interview with Computer Weekly, he added: “We scale very well up to 64-core plus with the software now. So in two years’ time, for example, when a CIO equips his IT shop with new machines, 5.7 is written to fully utilise those.


8 qualities of strong mentors

One of the most important roles of a leader is to provide workplace supervision. It is our duty to manage others in their work – particularly those who are newer and/or less experienced — and ensure that they perform their duties correctly and on schedule. Without such supervision, it is generally assumed that workers will slack and underperform. But if we want our people to grow in their positions and achieve optimal job satisfaction and retention then we need to also provide mentorship. Mentorship is a relationship that is created between an experienced professional and a less experienced mentee or protege. Its primary purpose is to build a support system that allows for the natural exchange of ideas, a forum for constructive advice, and a recipe for success.


Five Principles for Applying Data Science for Social Good

" We've already seen deep learning applied to ocean health, satellite imagery used to estimate poverty levels, and cellphone data used to elucidate Nairobi's hidden public transportation routes. And yet, for all this excitement about the potential of this "data for good movement," we are still desperately far from creating lasting impact. Many efforts will not only fall short of lasting impact - they will make no change at all.  At DataKind, we've spent the last three years teaming data scientists with social change organizations, to bring the same algorithms that companies use to boost profits, to mission-driven organizations in order to boost their impact. It has become clear that using data science in the service of humanity requires much more than free software, free labor, and good intentions.


The governance of data, data governance/management and data classification

"The world is being re-shaped by the convergence of social, mobile, cloud, big data, community and other powerful forces. The combination of these technologies unlocks an incredible opportunity to connect everything together in a new way and is dramatically transforming the way we live and work." Nowhere is this transformation more apparent than in cloud-based services. By their nature cloud services offer a rich and near endless source of data for us to manage and if correctly managed, from which we can extract value. While one sees cloud service providers securing their environment to offer a more reliable and trusted service, users of cloud services may find daily management of data and relate extraction of value and benefits, an increasingly complex aspect of their businesses.


Is Your Smartphone Putting Your Employer At Risk?

One of the biggest threats to company data in a BYOD environment is a lost or stolen device, says Terry Evans, founder of CyberSecurity Biz. When a personal device falls into the wrong hands, company data may be at risk. Evans says there are some simple actions you can take to guard against such threats. If you have an IT department, check if they offer "wiping" apps that can be accessed remotely and can erase or lock your phone. (While Evans doesn’t recommend specific apps, examples of these are Autowipe and Android Lost for Android and Find My iPhone for iOS. These are available in the app stores.) If your device is lost or stolen, report it to your IT department or your own supervisor immediately so the company can be on the lookout for breaches.


Safe Harbor was for EU privacy: But how safe is US data in Europe?

The European Commission instituted the Safe Harbor agreement in 2000 to facilitate moving digital information between the US and the EU with appropriate safeguards to protect European citizens' privacy. Without the agreement in place, the European Court of Justice ruled that each of the EU's 28 member states should individually regulate how companies collect and use online personal data. The ruling may impact US tech companies, like Google, the most because they rely on their global network of datacenters to manage their global consumer bases. Notably, personal search data is commonly used to develop targeted online advertising. To access digital data that is stored in the EU, American companies will now need to comply with Europe's stringent privacy rules through other legal frameworks.


CFOs seek single source of truth for their big-data-driven business transformation

To combat the data divide across departments, CFOs are prioritising more holistic and collaborative planning and analysis, partnering with key C-suite executives to deliver aggregate views of critical business information ... “Faced with a challenging macroeconomic environment and the need to provide a more holistic view of the business, CFOs are increasingly becoming the ‘knowledge executive’ in the organisation,” said Tom Bogan, CEO, Adaptive Insights. “As both the volume and sources of data increase, CFOs are working across departments, driving toward a single source of truth that gives them a more consistent, comprehensive view of the organisation in real time. This view will ultimately provide more accurate business insights and inform more effective business strategy.”


CIO interview: Frans Westerlund, Fiskars

“When a company goes through a major change, IT also needs to transform to be able to support this change,” says Westerlund. “We had scattered teams and fragmented systems.” He says the company started by harmonising its IT infrastructure. It then implemented a centralised IT organisation, initiated shared processes and created new decision-making models. The result has been a complete IT governance overhaul to manage the new model. All strategic IT decisions have been moved from country organisations to Fiskars’ executive board, while on a local level decisions are made by each business sector’s management teams.


Stylish and Sane: A Guide to Better CSS

There are two principles that can help you stay sane when styling your site. The first is that you should treat your CSS like code. CSS is the most neglected programming language. We think it’s too hard to keep it maintainable so we don’t even try. When you start applying the same coding practices you’re used to in other languages, you’ll see that writing CSS isn’t so bad. The second is that you should think about your styles like a consumer. We don’t think about re-use when we style our websites, so our styling is never re-usable. When coding something new, we find it hard to know what the right way is to do it, or even what the end product should look like. When you’re actually consuming an API as you code it, it ends up being much easier to understand and use.



Agile Failure Patterns to Look For

Who wouldn’t agree that the four core principles of the Agile Manifesto – Individuals and interactions over processes and tools; Working software over comprehensive documentation; Customer collaboration over contract negotiation; and Responding to change over following a plan – aren’t derived from applying common sense to a serious problem? ... the scope of an Agile organizational transformation is often completely underestimated. That Agile is not the quick fix for everything that’s going wrong. Each organization has it own set of dysfunctions and hence solutions dealing with them need to be tailored specifically to that organization.



Quote for the day:

"The really important things are said over cocktails and are never done." -- Peter F. Drucker

October 21, 2015

I'm a cyborg now - and so are you

Mixing sensors on our bodies, in our homes, and in our devices is bringing about an intriguing, science-fiction-like world. This isn't tomorrow, this is today, all over the developed -- and the developing -- world. As we bridge the Internet of Things and our personal area networks, we're immersed in a sea of low power radio, linking us to our machines and linking our machines to us. It's not hard to see a piece of software monitoring my wearables, letting me know that I should move. That's already a function of the Apple Watch, and anecdotes from Cupertino talk of meetings being interrupted by people getting up and walking around. 


The future of Cloud computing

In order to consider the future of cloud computing, it’s important to realise that there are a number of different adoption scenarios out there. ... The older companies might also have a history of insufficient IT investment and will continue to struggle to adapt to the new technology landscape because of their legacy IT. New entrants to their markets are threatening to disrupt the establishment because of the different approach to IT and cloud use, not just because of the difference in market offerings. The following observations of the future of cloud apply to both scenarios, albeit to different extents.



IoT hype, hope give rise to new C-level position, chief IoT officer

Making room for a chief IoT officer underscores the emphasis -- and the urgency -- senior leaders are placing on the technology. "In the past, you could get to market late," Heppelmann said. Today, competition is brutal, and being late to market is not only a missed opportunity, it's a failure to understand that "data exhaust coming off of products gives you new leverage over your customer base." Worse? Businesses (and not just of the vendor variety) that aren't jumping on first-to-market IoT opportunities put themselves at risk for becoming copycats, what Heppelmann called the "me too" companies. A conservative watch-and-learn approach could create setbacks that "me too" companies can't recover from -- not the least of which is keeping pace with rapidly evolving technology.


HTTP/2 is Ready, But Are You Ready For It?

Encryption is a de facto mandate in HTTP/2 implementations at the moment because all known browser implementations from the likes of Firefox and Chrome only support HTTP/2 with TLS encryption enabled. If you are a web content provider who relies on a content delivery network (CDN) to reduce latency, you will need to share your encryption keys with your CDN providers. While some providers are comfortable doing so, many more are not. Given these various requirements, many organizations will have to weigh the benefits of HTTP/2 adoption against the costs of implementation. Do the performance improvements make it worth the steps required to support it? This calculation will probably lead many web content providers and enterprises to hold off on HTTP/2 implementation.


What You Need To Know About The CISA Bill In The U.S. Senate

CISA is yet another attempt by the U.S. Senate or House of Representatives to present legislation based on security, privacy or copyright that would regulate Internet activities. The Stop Online Piracy Act (SOPA) in 2012 would have allowed companies (like movie studios or record labels) to take down websites deemed to be infringing on copyrighted material. Opponents of SOPA said the bill provided too much leverage to media companies and the government to take down websites for even the most trivial of offenses and survey user activity. An online protest led by the likes of Reddit and Google ultimately caused the bill to fail in Congress. SOPA had a sister bill called the Protect IP Act of 2011 that also aimed to give the government and companies the ability to increase surveillance in the name of protecting copyright and fighting digital pirates.


Safe Harbor Ruling Leaves Data Center Operators in Ambiguity

“It is unrealistic to think that all transatlantic data is going to have to stop as a result of this decision,” Snead added. “The European Commission is likely to figure out a way to accommodate it, and the US is as well.” Safe Harbor, created in 2000, is a uniform set of rules for handling personal data of citizens of member states of the European Union, including rules around moving that data to facilities in the US and storing it there. If a service provider complied with the rules, they could be confident that they were not breaking any European privacy laws. Former NSA contractor Edward Snowden’s public disclosure of the US spy agency’s covert electronic surveillance practices, however, eroded trust in Safe Harbor.


Business alignment and data analytics top CIO concerns, says SIM study

“Although alignment has received considerable attention from both academics and practitioners, it continues to remain a challenge for many organizations. It is possible that alignment remains a persistent issue due to the changing nature of business and the difficulty that the IT organization has in responding to these changes. In other words, it is one thing to become aligned, but quite another to stay aligned,” the study authors noted. Further, “Alignment of IT and/with the Business,” which has ranked in the top three for over a decade, retained the number one position it has held since 2013. Similarly, “Security/Privacy” retained the number two position that it achieved last year.


‘Response and Recovery’ Emphasized for Cyber Attacks

“So basically there are two kinds of companies: those that have been attacked and know it, and those that have been attacked and don’t know it yet.” The headlines report attacks at Target, Home Depot, Verizon and AT&T, but Joseph Bermudez, regional managing partner at Wilson Elser, said that it is not always malicious activity that causes a cyber loss. “Sometimes it is a bad act, but often it is an accident,” said, noting that regardless of the cause, “if there is a breach, your client will get a letter from their customer saying that they caused a problem and that they are owed some money. Now your client has a liability.”


The Five Qualities of Application Delivery Done Right

So if immutable infrastructure has all these benefits, why aren't all companies using it? First off, immutable infrastructure takes organizational buy-in. But even if an organization believes in the merits of immutable infrastructure, creating a system to build, deploy, maintain, and manage immutable infrastructure is not an easy task. Building images or containers is easy. Deploying and maintaining images and the provisioned hosts is challenging. However, once the build-time system is in place, it is significantly easier to manage runtime environments since there are less moving pieces. For individuals managing personal websites or companies managing small infrastructures, the investment into immutable infrastructure is probably not worth it.


Building an online game platform: Startup caters to developers

"The analytics and tools model is one of the most common ways to attract developers to gaming platforms," said Sangeet Paul Choudary, founder and CEO of Platform Thinking Labs and co-chair of the MIT Platform Strategy Group. He noted that the same model is used to attract brands to marketing platforms. In addition, the analytics-and-tools approach doesn't fully address what Choudary refers to as the chicken-and-egg problem of platform business models: the need to get producers and consumers on board to make a two-sided business work. "The issue is that it isn't really solving the chicken-and-egg problem as much as augmenting value once the problem gets solved, because there isn't really much value in analytics below a critical mass of usage," Choudary noted.



Quote for the day:

"Behind every argument is someone’s ignorance." -- Louis D. Brandeis

October 20, 2015

Digital currency is poised to reinvent how startups are funded

The blockchain allows digital items to be both authentic and scarce. Beyond simply providing the backbone for digital currency like Bitcoin and Litecoin, the blockchain can also be used to publish inalterable public records of, for example, asset ownership. Chroma Fund offers blockchain-based digital share certificates for each company that investors fund. Because the blockchain can be used to verify the authenticity of digital items, digital items can then achieve scarcity similar to that of a physical, material good. While the Chroma Fund share certificate is not a paper, because its authenticity is tied to the blockchain the share becomes a unique, discrete item that can be traded and sold with trust.


Internet of Things standards groups get ready to rumble at CES

Having a house full of locks, lights, appliances and thermostats that can communicate with each other and the cloud is critical to getting value from those purchases. For example, a connected door lock is worth a lot more if it can tell a thermostat that you’ve come home and the heat should go on. Unless all the pieces come from the same company, they need a shared, cross-vendor language for finding and understanding each other. AllSeen is offering its AllJoyn framework to fill that need. OIC is promoting its own standard and a reference implementation called IoTivity. The first full version of the OIC standard was completed last month.  Apple’s HomeKit system, and the Weave platform developed by Nest, now part of Google’s Alphabet universe, may also give those standards a run for their money.


Mercedes-Benz liberates the road to autonomy with connected car app

Users of the Mercedes Me app will no longer have to worry about getting into a freezing car on a winter morning or a hotbox on a summer afternoon, and accidentally locking themselves out of their cars will also be a thing of the past. The app, for iPhone and Apple Watch, will allow consumers to monitor a vehicle’s vitals and temperature from afar, as well as to lock and unlock the door from even further away than a remote-operated key. “When designed and developed right, connected apps can offer consumers the utility and convenience they desire,” said Sep Seyedi, CEO of Plastic Mobile. “In turn, brands are not only supporting the post purchase journey but continuing to drive brand awareness and engagement. It’s a win-win situation for both brands and consumers.”


Deutsche Telekom Said to Weigh New Antitrust Complaint Against Google

The move by Deutsche Telekom would make it an official complainant in the case, allowing the company to provide information and potential evidence on why it believes Google abuses its control over Android. The evidence could include data on which mobile services the carriers’ tens of millions of users regularly access on their cellphones. Such information could help European competition officials decide whether to bring formal charges against Google linked to the region’s Android investigation. Competition authorities have been focusing their attention on Google’s Android operating system, which powers more than 80 percent of the world’s smartphones, according to Gartner, a research firm.


The Estimation Game - Techniques for Informed Guessing

A big problem with being numbers-driven is that you often don’t have the numbers. This is especially true when contemplating designs for systems that don’t yet exist. The more cheaply and quickly you can make reasonable estimates of those numbers, the more designs you can consider, the better your final design will be. Fast and cheap answers allow you to explore a larger space of possibilities, kind of like how you can now research the specs and reviews of different cars before you step onto the lot. This kind of exercise is often called a “Fermi estimation”, after a legendary incident in which Enrico Fermi dropped bits of paper into the shockwave of a nuclear test to estimate its yield.


Predictive Analytics Business Case is Simpler Than You Think

To craft the specifics of the business case, concisely define the business issue that will be addressed. Assess the current environment and offer a gap analysis to show the difference between the current environment and the future environment). Offer a recommended solution, but also offer alternatives. Detail the specific value propositions associated with the change. Create a financial analysis summarizing costs and benefits. Support the analysis with a timeline including roles and responsibilities. Finally, detail the major risk factors and opportunity costs associated with the project. For complex initiatives, break the overall project into a series of shorter projects.


Virtual Reality App Innovates the Experience of Music

More and more, recorded music is being thought of as a free market. After a while of trying to catch up with that, I just didn't want to roll with it anymore. So I kind of stopped putting out CDs, really focused on the live show and what I could do more in person and that experience. That's a very difficult thing to reproduce—there's no screen, headphones, speakers, even through a theater it's so low resolution compared to being in person. The body language, the little tiny tics people make, the audience, the resonance of the room.


Artificial intelligence: Should we be as terrified as Elon Musk and Bill Gates?

AI is already creeping into military use with the rise of armed drone aircraft. No longer piloted by humans, they are carrying out attacks against enemy targets. For now, they are remotely controlled by soldiers. But the question has been raised of how long it will be until the machines are given specific humans or groups of humans--enemies in uniform--to target and given the autonomy to shoot to kill when they acquire their target. Should it ever be ethical for a machine to make a judgment call in taking a human life? ... Certainly governments are going to want to get involved with laws and regulations, but the tech industry itself can pre-empt and shape that by putting together its own standards of conduct and ethical guidelines ahead of nations and regulatory bodies hardening the lines.


QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did!  Whether you're a developer trying to protect your insecure app from winding up on user devices, an Android n00b or a pentester trying to pwn all the things, QARK is just what you've been looking for!  This tool combines Static Code Analysis with source-sink mapping, teaching by detailing misconfigurations, citing research detailing the issues and automatic exploitation into one, simple to use application!  Our tool will review any Android app, either from source or APK, highlight version specific issues, detail your app's attack surface, inspect all your app components for misconfigurations and allow you to create on-demand proof-of-concept attack applications.


Is it Still Possible to do Phone Phreaking? Yes, With Android LTE

Google said it is working on a software patch for Android which will be released next month. Apple's mobile operating system, iOS, is not affected, according to CERT.  Android's problem is with its permissions. On 3G networks, there are separate network domains for data packets going over the Internet and phone calls, which go through circuits. But with LTE, voice and data go over Internet. Android's permission that governs phone calls doesn't matter since calls are no longer going through a circuit-switched network, Kim said. That opens up an interesting avenue for attack. For example, if a victim can be tricked into downloading a malicious Android application, it could, for example, initiate a video call over the data channel.



Quote for the day:

"Action is the foundational key to all success." -- Anthony Robbins,

October 18, 2015

Why visibility and control are critical for container security

Having visibility into the code inside containers is a critical element of container security, even aside from the issue of the security of the containers themselves. New vulnerabilities are being constantly discovered that impact older versions of open source components. Hence, knowing the container is free of vulnerabilities at the time of initial build and deployment is necessary but far from sufficient. Securing the contents of containers is comparable to any other software stack security question. ... The security risk posed by a container depends on the sensitivity of the data accessed via the container as well the location of where the container is deployed, for example, behind a firewall or Internet-facing.


Wi-Fi Trick Gives Devices Super-Accurate Indoor Location Fixes

We can use off-the-shelf, already deployed Wi-Fi infrastructure but get accuracy comparable to state-of-the-art systems that require specialized equipment or modifications,” says Katti. In tests, a Wi-Fi device could locate itself with a median accuracy of 40 centimeters. SpotFi is a refinement of another existing Wi-Fi location method in which a device uses the signal strength from different Wi-Fi access points as an indication of how far away they are. It can then use data on their known locations to triangulate its own position. That approach can only locate devices to within a few meters because Wi-Fi signals bounce, obscuring the true distance to the access point.


EU to US: Stop storing our data on your servers (or else)

Based on the new unsafe harbor ruling, you're in violation of European law. That login and account information needs to be moved to a server located in Europe. Can you imagine the hassle this would be if it were enforceable, and we now needed to segment our user databases and all our other information so that we could dump data on a server located in each major country or region? This is the issue facing IT managers. Right now, as the Department of Commerce has shown, there's no determination about what y'all are supposed to do. But because the Safe Harbor provisions are now null and void, the door is open for international lawsuits targeting your organizations, just because you happen to run a database hosted in the land of the free and the home of the brave.


Oliver Cameron: From iOS Developer to Udacity VP

My lowest point in the journey of becoming an iOS Developer was the launch of another app, Friends for iPhone. Friends added a layer on top of your address book, and allowed you to see activity from your friends across all of your social networks in one app: Instagram, Twitter, Facebook, LinkedIn and more. A fun concept! Following on from the launch of Voices, I challenged myself to go bigger and better with Friends. This pressure meant that I felt like I couldn’t launch the app until it was perfect, and as such I invested 6 months of time and a ton of money. It turns out, perfection is nothing if your idea sucks. A few months after launch I had to ultimately call it: Friends was a failure.


Professor Dr Robot QC

Machines are challenging the professions’ two most important claims to being special: their ability to advance the frontiers of knowledge and their exclusive licence to apply their expertise to an unordained laity. ... Computer scientists in Tel Aviv University have invented an algorithm that, using facial-recognition software, is solving a puzzle that has kept Torah scholars busy for decades: piecing together 300,000 ancient Jewish manuscripts that were found, many torn and tattered, in the attic of an old Cairo synagogue. Various bits of software regularly outperform legal experts in predicting the outcome of court decisions from patent disputes to America’s Supreme Court.


Malvertising is a troubling trend

The Angler exploit kit has been around for a couple of years in various forms, and until now it didn’t stand out as a particularly unusual threat. But it turns out that the newest version has some new and improved techniques to avoid detection, such as encryption and the exploitation of zero-day vulnerabilities that haven’t yet been incorporated into the mainstream antivirus products. It also runs only in the memory of the infected computer, instead of installing itself on the hard drive, which is where desktop antivirus products tend to focus their attention. This is the startling part — that the bad guys have found a way to effectively stay invisible.


Is Security Possible With the Cloud?

No surprise here – the number one pushback that I get when speaking on this strategy is security. You’re really going to put all of your data, much of which is sensitive and confidential to clients, in the Cloud? Really? To be fair, security is, and always will be, a valid and primary concern for IT, and, of course, not just with respect to the Cloud. So let’s back up (so to speak) to another premise:absolute security is an abstract, theoretical concept. There is no such thing. If it’s possible to access a resource, then compromise to that resource is also possible. And since the Cloud increases the number of possible avenues to accessing a given resource, there’s a huge question here: is security even possible for Cloud-centric IT?



The Rise of Enterprise Analytics and The Analytics of Things

First, if an organization is truly experimenting with their data to make significant discoveries, to validate the results, to refine and improve the analytics models, to extract meaningful insights from data, and to implement innovative data-driven processes, then a data scientist is usually required. More specifically, a data science team is required, since no single person can have all of the required skills for successful enterprise-wide data science.  Second, there are some analytics functions that are scientifically or mathematically less intensive that can be carried out by analysts throughout an organization. Some of these functions include data exploration, data quality verification, data transformations, correlation analyses, model-testing, data visualization, reporting, and so on.


LeSS Framework: Principles, Practices and Core Concepts

When adopting LeSS, it will affect the structure of your organization. What often happens is that organisational problems that are traditionally solved in a complex way, are solved in an easier way in LeSS. Having small batches of working software Sprint by Sprint enables removal of organizational complexity that was created for coping with the lack of transparency in traditional development. This is best explained with some examples. Traditionally, organizations manage work using projects. A project, from an Agile/lean perspective is a way of managing a large batch of requirements towards a release. When focus on products and continuously delivering value to users, the project way of managing work becomes largely obsolete.


3 Tips on How to Create a Cyber Security Culture at Work

As we all know, computer criminals pose a serious threat to businesses today in that they can steal corporate intellectual property, as was the case with last year’s Sony hack; compromise employees’ personal and medical health information, the latter of which isincreasingly valuable on underground web markets; and overall depreciate an organization’s reputation. These external actors may also exploit bad security decisions on the part of internal employees, the effects of which may be amplified by poor or incomplete bring your own device (BYOD) guidelines or policies designed to protect Internet of Things (IoT) devices. In accordance with NCSAM, it is everyone’s responsibility to help protect his/her organization against a breach or targeted attack.



Quote for the day:

"It is the essence of genius to make use of the simplest ideas." -- Charles Peguy

October 17, 2015

Four interesting implications of Walmart's open-source cloud announcement

OneOps, which has been an important project within @WalmartLabs, the retailer's Silicon Valley incubator, automates the process of switching from one cloud to another. OneOps helps developers and enterprises "avoid the pitfalls of being locked-in to a cloud provider, and thrive in WalmartLabs' DevOps culture - whatever code developers write, they own, from its development to its launch to customers," said King and Kimmet. They add that @WalmartLabs' 3,000 engineers use the solution, and, on average, "commit over 30,000 changes per month to deliver new or improved features to our customers." There are four interesting things about this announcement

Portfolio managers don’t need to be told that all projects and programmes should align to strategy. A strategy without the projects to deliver it is just a plan. Probably a pleasant, creative vision of what the future state looks like, but in the absence of action it will stay as a set of slides and nothing more. The bit between the CEO presenting the strategy at the annual conference and the frontline staff actually seeing the benefits of this is often missing. Delivering business transformation requires creativity from all teams. IT is not devolved from this. If you take my old manager’s view that all change is business change, then IT becomes a service function, working in tandem with their colleagues in other departments and delivering projects that underpin business strategy.


Argentina is betting on programming to boost its tech sector

Technology and specifically computer programming has had some successes in Argentina. In June the University of Buenos Aires was recognised for computer programming skills in the International ACM Programming content. UBA finished 18th in the global rankings, with Harvard coming 19th, making it the highest ranking university in South America for computer skills. The country produces on average 98,000 graduates and 11,000 postgraduates, creating a skilled workforce across various fields, so the ministry’s new plans hope to plant the seeds for IT and computing skills at a young age. The building blocks are certainly there for Argentina to grow its IT sector by focusing on its impressive programming reputation.


Facebook Open Sources Data Query Language GraphQL

The GraphQL server is a relatively small bit of code; it's responsible for a few things. It provides utilities for defining your type system and how it interfaces with your server code. It accepts GraphQL queries and will validate that they can be safely and unambiguously run within your type system. Then of course it executes the query by calling into your code as you defined within your type system while handling things like asynchronicity, parallelism, and error catching for you. The roadmap ahead is two-fold. First, better tools for client developers for doing things like code generation and query management. Relay is our primary and most significant tool for the client.



Deep dive review: The iPhone 6S Plus delivers the goods

Existing features of the 6S Plus (and its smaller sibling, the 6S) have been improved and there are even a few groundbreaking features thrown in for good measure. Unlike the 2014 iPhone launch, when numerous issues -- including an unstable iOS 8, a botched software update that killed cellular coverage for some iPhone 6 models, and, ugh, "Bendgate" -- put a damper on things, this year's rollout went smoothly. Apple reported that it sold over 13 million iPhones in the first weekend of retail sales; the iOS 9 update has been generally responsive and stable; and, only a few weeks after release, Apple asserted that over 50% of iPhone users had the latest version installed on their devices and that over 13 million phones were sold in the weekend following the launch.


How Data Integration Can Kill a Partnership Before It Happens

Data integration has come a long way in 15 years. While it used to be a multiyear and hugely costly undertaking feasible for only large enterprises, midmarket companies now have access to the same level of integration capabilities thanks in large part to cloud technology.  However, there is still a long way to go, especially in post 2008 recession times. With expectations higher than ever before to produce value and market pressures demanding that businesses move at a faster pace than ever before, small and midsize organizations especially don’t have enough IT resources, cash or time to devote to their integration efforts. Seamless integration is critical for organizations in their ongoing quest to do more with less, however certain hiccups can end a partnership before it even has a chance to begin.


Introduction to Android Wear

More than programming the smart watches, there are various aspects and concepts that one has to learn or understand in terms of designing apps for smart watches with a small real estate. These days, till today most of us are still using desktops, laptops and smart phones to perform our day to day tasks. But with the advancement of smart watches, there’s a drastic shirt in the way how things can be performed. Wearables in itself is an interesting ones with a lot more challenges in designing apps; fortunately, when it comes to the App design, Google has put forward very good documentation on how to design, so we don’t have to break our head in understanding how to design for smart watches.


What's next in aaS? Workspace-as-a-Service

An IDC research report titled, "Worldwide Workspace-as-a-Service 2014-2018 Forecast", revealed that "the hosted WaaS market will grow from $282 million in 2013 to $1.7 billion by 2018, representing a five-year CAGR of 42.5 percent." ...  Microsoft realized this trend and responded with Office.com. Intuit has done the same with its web-based Quickbooks offering. And Salesforce.com was the first to set up a SaaS CRM solution for its customers. Vendors have long realized that operating systems were less important than the applications themselves. And the BYOD generation couldn't agree more. The seamless interchange of information seems to be the only requirement for applications, regardless of device, vendor, or manufacturer.


Yunomi promotes Japanese ‘tea commerce’

“If you're not a connoisseur or tea expert,” he adds “we are building a Tea Dojo, in which you don't just buy to tea to drink, but follow a progression of tasting sets to learn more about Japanese tea.”  It is this idea of linking the whole culture of eating and drinking into wider aspects of being Japanese that makes the whole thing so interesting – although perhaps, at first, confusing. At present, for example, there are two websites. “The new website, Yunomi.life, will be our primary storefront,” says Chun. “Our old website will remain active and eventually become web magazine.” The original website contains a lot of information on various aspects of Japanese culture – including literature and a wide variety of other things – and Chun confirms this will continue as the company progresses.


BYOD is as entrenched (and complicated) as ever

Such wide variations likely occur because some companies reimburse workers for buying their own smartphone or tablet to use at work, and even pay part or all of a monthly wireless service charge. Other companies expect a BYOD worker to pay for it all, while offering back-end support for company apps used on the devices. At the heart of the BYOD trend is the distinction between "personally liable" devices -- those brought in from home by workers -- and "corporate liable" hardware, where a company owns a smartphone or tablet provided for a worker's use, with the company usually paying all costs. Corporate liable practices have evolved in recent years to include a choose-your-own-device (CYOD) model where a business allows workers to select from a list of specified devices for business use, primarily to give IT shops more control over hardware and data.



Quote for the day:


"Try to become not a man of success, but try rather to become a man of value." -- Albert Einstein,

October 16, 2015

Fighting today’s Advanced Attacks

Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a comprehensive strategy that can eliminate the weak links and evolve as the threat landscape evolves. This solution guide explores the myths and issues surrounding Advanced Persistent Threats (APTs) and how the right solution can offer the necessary protection against APTs and other targeted attacks.


Netflix reveals the future of enterprise tech: Here’s why

“AWS is now the basic layer of compute services,” said Hunt. Netflix is not just heavily reliant on AWS — it’s about to become completely dependent. Hunt plans to power down his company’s last data center this year, at which point Netflix will be running almost entirely on outsourced cloud infrastructures, mostly operated by Amazon. (It’ll still run its own content delivery network — CDN.) Note that this timeline is new. Netflix originally said it would shut down its last datacenter in 2014, and then again this past summer, but the future sometimes comes a little slower than expected. That’s one aspect of enterprise infrastructure that will probably never change.



Creating Value for Business: 2 Data Science Questions You Must Ask

Organizations should come to expect that one way a good Data Scientist will often demonstrate his or her ability is by reframing or redefining the problem put before them by the company. The first few times this may seem off-putting, but organizations who learn to embrace this sort of transformation of the business problem will be able to compete for the future. Practically speaking this may look like shifting to "medical device retention" rather than "patient retention" when targeting patient retention delivers results too late to affect the outcome. As a business concerned with the ROI from your Data Science investment, you will undoubtedly want to see activities of the Data Scientist which specify criteria for model assessment.



The Future Of Driving With V2V And V2I Technology

V2I technology also has security at its core (traffic lights, pollution levels, hazards, emergency services). But, on the top of that, V2I is more aimed at traffic flow, re-routing, fuel consumption, parking, WIFI, charging spots for electric cars on the move, conform to Dr. Joachim Taiber, research professor at Clemson University. Starting 2020, V2X (Vehicle to Everything) and its constituents, V2P (vehicle to pedestrians), V2V and V2I technology, will take an active role in semi-autonomous cars. The system at the moment is configured to avoid collision impacts by literally taking over the steering wheel and the accelerator, pushing against the driver’s foot and slowing the vehicle if needed.


Intel IoT Unlocks True Value in Connected Supply Chains

An exciting technology in this space is the 3D box bounding capabilities of Intel RealSense technology. For those who need a little brushing up on their geometry, box bounding defines the outer limits of the physical space utilized by an object. This is helpful information to have at your fingertips for packing efficiency and it’s something you can now map out in real-time with Intel RealSense. Companies across the supply chain are also beginning to see first-hand how they can use Intel RealSense technology to quickly calculate dimensional weight for shipping and to improve load planning.


Machine Age - The Next Revolution

It was long believed that while computers and robots are capable of peak technical performance, they are often unable to perform simple motor tasks. Austrian Hans Moravec already described this paradox of robotics in the 1980s. But the two authors visited a number of new companies that are working on overcoming the “Moravec paradox.” It would be a breakthrough for industrial automation if they succeeded. Recently, entrepreneurs achieved a breakthrough in combating the Moravec paradox. The revolutionary advances in robotics are the one, fascinating side of the digital revolution in industry. But as Austrian national economist Joseph Schumpeter said, innovation is usually a process of creative destruction. The destructive nature of the digital revolution is reflected in other industrial sectors, such as the photo and music industry.



Why You Should Plan Now for SDN Enabled Network Security

An SDN architecture provides an intelligent central console that decouples the network control plane from the forwarding plane. This enables carriers to meet two critical business objectives: to create more valuable services by leveraging network-wide intelligence and to automate manually intensive tasks like provisioning, operating and troubleshooting hardware-intensive networks.  An SDN network can also automatically respond to changes in network behavior. This enables a learning network where carriers can now better harness the plethora of data they have to improve performance and customize service offerings in ways that would have been impossible to do manually. This is how network security can become an automated process based on best-fit policies for a carrier’s network.


Cloud computing - The sky’s limit

Being locked in to a provider is risky. Firms can start to tighten the screws by increasing prices. If a cloud provider goes bust, its customers may have trouble retrieving their data. These risks have already triggered a debate about whether the cloud needs stricter regulation. Some European politicians want to force cloud providers to ensure that data can be moved between them. That is too heavy-handed, not least because rigid rules will inhibit innovation in what is still a young industry. The history of computing suggests that common standards may well emerge naturally in response to customers’ demands—just as in personal computers, where it is now much easier to use the same files on different systems.


Edge network key to IoT data collection and transmission

With IoT data, the transmission problem is inverted, Alexander said. He described IoT data as small, frequent and plentiful (Gartner predicts there will be 25 billion connected devices by 2020). Rather than amplify out large content files, such as software upgrades, CIOs will need to funnel the bits and bytes of IoT data in. But transmitting data in a one-to-one ratio from the device to a data center can be inefficient and create chokepoints in the network. IoT data, in other words, needs to be processed en route. "A lot of architectures and networks haven't been built to do that," Alexander said during a panel discussion. That's where the edge network comes in handy. Akamai is now using its edge as an intermediary location to collect, thin and even normalize IoT data before moving it on to a centralized data center.


Sporting goods CIO hopes to hook customers with IoT, mobile apps

The walkthroughs made it clear that transactions could use a boost. The company’s Aptos POS system, in place for several years, didn’t support mobile and Web transactions. For example, if a customer couldn’t find a product in-store, a sales associate would call it in to Orvis via phone to make a sale. But Aptos’ new POS software, which Orvis began piloting at select stores in August, corrects that service hitch. If a customer comes in and finds two items in a store, but requests a third item that store does not have in stock, an associate can order the out-of-stock product online, and process payment for all three items via an iPad Mini, which is equipped with a credit card reader. The associate can also show the customer similar products they might be interested in from the iPad.



Quote for the day:

"Perseverance is the hard work you do after you get tired of doing the hard work you already did." -- Newt Gingrich

October 15, 2015

CIOs eye Dell-EMC merger with cautious optimism

CIOs have watched Dell and EMC’s changes from afar, conducting business with the companies while increasing their consumption of cloud services. But the massive merger portends change, even if its nature can't yet be quantified. Finnegan says he's optimistic about the merger means for Orvis, which he says is increasingly adopting a hybrid cloud computing model. Its point-of-sale system remains on premises, but it is in the process of moving its ERP and marketing systems to cloud services. He says he’s looking forward to what Dell and EMC build for a "guy like me that manages on-premises and cloud ... what are the tools and technology that they bring to the table that allows us to manage both really seamlessly?"


Cloud inventory management for CIOs: Build guardrails, not roadblocks

Data flowing through rogue cloud apps -- or actually any unsanctioned app, cloud or on premises -- increases risks around security and regulatory requirements, Nelson and others said. In fact, a 2014 study from cloud security company Netskope estimated that the use of cloud services by the business increases the likelihood of a data breach threefold. Additionally, with data flowing through rogue cloud apps, experts said a company could lose the so-called single version of truth for its data, a key component of corporate analytics programs and decision making. Then there are cost factors. An organization with multiple independent accounts for the same cloud service or cloud app is hardly going to get the best rate. It may also be paying for duplicate and redundant services.


Training Series for Development on Intel-based Android* Devices

This series of videos presents an overview of Intel tools available for Android* developers through Intel® Software. You´ll discover the benefits of these tools in your everyday life as a programmer whether or not you´re targeting Intel devices. These tools will improve your life as a developer by saving you time, allowing you to create better experiences, and helping you target your app to multiple platforms and architectures. Take a look at the five training videos and follow the links to learn more about each tool. Android developers can benefit from one or more of the tools that Intel offers. Xavier gives a quick description of some of the tools available, what they can do for you, and the benefits you can gain in terms of productivity and results.


The Innovative Organisation: Learning From Design Firms

In order to create value in novel ways (the goal of innovating), you must first locate opportunities to do so. Where to start looking is easy to see—with the end-user—but it’s far more difficult to detect and synthesise actionable information within the complexity of the user experience. Customer surveys and focus groups simplify the process, but are often removed from how people authentically respond in the marketplace. Designers, by contrast, prefer observation to interrogation, developing empathy to discern unarticulated, even unconscious, user needs. As Tim Kobe, CEO of design firm Eight, Inc. put it, “We represent the end-user in all the design decisions that take place in these innovation projects.” And that’s why building empathy with the target user is crucial, as Continuum did when working with Procter & Gamble to reinvigorate the Pampers brand.


A World of Awesome Mind-Controlled Prostheses Is Closer Than You Think

For now, it's up to sophisticated machine learning algorithms. Working with humans test subjects putting in hours of practice, the algorithms learn to correctly interpret a user's intentions for basic tasks like picking up an object based on the limited information picked up by a few electrodes. More complicated tasks require better systems. Froemke gives the example of drinking coffee. When you do this with your natural limbs, you don't think about how complex the motion is. But a brain-controlled arm must correctly understand the intention and execute a series of moves: pick up the cup, bring it to a user's lips, tilt it toward the mouth without spilling it. To make it happen, you need higher-bandwidth communications between brain and interface.


Developing a Sound Risk and Compliance Culture

While conceptually not difficult to understand, risk culture is not easily observable or measurable, particularly in large organizations where subcultures often exist. Knowing whether an effective risk culture exists within an organization, what steps to take to improve it, and when to do so can be somewhat baffling. The issue becomes less daunting if one looks at culture as a prerequisite for effective risk management. Behaviors, attitudes, and incentives that are aligned with a financial company’s risk policies are just as important to effective risk outcomes as are, for example, comprehensive, well-governed risk data, or robust internal controls. Focusing on risk culture may become more tractable — and its value better appreciated — if it is viewed as an essential element of an effective and sustainable independent risk management program.


Capacity planning - aiming for the sky, but hitting the cloud ceiling?

For cloud to fulfil on its promise, it will have to be dealing with multiple workloads on one flexible and elastic virtualised platform that mixes compute, storage and network capabilities. Each aspect of this mix will be dependent on the others - for example, a storage issue may be 'cured' by throwing more storage capacity at it, but this can then cause a network issue that does not fully solve the actual problem of the performance of the end-to-end system. Tools will be needed that can rapidly learn how business workloads operate; create patterns of usage; predict future usage and advise accordingly - or can take immediate action to prevent problems from occurring in the first place.


Consumer Demands Outracing Connected Cars Regulation

“The connection between the policy people and the technology developers is going to have to grow stronger, and the conversation back and forth is going to have to be more robust,” Hause said. “I think we're starting to see that.” Companies like Google Inc. and Facebook Inc., he said, are becoming involved in policy discussions as technology evolves along with regulation. The State Department is aiming for multi-stakeholder involvement on cybersecurity, Hause said. “We want to keep the Internet developed and innovative in the way it was originally deployed and developed,” he said. “It's not going to be just a government-level discussion.” Consumers will shape much of the conversation, Hause said. Brand image is “going to be a huge driver on this discussion for standards,” Hause said.


UL creating standard for wearable privacy and security

"Fraud could result if data is not properly maintained and authenticated with a proper level of assurance," Fernando added. UL wants to "begin to raise the bar for how security should be addressed...and establish a minimal baseline for what should be addressed much like we did with electricity 120 years ago," he said. "We want to reach the point [of certifying IoT data security] without having to second-guess it." Without offering many details, Fernando said that "the jury is still out" on how data privacy and security with wearables will be ultimately protected, or even how strictly it will be regulated by the government. Given the U.S. government's recent apparent willingness to let industry regulate itself in such matters, UL's role becomes more important.


Why blockchain heralds a rethink of the entire banking industry

Banks are starting to understand the potential of blockchain and to invest in learning more. RBS is one of nine founders of the R3 consortium, set up in September 2015 for members to work together on a framework and architecture for using blockchain in financial markets. ... “A year ago people were scared,” said UBS CIO Oliver Bussman. “Everybody agreed that the one topic we wanted to work together on is blockchain. The banks are getting ready to understand the impact and the use cases, and also to understand that collaboration and open standards, like the R3 consortium, is necessary. Regulators are actively involved in the discussion too. It’s only possible if we have critical mass in the industry and agree upon standards.”



Quote for the day:

"If you look at what you have in life, you'll always have more. If you look at what you don't have in life, you'll never have enough." -- Oprah Winfrey

October 14, 2015

Data & Analytics is Transforming the Audit

Leveraging the investments your organization has made in technology, we can drill down and explore your data in interactive ways, enabling us to enhance the focus of our efforts and deliver richer, more meaningful insights on the areas we audit. D&A also allows us to capture information that encompasses environmental factors such as unstructured economic and benchmarking data to paint a more complete and timely picture of an organization’s financial condition. D&A provides a more detailed view of historical performance, the causality of events and supports the ability of auditors to concentrate their time and judgment in areas with the greatest audit risk and complexity.


Google's Alphabet Move Was Brilliant

Some pundits claim that greater visibility will stifle Google's innovations, which they term "unprofitable experiments." In reality, all research projects are "losers" until they succeed in the marketplace. These critics don't seem to understand the determination of Larry Page and his cohort of brilliant leaders to transform the world through innovation. Nevertheless, I won't be surprised to see an activist investor like Dan Loeb or Nelson Peltz call for breaking up Alphabet in a few years into cash-generating Google and growth-generating Alphabet. Their inability to understand the integration of these two differentiated strategies for long-term shareholder value creation — the strategy we followed at Medtronic — never ceases to amaze me.


Cooling ICT environments: where to next?

‘Free air’ cooling technologies such as Indirect Evaporative Cooling are achieving PUE values of between 1.15 and 1.28 and the incentive to develop alternatives is inhibited by the reality of diminishing returns. Current good practice is considered to be a PUE of 1.2 using ‘free air cooling’ in temperate climates. Cooling technology is not of course only concerned with controlling temperature: it is also important to control humidity to prevent condensation in the case of high humidity, and electrostatic charge problems in the case of low humidity. An extremely important development that has not been fully appreciated by many ICT practitioners was the outcome of the extensive research by the Technical Committee 9.9 of the American Society of Heating, Refrigeration and Air-Conditioning Engineers (ASHRE).


Cloud-Based Analytics Requires Hybrid Data Access and Integration

Given the distributed nature of data sources as well as the diversity of data types, information platforms and integration approaches are changing. While more than three in five companies (61%) still do integration primarily between on-premises systems, significant percentages are now doing integration from the cloud to on-premises (47%) and from on-premises to the cloud (39%). In the future, this trend will become more pronounced. According to our research, 85 percent of companies eventually will integrate cloud data with on-premises sources, and 84 percent will do the reverse. We expect that hybrid architectures, a mix of on-premises and cloud data infrastructures, will prevail in enterprise information architectures for years to come while slowly evolving to equality of bidirectional data transfer between the two types.


Google takes on Apple News, Facebook Instant Articles with AMP

AMP, Apple News and Facebook Instant Articles all deliver vastly improved experiences for users compared to traditional mobile sites, but AMP is unique because it claims to be an open-source initiative meant to benefit publishers, advertisers and users. Meanwhile, an underlying perception exists that Apple and Facebook's partner-centric approaches will result in the formation of winners and losers based on those platforms' business interests.  "If we have a standardized way about doing this, then all of a sudden all of these folks benefit. Twitter can win with Moments, while Google wins with AMP," says Facemire. "It's not mutually exclusive." AMP aims to improve content delivery across all mobile browsers and apps; the goal is not to serve as a defined container for articles within a specific ecosystem.


Does Cisco have to respond to Dell/EMC?

“Dell's control of VMware will have significant repercussions for other networking vendors,” says IDC analyst Brad Casemore. “Dell switches will become the preferred underlay for VMware's NSX network-virtualization overlay. Many vendors were counting on getting shares of that underlay business, and now those gains are in serious doubt.” ... Cisco also has its sights set on becoming the No. 1 IT vendor in the industry. Cisco could respond to this deal by acquiring a major storage player of its own, like partner NetApp; or one or more smaller start-ups addressing the hyperconvergence trend in IT. “As Cisco continues down their publically stated path to be the #1 IT company, we anticipate storage becoming a bigger piece of their strategy,” says Gartner analyst Andrew Lerner.


The Perch App Transforms old Gadgets into a Home-Security System

"As the years go on and hardware capabilities become similar, software is going to be the key differentiator," says Cohen. Recruiting people’s current gadgets isn’t so much to promote a homebrew spirit as to free Perch to focus on its software, which promises lag-free video feeds, realtime video chat, and image analysis that can tell what is happening in the home beyond simple motion detection. ... Perch is promising near-instantaneous video by incorporating a technology called Web Real-Time Communications, or WebRTC, an open standard for fast, peer-to-peer audio and video streams directly between clients, be they web browsers (without the need for plugins) or mobile apps. Encryption is also built into WebRTC.


The next steps for digital government - a question of accountability

“The whole culture and structure and governance of the civil service is not conducive to [working together]. All vertical organisations have that endemic problem - they’re not set up to do that. "I had a long career in Lloyds Bank, and the credit card division would never say: ‘We'll build that for personal lending as well.’ You’ve got to get those departments to collaborate, and that isn't an easy job. That's why you do need something in the centre. The answer is not technology, it's around getting people to collaborate and work together.” Beaven believes his work with departments on digital transactions shows how it can be done.


Veteran CIO values personal connections

We all have a ton of things going on, and this notion of spending time to connect with others seems to fall to the bottom of the list. But there's no substitution for spending time on this. [In the past] I blocked out time on my calendar called catch-up time, meaning catch up with others. I'd walk around or dial up people. Now I do less calendaring, because social networking allows us to have more frequent reminders to pick up that phone or drop them a line. And being in the top position makes me think about how I can facilitate others wanting to do the same thing. But in professional settings, relationships that matter are built on a foundation of trust, and trust is built on seeing each other in action. So finding ways to work together and finding ways to come together for problem-solving I have found are very effective ways to develop those bonds of trust.


Cloud vs Legacy IT. Solutions to Common Integration Challenges

The ODCA believes that integration of cloud deployments with enterprise landscapes should consider people, process, technology, and operating models. Doing so encourages faster cloud adoption, leverages existing enterprise investments in IT landscape and helps govern safe cloud adoption through effective risk and compliance management. Cloud integration must start with governance and control and then consider business process, applications, data, infrastructure, and organizational management controls. Integration should be addressed through the perspective of organizational roles involved in planning, delivering, and supporting IT services.



Quote for the day:

"Strength comes from overcoming adversity, not avoiding it." -- Gordon Tredgold