March 08, 2016

Use a BPM strategy to modernize legacy applications

As is nearly always the case, enterprise architecture may provide an easy path if an "EA model" is available. It would be fair to say that for a major enterprise to modernize legacy applications on a large scale, it should never proceed without first developing an EA model according to one of the established standards such as TOGAF. Where the scope of application modernization projects is more limited, it's possible to recover business process definitions from current applications. Where you have no EA framework for direct BPM mapping, take application workflows and "abstract" them by grouping application features into the business processes they support.


The Other Side of Agile: Ceremonial Development

As you can see, ironically, the Agile Manifesto is very simple. Good Agile practices are much more in the spirit of Kaizen and continuous improvement, as opposed to the sterile doctor prescription of do’s and don’ts that most people associate with Agile. And when I come to realize it, the most successful teams that I’ve worked with have excelled exactly at this — responding and adapting to change. These teams were great at what they did because they had mechanisms in place for the team to continuously improve its own delivery. Truth be told, they weren’talways great because of their code reviews. Or pair-programming. Or Stand-up meetings. Or user stories. These things were sometimes very important in the delivery, but once something becomes routine, it can be hard to take a step back and evaluate if it is still delivering on its value proposition.


Seagate Reveals World's Fastest SSD

Seagate's new SSD is based on the non-volatile memory express (NVMe) interface, which was developed by a cooperative of more than 80 companies and released in March 2011. The NVMe specification defined an optimized register interface, command set and feature set for SSDs using the PCIe interface -- a high-speed serial computer expansion bus standard used in both enterprise and client systems. Intel's SSD 750 series drive, which also uses the NVMe/PCIe interface. The SSD sports read speeds of up to 2,500MB per second or 2.5GB per second. "The unit could be used in an all-flash array or as an accelerated flash tier with hard-disk drives (HDDs) for a more cost-effective hybrid storage alternative," Seagate stated in a news release about the new SSD.


Interview: Laura Galante, FireEye

“How are we not able to solve this problem? Because we don’t have visibility into it? The suspicion is the data is probably sitting there in the private sector because everyone is feeling this too. The perfect marriage was Mandiant sitting there with all of this investigation data and thinking, what if there is something huge here and IP is going out the door? We didn’t know how to think about it, and Mandiant needed intelligence so they hired a few of us out of government to figure out what the data was, how to model and analyse it and that is just what we did.” Galante worked on the APT1 report that was released in February 2013, and this allowed her to see network data on the host side and not just on the network, and understand what malware is sitting there that sends out these alerts.


Breaking the Glass Ceiling in Indian IT Firms

It is not uncommon for women to face unconscious biasness at work, which may impact them negatively and make them feel out of place in a male largely male dominated industry like technology. For instance, unconscious bias can happen when male team members put in long working hours for a project while the female workers may leave the office at fixed times. This can be misconstrued as the male workers contributing more to the project, whereas in reality, both male and female employees could be contributing the same, or the latter even more for that matter. Organizations are now actively working towards mitigating gender bias and bring in more transparency that would make women feel more inclusive. 


Bimodal IT strategy opens up opportunities for innovation

Today's application lifecycle is measured in weeks, not years, meaning neither customers nor employees have the patience for a lengthy software development process. Organizations that are too slow to capitalize on an emerging digital business opportunity lose out to competitors that move quickly. But such a quick process requires using Agile development practices, fostering close cooperation between developers and IT operations, heavily instrumenting applications to measure performance, feature usage and errors, and employing continuous delivery processes that facilitate a steady stream of bug fixes and feature enhancements.


Scrum is Just a Starting Point | The Clever PM

There is certainly value to be had in looking to prescriptive definitions like those found in the Scrum Guide — they provide us all with a common understanding of the component parts of what that particular publisher or consultancy has defined as “Scrum”. It enables us to have intelligent conversations using such jargon words as Product Manager, Scrum Master, Stand Up, Retrospective, and other terms that have only contextual meaning within the world of Scrum. It also provides those who need guidance and assistance in establishing the foundation for Agile practices with some clearly-defined, specifically-actionable, and proven steps to take and ceremonies to implement to achieve their goals.


DHL Asia-Pacific Innovation Centre incubates future logistics technology

“The innovation agenda is not a new one for DHL,” said Mei Pang, vice-president, innovation, solution delivery and service management at DHL customer solutions and innovation in Asia-Pacific. “From an operational point of view, DHL has always known to come out with new things. In 2007, our corporate office in Germany made a decision to invest in a central team to focus on innovation to look at the future of logistics and identify major trends,” Pang told Computer Weekly. “Part of the initiative was to open a conversation with partners, and the approach we take is a very collaborative one where we work with suppliers, customers and academics to focus on the use cases and try to make them practically applicable in our business,” she added. “That concept worked very well in Germany.”


Intel's Pentium Bug Fix Is Proposed as Solution for Dark Pools

The pitch comes as banks have been beset by fines. UBS was fined $14.4 million by the SEC for problems at its private stock-trading platform. Barclays Plc and Credit Suisse Group AG racked up more than $154 million to settle allegations that they misled investors about how their dark pools were managed. Investment Technology Group Inc. agreed to pay $20.3 million for its infractions. Aesthetic Integration was founded by Denis Ignatovich, formerly head of the central risk trading desk at Deutsche Bank AG in London, and Grant Passmore, a mathematician and expert on formal verification.  Passmore said formal verification uses algorithms to analyze other algorithms. Rather than endlessly trying to test possible outcomes, machine reasoning acts like an automated mathematician, creating proofs and theorems to speed up the work.


Testers in TDD teams

The big QA of the Nineties seems history. Many IT organizations have dissolved their QA departments and have spread their testers over Agile teams. However, in many of those teams, the testers are still doing the same manual testing they did in the nineties. Many organizations are therefore still stuck with the same dysfunctional testing they had twenty years ago. The dysfunctionality of Old school QA lies in its excessive use of functional testers. These are professionals specialized in manual testing, but having few technical skills. Their specialization makes functional testers good in 'testing' functionality. However, old school QA has a tendency (and often a commercial interest) to also use these testers to 'check' functionality.



Quote for the day:


"Goals allow you to control the direction of change in your favor." -- Brian Tracy


March 07, 2016

Making Data Easy for Businesses with Cloud Data Services

By taping into these new cloud data services, they can explore data sources, meld data of different types, select the most appropriate analytics tools, and produce actionable insights. And they can do it without necessarily having to engage the IT department and, in some cases, waiting weeks for answers. It’s a drag-and-drop experience. Or, if they choose, they can enlist the IT department to design more sophisticated analyses. At the same time, these new services offer a host of more sophisticated capabilities designed for data scientists and developers—enabling data scientists to analyze complex situations using the most capable analytics tools and providing software programmers and product teams with a dynamic development platform.


Tech Giants Agree: The FBI’s Case Against Apple Is a Joke

While this seems like a natural cause for the technology industry to rally behind, many tech leaders were initially slow to express support for Apple in the matter. As the New York Times reports, several companies also hesitated to support Apple publicly. Some expressed concern over whether this was the right fight to pick, while others worried about public perception. Those concerns appear to have been allayed, at least on the part of the companies who filed Thursday. Their briefs in support of Apple are unequivocal, and use language as forceful as the company’s own.


The Internet of Things Will Make Big Data Look Small

This looming problem is something we’re sure to discuss at Structure Data, scheduled for March 9th and 10th in San Francisco. We’re featuring speakers such as William Ruh of GE, who will talk about the impact the industrial Internet will have on the manufacturing sector; Jerome Dubreuil of Samsung, who will illustrate just how much data connected home devices generate; and a panel of healthcare experts will sort through the dual challenges of the retiring baby boom generation and an explosion in quantified-self health apps. This may sound like a buzzword salad to many of you. But those in charge of the massive players in this market are making moves to get themselves ready for the data deluge from a realized Internet of things.


Government consults on data sharing

“There is huge potential for improving citizens’ lives through data sharing in the UK,” he said. “This consultation will help make sure we get data right and bolster security while making people’s lives better.” The proposals focus on three aims: improving public services, tackling fraud and debt, and allowing the use of data for research purposes. The consultation also looks at access to identified data that is linked and de-identified using defined processes. It said linked datasets can help “gain new insights into the social and economic challenges that citizens and businesses face”.


Can Trust-Based Private Blockchains Be Trusted?

When collusion occurs amongst blockchain parties, they can rewrite their local records regardless of other parties' interests and protestations. Other parties may not even detect that colluders altered the historical record. Even worse, since there is no way to prove which party has the correct record (ie: the objective state of the ledger), the system breaks with multiple objective states and multiple attendant claims to historical record authenticity, none of which are provable. Using dates to prove the correct objective state of the distributed ledger is both useless and immaterial – data can be backdated, after all, it's just ones and zeros that can be rewritten. So, what happens if the parties choose not to follow the rules and fork the historical record of the blockchain? What mechanisms exist for aggrieved parties to respond to collusion, if detected?


Security ops orchestration for a brave new world

There is a massive shortfall in the number of trained security experts to man a typical Security Operations Center (SOC) monitoring the health and safety of a corporation’s digital footprint. It takes almost a decade for security researchers to acquire the skills to defend against modern-day attacks. Frost and Sullivan has forecast a shortfall of 1.5 million trained security experts by 2020. SOC teams, overwhelmed in handling the deluge of low-impact incidents, fail to respond in time or miss altogether early incident alerts flagging serious attacks. There appears to be a solution to deal with this massive human shortfall and empower SOC teams. Serious efforts are afoot to record process as code — or simply put, to use software to automate repetitive but time-consuming tasks while increasing the productivity of individual security experts.


Decentralized Apps: Key Questions from a Bank Innovation Director

Once you start charging fees for use of your dapps, you have to be clear what you are charging for. Are you charging for the license to deploy an own instance of a smart contract and use of the dapp wallet – a bit like buying an app from an App Store? Or for a service provided by an already deployed smart contract? Arguably, since it is really the miners that provide the service of actually executing and validating the transactions, it’s hard to justify charging a service fee for smart contracts, unless there are many value-add off-chain services bundled together with the dapp. Based on that assessment, we may end up with a 'Dapp Store' model, where folks purchase a license to deploy an instance of a well-written, standards-compliant, tested and proven dapp onto a blockchain.


Regulation holds up P2P lenders - British online banking security

Journalists from the BBC have successfully broken into a team member's bank account using what is known as "SIM swap fraud". The scam works by fraudsters informing the victim's mobile network provider that they would like to swap SIM cards — this means the victim's number is transferred to another SIM. The fraudster with the new SIM now has the number registered to the victim's bank accounts, and can therefore receive any activation code sent by the bank via SMS. The genuine phone is blocked, and the criminal uses the codes to get into the customer's account without needing to know their PIN, passwords or banking customer number.


Mine that data to keep that customer

The ability for financial organisations to make the most of data, monitoring and tweaking performance as they go will have a major impact on all areas of business, from the supply chain to marketing. However, the big retail banking institutions sit comfortably behind the fintech start-up challengers whose business models are founded in the cloud, and whose customers are willing to place their trust in this new approach. Real-time data has a big role to play in engaging with consumers, as it enables organisations to understand their customers’ behaviours and attitudes towards their services, and by extension positively influence customer loyalty. High street banks are starting to recognise the need to get better at segmenting consumers into more narrowly-defined groups, and real-time data and the contextual relevance of engagement have vital roles to play here.


BYOD continues to add challenges for IT leaders

Karsten Scherer, global analyst at TEKsystems has seen a trend in recent data surrounding BYOD, but notes that allowing employees to use personal devices presents unique risks to the enterprise. She suggests that businesses have a strong BYOD plan in place, encourage company-wide security awareness, and acknowledge that a significant portion of breaches are often inadvertently caused by employee negligence, rather than criminal hackers. "Every company has a complex ecosystem of systems creating, storing, accessing and analyzing data," she says. "When you extend that ecosystem to include devices outside of your immediate control, that level of complexity increases. You've effectively increased the size of your security perimeter."



Quote for the day:


"Leadership is unlocking people's potential to become better." -- Bill Bradley


March 06, 2016

Why President Obama’s cyber security plan is one (big) piece of the puzzle

Cyber security is a complicated latticework of disparate yet interconnected elements: public and private entities, domestic and foreign agencies and overlapping legal frameworks. Take the Judicial Redress Act, which President Obama signed into law on February 24. In addition to providing limited access to US courts for citizens of certain countries – court access would be conditioned on covered countries permitting the transfer of personal data – the Judicial Redress Act has other international implications, specifically in the context of US-EU negotiations. The finalisation of the Judicial Redress Act was considered by the European Union as a prerequisite to an umbrella agreement, initialed by US and EU officials last September


Can you take the Internet out of the Internet of Things?

Does it really make sense for every device to have a Wi-Fi chip in either itself or in a gateway, or should all devices route through some always-connected gateway? Based on the growing number of “standards,” varying power, range and data rate requirements, it’s evident there is likely not going to be any sort of IoT topological convergence. This is because, in some cases, a device simply needs to report its proximity to a phone (think beacons), or because a device operating in a challenging RF environment struggles with higher frequency radios used by Thread or Zigbee and are not the ideal technical selection. In many cases, a gateway and a variety of sensors makes total sense.


Exploring Banking as a Platform (BaaP) Model

Network effects impact us all on a daily basis, via social networks and other marketplaces. These same social networks and marketplaces, after having gotten us used to interacting with one another in a different way, are now encroaching on financial services, with payments and lending initially being their target. Smartphones, broadband internet, the 24/7 availability of commerce and data, and social networks have made us organize ourselves very differently than in the past. The Millennial generation, weaned on this new paradigm, now have completely different expectations than their parents or grand parents of communication and commerce. There are other reasons why financial services industry incumbents need to shift to a platform strategy.


Meet tech's new odd couple: the CIO and CMO

While both sides recognize the need for alignment and a joint strategic plan, there remains a disconnect in how each party views its contribution, according to a November 2014 Forrester report on CMO-CIO collaboration. For example, the research, spearheaded by Pattek, found that while about 70 percent of the executives in both groups believe their strategic planning process emphasizes enhancing customer acquisition, retention and loyalty, only 61 percent of marketers think the CIO is actively engaged in that process. In contrast, 76 percent of the IT leaders said the CIO plays an active role. In addition, 70 percent of marketers and 66 percent of tech management executives said they agree that marketing technology plans will gain more support and funding if they're developed jointly by the CMO and CIO.


No, your Raspberry Pi 3 won't overheat in everyday use, says its creator

While a typical workload for the Pi might see the demand on the CPU spike momentarily, in the vast majority of use cases these periods of high CPU utilisation will not be sustained for long periods, he said. "In most use cases you see a very spiky performance profile. So what you're looking at is 'Can I run very fast for a second?' or 'Can I run very fast in bunches of 50ms?'." And while putting a case on the board will increase the temperature, again for the typical user it will not drive the board to become hot enough to throttle its speed - he said. Upton explains the throttling behavior as being a consequence of making the Pi's hardware more powerful.


The Amazing Ways Big Data Is Used In China

The Chinese financial industry is quickly adapting into a Big Data-driven model, too. In 2013 a number of legislation changes regarding use of customer data quickly led to an explosion in the use of Big Data analytics by banks, investment funds and insurance companies. In 2012 it was estimated that the entirety of the heavily regulated Chinese banking industry held around 100 terabytes (100,000 gigabytes) of customer data. By March 2014, just one of China’s “Big Four” banks, the state owned Industrial and Commercial Bank of China, was said to have amassed 4.9 petabytes (4,900 terabytes, or 4,900,000 gigabytes) of mostly unstructured data. Just as it is in the west, this data is mostly used for marketing of retail banking products.


Artificial intelligence brings its brains and money to London

Both DeepMind and its successors involve “deep reinforcement learning” – giving computers the tools to draw conclusions based on large amounts of data, in the way that humans make assumptions based on experience. The potential applications are vast, from helping doctors diagnose patients to spotting faults in infrastructure such as transport networks – and other uses that even its inventors are yet to conceive of. But measuring progress in AI is not easy. The layperson usually cites the Turing test, developed by Bletchley Park codebreaker Alan Turing in 1950. It focuses on whether a computer can convince a human in a blind test that they are talking to another human. But that test, says Shanahan, is more about “tricking” people through mimicry than developing AI genuinely capable of learning.


Getting the greatest value from your cyber security budget at the end of the financial year

As the financial year creeps inexorably towards its close, you’re probably thinking about the best way of wringing every last drop of value from your budget. If you’re concerned about information security and how it affects your business, why not make the most of your available resources by implementing a best-practice information security management system (ISMS), based on the international standard ISO 27001? ... The good news is that it’s very likely you already have many of ISO 27001’s controls in place, so bringing your current practices into line with the Standard could well be within your grasp. The best way to determine how much work you need to carry out is to conduct a gap analysis.


What Keyboards Do Programmers Prefer?

As developers, we all have preferences in the tools we use for work: a powerful machine, one (or two) large screens, having the freedom to choose our OS, our IDE, etc.... Yet in most companies, we rarely pay the the same level of attention to keyboards. The one that comes with your computer (PC or Mac, desktop or laptop) is often the default choice and we almost never challenge its quality and usability, even though a keyboard is one of the most basic tools of our job, allowing us to perform most of our everyday tasks. So why neglect the quality (and the look!) of a tool that we use eight hours a day? This article is an overview of all the different choices made by the developers team behind the insurance comparison site LesFurets.com. And you'll see how every one of them has an approach of its own.


Strategy, Not Technology Drives Digital Transformation

The ability to digitally reimagine the business is determined in large part by a clear digital strategy supported by leaders who foster a culture able to change and invent the new. While these insights are consistent with prior technology evolutions, what is unique to digital transformation is that risk taking is becoming a cultural norm as more digitally advanced companies seek new levels of competitive advantage. Equally important, employees across all age groups want to work for businesses that are deeply committed to digital progress. Company leaders need to bear this in mind in order to attract and retain the best talent.



Quote for the day:


"Every time you have to speak, you are auditioning for leadership." -- James Humes


March 05, 2016

IoT will crash and burn if security doesn't come first

It's important to understand the damage lax security can do -- to your company and the industry -- and address IoT security early. Hibbard said he has seen firsthand how a lot of players in the space do not consider security as a competitive advantage. "If you're thinking about buying or making IoT, offshoring it to an APAC region, make no assumptions that they're going to know anything about security. You won't be able to retrofit it, so if you want it, order upfront," he said. ... "Show your work," he added. "You need ... to make sure you're properly documenting processes that you went through; you want to make sure you get credit later. You don't want to say to the FTC that you don't have the records."


Global fintech survey results: 51 experts reveal 2016 trends

Payments tech continues to be top of mind for the influencers – followed by security and lending. In 2014, the respondents predicted security technology will be the hottest sector in fintech, however, the sector continues to have a large gap between what is available and what is needed in the market, with a huge interest predicted to continue into 2016. ... 43% of the respondents thought Blockchain adoption by banks will be the single largest trend of 2016. Larger deal sizes, an increased geographical spread and capturing the unbanked market followed with almost an equal amount of interest as the key highlight for the coming year.


Cashless societies: The pros and cons

Thanks to its aggressive adoption of IoT, Sweden is on its way to becoming the world’s first cashless society, according to a study from Stockholm's KTH Royal Institute of Technology. Currently, 80% of payments in the country are made by cards. By the end of 2014, four out of every five transactions in Sweden was cashless. Swedes mainly use debit cards (pin required) and the mobile payment app Swish, which is largely responsible for the nation’s decreasing circulation of cash. Eric B. Delisle, founder of the cyber security company ICLOAK, says the more citizens use cashless systems, which require a computer or device, the more people who have preferred living in an analog world will be pushed into the 21st century. This means new security measures will be needed.


Popular WordPress Plugin Comes with a Backdoor, Steals Site Admin Credentials

The hacker's alterations made sure that he was able to control user login, creation and edit commands, intercepting user data before being encrypted, and sending the user's cleartext passwords to wooranker's server. Furthermore, wp-options.php also created an admin account on the infected website, with the credentials support / support@wordpresscore.com, which he could use if anything else failed. All of this meant that wooranker would always have an admin account on all infected websites, and he would always be notified of what passwords users were using when accessing infected sites.


Bridging the operational technology and Internet of Things divide

By its very nature, a connected world has zero tolerance for downtime yet IoT does not only change the requirement for systems availability; it significantly increases the threat landscape, creating greater security risks and challenges. Indeed, while IT may be willing to accept the fact that a very high proportion of organisations (80%) have experienced outages over the last three years, this fact will not play well within OT, which has actively embraced predictive monitoring in order to achieve 100% uptime. Moreover, organisations are also missing out on essential business information. By failing to consolidate OT into the core network, organisations cannot enable CxOs to take advantage of a depth of real-time analytics that should be informing changes to every part of the building, estate and production systems.


The Trends Disrupting The World of Financial Technology

The battle already underway will create surprising winners and stunned losers among some of the most powerful names in the financial world: The most contentious conflicts (and partnerships) will be between startups that are completely reengineering decades-old practices, traditional power players who are furiously trying to adapt with their own innovations, and total disruption of established technology & processes ...  The blockchain is a wild card that could completely overhaul financial services. Both major banks and startups around the world are exploring the technology behind the blockchain, which stores and records Bitcoin transactions. This technology could lower the cost of many financial activities to near-zero and could wipe away many traditional banking activities completely.

How hackers attacked Ukraine's power grid: Implications for Industrial IoT security

Some aspects of the Ukraine cyber-attack remain opaque -- specifically, whether a modular component called KillDisk (a hard disk wiper) actually caused the power outage, or whether it simply made it impossible to restore the compromised systems using SCADA protocols. As if further evidence of a political motive was required, researchers at security companyTrend Micro recently reported that the same combination of BlackEnergy and KillDisk "may have been used against a large Ukrainian mining company and a large Ukrainian rail company" around the same time as the attacks on the power utilities. Whether the perpetrators' ultimate goal was to destabilise Ukraine via coordinated cyberattacks on its critical infrastructure...


Software - Looking into the Future

dominates. Software is changing practically all industries and is the major driver of innovation across all industries. While we used to distinguish components, systems, and services, we today see flexible boundaries driven entirely by business cases to determine what we should package, at which level, and in which component, whether it’s software or silicon. ... Software is getting more complex, more connected, and more life-critical. This complexity’s sources are hidden in the nature of software, which often consists of many components from different vendors and runs on hardware manufactured by different vendors. Also, software teams frequently are multifunctional, and team members are responsible for many activities such as planning, developing, and executing plans, roadmaps, and strategies—without adequate training.


Scrum with Trello

Trello recently passed the 10M user mark and is fast becoming a popular tool for Agile teams of all flavours. Its simplicity and the great web and mobile experience seem to win some teams over versus other more complex solutions out there. It is also pretty un-opinionated on how you use it, which can lead to some confusion as to how best to implement a Scrum process in Trello. I've been talking to a lot of people over the last year about how they're using Trello for their Scrum and Kanban processes, as well as reading everything I could on the internet relating to running Agile processes in Trello. So, today I present to you with the fruits of that labour:


An AI way to make call centre interaction less hideous?

What makes this interesting though, is that it is very different to the usual visions of AI in customer service. These tend to focus on Virtual Assistants – by the likes of Nuance and IPSoft – which want to replace real agents with digital ones wherever possible.In this scenario AI is used to help machines learn from human interactions and these solutions have become part of the “robots stealing our jobs” debate. It is not as cut and dried as many make out, of course. And individuals involved in this type of tech argue that employing Virtual Assistants simply frees up human employees for more sophisticated forms of customer interaction. Yet Farmer is adamant: “We’re the first people to use AI to improve quality [in customer service].”



Quote for the day:


"Authentic leaders will sometimes push and sometimes pull but either way, they will always keep things moving." -- @LeadToday


March 04, 2016

SSD Prices Plummet Again Close in on HDDs

the market for SSDs with PCIe interfaces, which are used by laptop makers such as Apple to attach flash directly to a motherboard, is expected to grow at the highest annual growth rate ever over the next six years. "This growth can be attributed to the advantages of PCIe, which include high speed, enhanced performance scaling, and detailed error detection and reporting," the report said. "Thus, the demand for SSDs with PCIe interface is expected to increase from the client as well as enterprise end users." Samsung, according to TrendForce, will continue to dominate the SSD market this year because of a price advantage it has with TLC-based SSDs using 3D-NAND flash, which Samsung markets as V-NAND. V-NAND stacks silicon cells up to 48-layers high to increase density, thereby reducing cost.


What Happens to Stolen, Sensitive Data?

Bitglass, a data protection company, ran the experiment and released findings in its report "Where's Your Data?" Bitglass researchers created a digital identity for an employee of a fictitious retail bank, a Web portal for the fake bank and a Google Drive account complete with real credit card data. They pretended that the fake employee's Google Drive credentials were stolen via a larger phishing campaign. They leaked those "phished" Google Apps credentials to the Dark Web and tracked activity in the fake employee's online accounts. Hackers did not know that Google Drive activities were being monitored for a month and that files were embedded with Bitglass watermarks. Here's what happened next.


CEOs force CIOs, CMOs into digital transformation bunker

"CEOs are telling CIOs and CMOs to put in place a new foundation for digital business," Cochrane says. "The CEO tells the CMO I want a strategy for customer experience and he tells the CIO to make it happen." IT has to enable marketing with tools and extend those tools to every customer touch point. That requires CIOs to account for every customer interaction with the corporate brand across the call center, physical stores, online and mobile devices. ... Cochrane says that while the CMO has traditionally owned the customer experience with little influence from the CIOs, that needs to change because of the vast amount of information streaming into businesses from social media, as well as from various Internet-connected devices. With the data surface broadening so much, CMOs need help from the CIO.


Graphene sheets for capturing and storing energy

In terms of optics, the problem is when you think of a material, as it gets thinner, it absorbs less light. So, when you go below 50 nanometers, you have a transparent layer. You might have a layer that's 50 nanometers thin, but to the outside world, it looks transparent, because it's too thin to absorb light. But you're trying to marry light with electronic circuits. And as soon as your devices get smaller and smaller, it gets invisible. So now, you have to boost the thickness of the optical layer if you want to operate in the wavelength we're comfortable with. In this program, we're making this leap. We're creating surface structures that absorb light.


Redesigning Wi-Fi may let devices communicate more easily

Most conceptions of the internet of things assume the chips in sofas, wallets, fridges and so on will use technologies such as Wi-Fi and Bluetooth to communicate with each other—either directly, over short ranges, or via a base-station connected to the outside world, over longer ones. For a conventional chip to broadcast a Wi-Fi signal requires two things. First, it must generate a narrow-band carrier wave. Then, it must impress upon this wave a digital signal that a receiver can interpret. Following Moore’s law, the components responsible for doing the impressing have become ever more efficient over the past couple of decades. Those generating the carrier wave, however, have not.


Data Backup and Business Continuity

As information across all industries and businesses becomes increasingly digitized, the importance of ensuring that this information is continuously accessible has never been greater. And as storage technology has evolved from floppy disks to CD-ROMs, DVDs, portable hard drives and offsite cloud backup, the expectation of 24x7 uptime and constant availability certainly hasn't slowed down. Then there's the matter of compliance and regulatory restrictions, which have become increasingly strict as both IT and business best practices have progressed.HIPAA, HITECH, PCI compliance, and myriad related requirements around data capture, storage, transfer and processing have forced backup vendors and technologies to shapeshift both point solutions and integrated software and services.


Bimodal IT is only harmful when oversimplified

Although the bimodal concept can be polarizing, I believe much of the blowback originates from assumptions made due to an unfortunate choice of name, reflexive distaste for analyst buzzwords and particularly the term’s originator, the analyst firm so many love to hate. A common construction takes bimodal to mean bipolar, with IT segregated into two separate, but unequal entities: Mode 1 where all the stuffy IT old-timers live out their days caring for decaying databases and molding mainframes, versus Mode 2 where all the cool kids play with the latest toys and work unshackled from IT bureaucracy and processes. If that’s your view, bimodal is a recipe for disaster: a warring, dysfunctional IT organization.


Using Blockchain Technology in Crowdfunding

Blockchain technology isn’t perfect yet; some might say it’s not even ready for prime time. Today, the primary drawback is how long it takes to authenticate transactions. A transaction today in Bitcoin takes about 10 minutes to clear, and Bitcoin is a microscopic market compared to, say, credit card transactions. Indeed, the Bitcoin community is engaged in a civil war as to how, or even whether, to change the technology to speed up transactions. But you can understand why blockchain technology is attracting so much interest from government and private industry. For example, the music industry is plagued by uncertainty over ownership of rights. The title industry exists because of uncertainty as to the ownership of real estate. Credit card issuers spend tens (hundreds?) of millions of dollars processing and authenticating transactions.


How doctors are turning smartphones into surgeries with video appointments

“We have a good insight into patient needs and demands. We understand there are limits and you can’t treat everybody and that’s why we have a filter system.” But the healthcare technology sector is not just dealing with problems around primary care. The future of this sector could see technology that monitors how patients use medication — containers designed with a mechanism which sends a signal to both doctor and patient confirming that tablets have been taken. Remote sensoring devices, which a patient wears on a troublesome joint, could analyse the problem and lead to a quicker, more accurate diagnosis. And sensors that monitor blood sugar or chemical levels could automatically drive responses to balance those levels.


Are We Winning the Cyber War? A Look at the State of Cybersecurity

As you might expect, the experience of attacks on a daily, weekly or monthly basis were reported less frequently. An alarming trend is that 54 percent of study participants did not know how frequently they experience cyber-incidents. While 73 percent believed they were able to detect and to respond to incidents, 42 percent felt they could only do so for simple attacks. In an era of increasingly sophisticated and persistent attacks, being able to identify and respond to attacks is imperative. Board and executive concern and support for cyber activities are increasing. Eighty-two percent of security executives and practitioners participating reported that boards are concerned or very concerned about cybersecurity. This is not surprising given the higher level of awareness about cyber in general and the number of high profile attacks that we have recently seen.



Quote for the day:


“Adding manpower to a late software project, makes it later.” -- Frederick P. Brooks Jr.


March 02, 2016

Lifting of Iran sanctions brings hope to regional IT industry

“Once sanctions have been terminated, Iran can move forward in using ICT to transform industries across the country,” said Lalchandani. “The extent of these projects will depend largely on whether global oil prices rebound in the coming years. If they do, the increase in petrodollar revenues will help drive considerable transformation initiatives in the public sector, as well as significant modernisation efforts across the energy, manufacturing, telecommunications, finance, transportation and retail verticals.” Meera Kaul, CEO at regional value-added IT distributor Optimus Technologyand Telecoms, agreed, saying this is a big opportunity for the regional IT supply channel. With the sanctions lifted, the $420bn Iranian economy could open up for regional businesses, she said.


Internet of Things generates ROI for many, but roadblocks remain

Less than a quarter of respondents to the latest Tech Pro Research survey said their company is currently using IoT-connected devices to collect data, but more respondents said their business plans to get into the IoT game within the next year. Respondents in those two groups reported a wide variety of uses for data insights, including predicting trends, improving products, capacity planning, R&D and security. Among respondents whose companies who have implemented IoT data collection, 71% said that less than 20% of their IT budget goes towards those efforts, with the majority spending most of their IoT funds on software.


Firms expect greater government cybersecurity oversight

According to the SEC's Office of Compliance Inspections and Examinations, other areas of focus include governance and risk assessment, access controls, data loss prevention, training, and incident response. "We expect continued scrutiny of the areas covered in past years, with new emerging risk areas being evaluated," said Glenn Siriano, financial services leader for KPMG Cyber at KPMG. Those new areas include emerging technologies, new external threat vectors, deeper assessments of third-party vendors, usage of social media, and managing insider threats, he said. And the SEC has been moving beyond conducting inspections and issuing guidance, said Dave Mahon, CSO at CenturyLink.


Virtual insanity: Is 2016 the year users go big on VR?

“No doubt VR will help to create buzz among media, gamers and the niche audience demanding immersive experiences,” said Husson. “But will it offer consumer benefits for the masses? The short answer is: no. In 2016, reach for VR platforms will remain limited. “While the primary use cases will be for immersive gaming and entertainment environments, innovative marketers at retail, automotive, travel or hospitality companies will start piloting VR prototypes to connect in new ways with consumers in the discovery and explore phases of the consumer lifecycle. The vast majority of marketers should not even care about it and have many other things to fix.”


Are site reliability engineers the next data scientists?

It’s no secret that “data scientist” is one of the hottest job titles going. DJ Patil famously proclaimed data scientist “The Sexiest Job of the 21st Century” before moving on to join the White House as the first chief data scientist of the U.S. Once a rarefied in-house role at a few leading Internet companies such as LinkedIn and PayPal, data science has since grown into a global phenomenon, impacting organizations of all sizes across many industries. More recently, a buzzy new job title has emerged from the same group of companies: that of site reliability engineer, or SRE. Will SREs follow the same path of rapid growth that data scientists did before them? Before we dive into that question, let’s consider the context that has led to the creation of site reliability engineering.


How America's Biggest Cities Make Sense Of Their Data

"The question is, how do we use data to allow cities to tackle big and small problems?" says Saf Rabah, VP of product at Socrata. Untouched and unanalyzed government data—what Rabah calls "dark data"—usually sits on enterprise file systems and databases. The city of Seattle, for example, has 1,200 different enterprise systems, says Rabah. Socrata’s job is to make that data usable—but not just for the city. Aside from other government departments, there are three groups that could benefit from data made public: citizens, developers, and advocacy groups. "Citizens have information needs too, like, ‘I need to know how safe my neighborhood is,’ or ‘I’m about to move to a new city.’ Everyone has information needs that are very unique to them at that point in time," says Rabah.


Online Backup: Reliable and Affordable Solution for Data Protection

It keeps important data safe from disruptions and disasters, and provides a way to keep applications and data off-site in highly secured environment. There are great advantages to using backup technology, such as automation functionality and encrypted data. There are some business experts who state that the cloud is not a secure source for important data. However, online backups have encryption capacity to keep data safe. Conversely, hard drive (external) storage is not secure, and could be stolen or misplaced. Online backup is also reasonably priced. By using online backup, companies are given an opportunity to keep important files and documents safe from disarray and disaster at reasonable rate.


Agile Productivity: Willpower and the Neuroscience Approach

You have your impulse self (reptilian brain and limbic system) and a rational self that protects you from that impulse self (see “The Science of Willpower”). Your prefrontal cortex protects you from your impulsive animal mind. But because the deeper layers of brain are older, more energy efficient, and more powerful, the impulse self has more energy than the rational self. You cannot switch off your internal crocodile or monkey. You can only use the neocortex to override them and prioritize rational decisions. But if you are drunk, tired, sleep deprived or distracted, your prefrontal cortex does not work properly. You start making decisions based on immediate gratification (like drinking coffee with sugar to gain energy), not thinking about what will happen next.


How Much Security Can You Turn Over to AI?

Just detecting anomalies can still leave you with a lot of data to look at. A large organization could see thousands of anomalies a day, so Splunk uses further analysis to keep that manageable. Maier expects the tool to surface five or 10 threats a day, in enough detail to make it clear what’s happening (avoiding the problem where noisy or overly complex alerting systems are ignored when they find a real breach). “We have the full picture on the ‘kill chain’ [of the attack]. We provide a security organization with the information, from the compromise point – when did the attacker come in, what was the initial attack vector, when did they expand in this environment, what other files or servers or user accounts did they connect to?


Algorithm Design Techniques: The Assignment Problem

The assignment problem is designed for exactly this purpose. We start with m agents and n tasks. We make the rule that every agent has to be assigned to a task. For each agent-task pair, we figure out a cost associated to have that agent perform that task. We then figure out which assignment of agents to tasks minimizes the total cost. Of course, it may be true that m != n, but that's OK. If there are too many tasks, we can make up a "dummy" agent that is more expensive than any of the others. This will ensure that the least desirable task will be left to the dummy agent, and we can remove that from the solution. Or, if there are too many agents, we can make up a "dummy" task that is free for any agent. This will ensure that the agent with the highest true cost will get the dummy task, and will be idle.



Quote for the day:


"It's not always necessary to be strong, but to feel strong." -- Jon Krakauer,


March 01, 2016

Create maps in R in 10 (fairly) easy steps

There are many options for mapping. If you do this kind of thing often or want to create a map with lots of slick bells and whistles, it could make more sense to learn GIS software like Esri's ArcGIS or open-source QGIS. If you care only about well-used geographic areas such as cities, counties or zip codes, software like Tableau and Microsoft Power BI may have easier interfaces. ... But there are also advantages to using R -- a language designed for data analysis and visualization. It's open source, which means you don't have to worry about ever losing access to (or paying for) your tools. All your data stays local if you want it to. It's fully command-line scripted end-to-end, making an easily repeatable process in a single platform from data input and re-formatting through final visualization.


Infrastructure As Code

Using code to define the server configuration means that there is greater consistency between servers. With manual provisioning different interpretations of imprecise instructions (let alone errors) lead to snowflakes with subtly different configurations, which often leads to tricky faults that are hard to debug. Such difficulties are often made worse by inconsistent monitoring, and again using code ensures that monitoring is consistent too. Most importantly using configuration code makes changes safer, allowing upgrades of applications and system software with less risk. Faults can be found and fixed more quickly and at worst changes can be reverted to the last working configuration. Having your infrastructure defined as version-controlled code aids with compliance and audit. Every change to your configuration can be logged and isn't susceptible to faulty record keeping.


The Hybrid Cloud: Your Cloud, Your Way

No matter where the journey begins, one of the first realizations is that there is no one particular solution or one particular answer in how to best utilize cloud solutions. The journey typically evolves over time and requires multiple clouds with a combination of both public, private and possibly managed clouds- resulting in a hybrid cloud end state. Before deciding on a cloud approach, it is important to understand all of the possibilities that cloud technologies provide, and agree on business initiatives, priorities, and desired results required to support your business needs and intended outcomes. The decision should not focus entirely on which type of cloud to deploy – private, public, managed or hybrid – but rather focus on delivering the right cloud or clouds, at the right cost, with the right characteristics (i.e. agility, costs, compliance, security) to achieve your business objectives.


Skyhigh Networks Unveils Industry’s First Cloud Security Reference Architecture

The Skyhigh Cloud Security Reference Architecture recognizes the complexity of today’s modern enterprises, where users are mobile and work from a variety of locations, both on premises and remote, using a variety of devices, both managed and unmanaged, to access thousands of cloud services, both IT sanctioned and unsanctioned. It also advises on which use cases and environments are best suited for the most common CASB deployment modes. “As the first CASB player in the market with the most number, scale, breadth, and maturity of CASB deployments, Skyhigh continues its quest to help organizations securely adopt cloud services,” said Rajiv Gupta, “We hope the reference architecture helps organizations cut through the noise so they can leverage the power of cloud services using the most advanced security technologies on the market, both existing and new.”


International regulators take an interest in crypto-currencies & the blockchain

“… distributed ledger technology has the potential to revolutionise financial services … However, … there are a lot of regulatory and consumer issues … to be discussed as the technology evolves. For example, how individuals gain access to a distributed network and who controls this process, [and] what data security exists for users … Innovation can be an iterative process … During … development, it’s crucial that innovators are allowed the space to develop their solutions. The FCA continues to monitor … this technology but is yet to take a stance … In the meantime, we continue to work with firms … to ensure consumer protections are being factored in during the development phase … We are particularly interested in exploring whether block chain technology can help firms meet know your customer or anti-money laundering requirements more efficiently and effectively.


Most software already has a “golden key” backdoor: the system update

From an attacker perspective, each capability has some advantages. The former allows for passively-collected encrypted communications and other surreptitiously obtained encrypted data to be decrypted. The latter can only be used when the necessary conditions exist for an active attack to be executed, but when those conditions exist it allows for much more than mere access to already-obtained-but-encrypted data. Any data on the device can be exfiltrated, including encryption keys and new data which can be collected from attached microphones, cameras, or other peripherals. Many software projects have only begun attempting to verify the authenticity of their updates in recent years. But even among projects that have been trying to do it for decades, most still have single points of devastating failure.


ATMZombie: banking trojan in Israeli waters

The Trojan is dropped into the victim machine and starts the unpacking process. Once unpacked it stores certificates in common browsers (Opera, Firefox) and modifies their configurations to match a Man-In-The-Middle attack. It eliminates all possible proxies other than the malware’s and changes cache permissions to read-only. It than continues by changing registry entries with Base64 encoded strings that contain a path to the auto-configuration content (i.e. traffic capture conditions using CAP file syntax) and installs its own signed certificate into the root folder. Later it waits for the victim to login to their bank account and steals their credentials, logs in using their name and exploits the SMS feature to send money to the ATMZombie.


Hybrid Cloud Versus Hybrid IT: What’s the Hype?

The difference between hybrid cloud and hybrid IT is more than just semantics. The hybrid cloud model is embraced by those entities and startups that don’t need to worry about past capital investments. These newer companies have more flexibility in exploring newer operational options. Mature businesses, on the other hand, need to manage the transition to cloud without throwing away their valuable current infrastructure. They also deal more with organizational change management issues and possible employee skill set challenges. The new, bimodal IT model is also a concern for these enterprises, Forbes reported. This is a tricky dilemma because both hybrid cloud and hybrid IT have been known to deliver some pretty significant advantages. Some of the biggest benefits of moving to an updated cloud or IT environment include:


Millions of OpenSSL secured websites at risk of new DROWN attack

According to the researchers who found the flaw, that could amount to as many as 11.5 million servers. How bad is DROWN really? Some of Alexa's leading web sites are vulnerable to DROWN-based man-in-the-middle attacks, including Yahoo, Sina, and Alibaba. Thanks to its popularity, the open-source OpenSSL is the most obvious target for DROWNing, but it's not the only one. Obsolete Microsoft Internet Information Services (IIS) versions 7 and earlier are vulnerable, and editions of Network Security Services (NSS), a common cryptographic library built into many server products prior to 2012's 3.13 version, are also open to attack. You can find out if your site is vulnerable using the DROWN attack test site.


Ten server deployment checklist considerations

A comprehensive server deployment checklist involves a lot more than buying adequate computing resources at an attractive price. It takes talented IT administrators and other personnel to source, acquire, prepare, install, configure, manage and support a fleet of servers -- whether in the tens, hundreds or thousands -- in a data center. The emphasis on reducing data center hardware footprints and lights-out operations can sometimes cause IT staff to overlook important issues. These top 10 logistical considerations should factor into every rack-and-stack server deployment checklist.



Quote for the day:


"And the little screaming fact that sounds through all history: repression works only to strengthen and knit the repressed." -- John Steinbeck


February 29, 2016

How do you define great IT leadership?

"Being recognised as the person that is going to drive innovation and help the company be more successful than it is today is a great way to show the important role you play," he says. While communication skills are crucial, great leaders do not necessarily have to assume the mantle of a spokesperson. ... "Your results should speak for themselves. Personal knowledge and experience can be built over time. If you bring specific industry knowledge, actively engage with peers in their language to understand their business challenges, then you can be confident that you will be recognised as a critical part of your organisation's competitive advantage."


US law will restore trust in transatlantic data flows, says EU commissioner

"[This] will pave the way for the signature of the EU-US data protection umbrella agreement. This agreement will guarantee a high level of protection of all personal data, regardless of nationality, when transferred across the Atlantic for law enforcement purposes. It will strengthen privacy, while ensuring legal certainty for transatlantic data exchanges between police and criminal justice authorities. This is crucial to keep Europeans safe through efficient and robust cooperation between the EU and the US in the fight against crime and terrorism," Jourová said. The data protection 'umbrella' agreement, a new privacy framework that will apply to personal data transferred to US law enforcement agencies, was announced by the European Commission last September, although it will not apply until EU law makers ratify it.


3 Ways to Build an Outstanding Company Culture

Engaging in constructive dialogue holds more value than simply measuring NPS scores, Cain adds. His team recognizes that unsolicited feedback offers granular insight into what truly matters to employees and customers. Also, instead of incenting employees based on quotas and numbers targets, Avnet offers informal rewards for behaviors that increase or reinforce customer relationships. Focusing on quality over quantity empowers employees to pursue and fulfill their shared mission. "The top-notch service, support, and expertise that we provide to partners and customers will not be possible without our self-motivated and professional employees who live up to the core values of Avnet," Lim says


How Serverless Applications Will Change Your Business

Even with serverless applications, not everything happens in the cloud, nor does all functionality come from the cloud. There's still a need for on-premises developers "who control the end-user experience," said Emison. These developers should assume the end-user part of the application is running on a powerful smartphone, tablet, or other mobile device. A substantial part of the application logic can reside there, given the growing power of the devices. In that sense, Web applications, which put all the logic on an Internet server and give the end user a browser or other form of thin user interface display, have been re-architected. In serverless applications, the user's experience is determined by the business logic on the end-user device, as well as the Internet data center server, and it represents a significantly larger share of the application than a display window.


CEO training critical to cyber resilience, says APMG

“In part due to a lack of free time and in part due to a perceived view of cyber security as tangential to their core role, CEOs often overlook cyber training. Taking into account the number of cyber attacks that have become public in the past 12 months or so, any large organisation must view a breach as inevitable. “To deal with the range of threats faced by an organisation on a daily basis, its cyber security strategies must consider all possible technical or cultural factors that pose a degree of risk. With the right skills in place, an appropriate response to threats can be effectively communicated across the whole organisation in a common language,” he said.


The best media and methods for archiving your data

Active archiving has nothing to do with hard drives, per se. It’s simply the act of shuttling data between media in a storage area network or SAN with the goal of keeping the most frequently accessed data on the fastest media (RAM or SSDs) and the least frequently accessed data on slower tape or optical, with hard drives somewhere in middle. ... Don’t bother with trivial or unfinished data. Archive only irreplaceable data that’s in its final state: legal or financial documents, important memorabilia, your creative efforts, etc. If you can download it again, reinstall it, or if you are still working on it, don’t bother—you’ll just waste time and space. Let your everyday backup take care of it. Also take the opportunity to de-duplicate and prune your data before you archive.


How the Internet of Things is becoming the 'Internet of Commerce’

The maturation of mobile payment services combined with the proliferation of IoT-capable devices has created a perfect storm of innovation that's seeing our money going places it never could, both securely and conveniently. And thanks to innovators like MasterCard, the Internet of Things is moving from pure connectivity, to all-out functionality. Consider this: When the world was first introduced to IoT, it was "enough" to fantasize about controlling objects around you, like programming your home's thermostat from your phone. But control only scratches the surface. When MasterCard launched its Commerce for Every Device program last October, the payment innovator declared that any connected device — not just a smartphone or smartwatch — could become payments-enabled.


Data Center Security Is an Inside Game

Micro-segmentation addresses this new security challenge by distributing the security functions across all servers and machines, right at the source where applications reside (as opposed to concentrating security deep down in the physical network). Done correctly, micro-segmentation can enable 100 percent protection of data center traffic, in a simple and scalable manner. The intent is to secure data centers from inside and protect east-west traffic using fine-grained security policies. It’s worth noting that micro-segmentation isn’t limited to the east-west direction only – it is a comprehensive, 360-degree approach to protecting all data center traffic, in a modern scalable way. Is it feasible to put this new security shield around existing and new applications?


Apache Spark vs. Apache Flink – Whiteboard Walkthrough

To give you a good analogy, imagine collecting water in a bucket, flowing water in a bucket, and then pouring it out, vs. putting in a pipe there and letting water flow continuously without any intermediate delays. That's essentially the difference between a micro-batch and a continuous flow operator.  Spark essentially started as a batch processor, and eventually started adding more and more capabilities that make it more often real-time streaming processing as well. Flink ,which initially during its research stages, started solving problems around batch, but along the way, its researchers identified several interesting challenges in the real-time streaming paradigm. As a result, they pivoted more from a continuous flow operator-based model and kind of treated batch as a special case of real-time streaming.


Unified Data Modeling for Relational and NoSQL Databases

Current relational databases all follow the 3rd normalization. With ACID transaction model (Atomic, Consistent, Isolated, Durable), it is good to use relational databases when one data set has only one copy in the database. It means modifying one copy at a time. However, data needs aggregation when it’s queried from multiple different applications. So data needs to be distributed, and data schema needs to be de-normalized according to the business requirements. Schemas should be designed for enabling distributed query. This requires each data set to contain enough information to run the executed queries separately in different data nodes. Based on the above, using logical model describing business requirements and de-normalizing schema to physical data model is fundamental when building NoSQL databases.



Quote for the day:


“The path of cultivating excellence is practice. And not just any practice...” -- Bob Dunham


February 28, 2016

Google AI can pinpoint where any snap was taken, just by looking at pixels

PlaNet treats the task as a classification problem and uses multiple visual cues, including weather patterns, vegetation, road markings, and architectural details, to identify an exact location in some cases. This approach allows it to "express uncertainty about a photo". So, for example, it can be fairly confident about the location of an image of the Eiffel Tower, whereas a picture of a fjord could be in New Zealand or Norway. The system was developed by dividing the world into a grid of 26,000 squares. The more images taken in a given location, the bigger the square, so cities are larger than remote areas while oceans are completely ignored.


Beyond Bitcoin—Blockchain Is Coming to Disrupt Your Industry: Weekend Reading

Blockchain technology is a new solution to a more challenging version of the Byzantine Generals Problem that includes the ability to add participants over time. A blockchain is a digital, distributed transaction ledger, with identical copies maintained on multiple computer systems controlled by different entities. Anyone participating in a blockchain can review the entries in it; users can update the blockchain only by consensus of a majority of participants. Once entered into a blockchain, information can never be erased; ideally, a blockchain contains an accurate and verifiable record of every transaction ever made.⁶ It would have made for a very reliable way for Byzantine generals to exchange information.

Fintech a boon for the unbanked but a nightmare for regulators

What is exciting for us consumers is becoming a nightmare for regulators around the world. Already the banking behemoths are protesting that the horrendously burdensome regulations introduced since the 2008 global financial crash make it hard for them to compete with these spritely new disruptors. While they are spending large sums to make sure they can use the new technologies for driving efficiencies down to their own bottom lines, they are at the same time protesting that these pesky start-ups have unfair advantages because their new business paradigms duck around current regulatory regimes. But these protests are pushing regulators into an awkward corner. They are under strong pressure to let innovators flourish if they can improve services to consumers, and give the millions of “unbanked” first-time access to bank loans.


A succesful Git branching model considered harmful

The basic principle in making usable systems is to have sane defaults. This branching model makes that mistake from the very beginning by not using the master branch for something that a developer who clones the repository would expect it to be used, development. Using individual (long lived) branches for features also make it harder to ensure that everything works together when changes are merged back together. This is especially pronounced in today’s world where continuous integration should be the default practice of software development regardless how big the project is. By integrating all changes together regularly you’ll avoid big integration issues that waste a lot of time to resolve, especially for bigger projects with hundreds or thousands of developers.


Adding a data virtualization layer to IT systems: Three questions to ask

The objections typically focus on three aspects of the implementation. The first is the simplicity of the implementation. How easy is it to implement? The second is how easy is it to get to the data? What does the data look like when you're getting access to it? [This question is important] because you're providing the capability of accessing multiple sources now, and you're providing, essentially, virtual data sets that didn't exist in their original form, because you're providing the federation. So, how flexible is it for you to be able to present the data back to one or more consumers? Then, of course, the question of when I introduce another layer between my consumers and the actual sources of data, isn't that going to create yet another layer of complexity when it comes to computational performance? Is it going to perform well?


Transformational vs. Contemporary Leadership Styles

There are certain points of departure between the two styles. While it emphasizes gaining trust and influencing followers, servant leadership calls for more sacrifice on the part of the leader. The pursuit of profits is secondary for the servant leader. Followers are more likely to have greater freedom under a servant leader than transformational leader. Another principal difference is the leader’s focus. Though both styles call the leader to service, the servant leader’s ultimate focus is the follower, while the transformational leader’s greatest concern is to encourage followers to serve the organization diligently. The fundamental difference between the two styles is that the servant leader focuses on the followers’ needs, while the transformational leader focuses on organizational goals.


Taking a bite at the Apple

The FBI has argued many times that encryption can thwart legitimate investigations, leaving vital clues undiscovered. But security researchers point out that what works for the good guys works for the bad guys, too. If a subverted operating system managed to escape into the “wild” even once, then the security of every iPhone would be put at risk. The trade-off, says Kenneth White, a director of the Open Crypto Audit Project, an American charity, is not security versus privacy, but security for everyone versus the police’s ability to investigate specific crimes. And the risk of a leak would rise with every extra person who had access to the nobbled code: defence lawyers demanding to see it; court-appointed experts given the job of checking it works as intended; and so on.


Reveals Vision for a Secure Internet of Things

“Given ubiquitous connectivity and the rapid emergence of IoT, the need for a well-designed, structured and comprehensive security architecture has never been greater,” he continued. Embedded systems and connected devices are already deeply woven into the fabric of our lives, and the footprint is expanding at a staggering rate. Gartner estimates that 4.9 billion connected things were in use by the end of 2015, a 30% increase from 2014. This will rise to 25 billion by 2020 as consumer-facing applications drive volume growth, while enterprise sales account for the majority of revenue. Security is a core need for manufacturers, developers, service providers and others who produce and use connected devices.


Design Thinking as a Strategy for Innovation

Design Thinking is a methodology used by designers to solve complex problems, and find desirable solutions for clients. Design Thinking draws upon logic, imagination, intuition, and systemic reasoning, to explore possibilities of what could be, and to create desired outcomes that benefit the end user (the customer). A design mindset is not problem-focused, it’s solution focused, and action oriented. It involves both analysis and imagination. “Design is the action of bringing something new and desired into existence—a proactive stance that resolves or dissolves problematic situations by design. It is a compound of routine, adaptive and design expertise brought to bear on complex dynamic situations.” —Harold Nelson


Making enterprise-architecture more tangible

Within an architecture, there are four key dimensions that we need to keep track of at all times: physical stuff, virtual information, relations between people, and aspirationalmotivations such as enterprise-purpose, brands and more. In practice, it’s hard to keep track even of three of those themes at a time – a single face on that tetrahedron. But in the middle of each face is a reminder of the ‘missing’ theme – and if we rotate the tetrahedron, other faces in turn come into view, reminding us of the whole-as-whole. Architecture made tangible… Even that tetrahedron-model is a bit abstract, though. Let’s take it a step further, moreinto the people-realm…



Quote for the day:


"It's not enough to do your best, you must know what to do and then do your best." -- W. Edwards Deming