June 16, 2016

Here's How AI Is About To Make Your Car Really Smart

By 2020, Gartner predicts, there will be 250 million cars connected to each other and to the infrastructure around them via Wi-Fi systems that will allow vehicles to communicate with each other and the roadways. As the amount of information being fed into IVI units or telematics systems grows, vehicles will be able to capture and share not only internal systems status and location data, but also changes in surroundings in real time, according to Gartner analyst Thilo Koslowski. ... Speaking at the New England Motor Press Association Technology Conference at MIT, Pratt said auto makers are more focused on assisting drivers for years to come instead of producing fully autonomous vehicles that take the steering wheel from drivers. A lot of the discussion among automakers and within their R&D organizations involve how much control the car should have.


Blockchain Technology Successfully Piloted by Allianz Risk Transfer

ART and Nephila have worked with a number of firms to develop the proof of concept and see extensions of this technology having relevance across the insurance industry: for example, in optimizing the payment processes involved in international fronting for captive insurers, where multiple process steps are involved in transferring premium from a corporate to its own subsidiary. Laura Taylor, Managing Principal at Nephila, adds: “We believe technology will drive the future of insurance. We have invested a great deal accordingly and are pleased to extend our long-standing strategic partnership with ART to use of the Blockchain.” “In our journey to become more digital, Blockchain promises to help us create more transparent, more convenient and faster services for our customers,” says Solmaz Altin


Putting Purpose-Built Performance in NFV

Let’s start with a look at why NFV environments elicit performance anxiety, and where it comes from. The core technology for NFV – virtual machines (VMs) running on x86-based servers – emerged from the enterprise world. VMs are designed to “spin up” instances of an operating system that can run applications for an enterprise customer, and then “scale out” by adding more VMs and, if necessary, servers, to keep up with new subscribers. Certain applications in a service provider environment – for example, mobile services – require the capability to handle millions of subscribers. In addition, real-time communications applications have more stringent requirements than, say, a Web server. If a VM fails, there is a process for replacing it or moving it to another server, a move that might take seconds or even minutes in standard cloud environments.


Neural Network Architectures

Christian Szegedy from Google begun a quest aimed at reducing the computational burden of deep neural networks, and devised the GoogLeNet the first Inception architecture. By now, Fall 2014, deep learning models were becoming extermely useful in categorizing the content of images and video frames. Most skeptics had given in that Deep Learning and neural nets came back to stay this time. Given the usefulness of these techniques, the internet giants like Google were very interested in efficient and large deployments of architectures on their server farms. Christian thought a lot about ways to reduce the computational burden of deep neural nets while obtaining state-of-art performance (on ImageNet, for example). Or be able to keep the computational cost the same, while offering improved performance. He and his team came up with the Inception module:


Developing the Next Wave of Data Scientists

With Cortana Intelligence Suite, students had access to a rich set of tools such as Azure ML, Jupyter notebooks with R and Python, and rich visualization capabilities with Power BI. In each city, students were given access to a collection of local data sets and challenged to develop a useful predictive analytical application. Students picked from a wide range of areas including healthcare, environment, smart city design and more. With the support and mentorship of university faculty and Microsoft technical staff, students wrestled through the creative problem solving and technical implementation aspects of data science. Many high-performing teams even published their models in app stores. One example is Live London, the winners from UC London, who developed a safe neighbourhood tracker app available on the Android app store.


Nokia announces horizontal IoT platform called Impact

The IMPACT platform is modular in its approach, Ploumen said, allowing entities to "mix and match" services like device management or analytics, depending on what third-party components they may already use. It also includes a new edition of Nokia's Motive Connected Device Platform (CDP), which supports more than 80,000 device/sensor models and already has connected and managed more than 1.5 billion devices. Nokia has been in a rocky transitional period since its acquisition of Alcatel-Lucent in April last year, slashing jobs and reporting a loss of €613 million for the first quarter of 2016. However, the deal has allowed the company to focus on more forward-looking revenue streams like IoT. In April, Nokia announced its plans to acquire wearable and health-monitoring company Withings, adding to Nokia's portfolio in one of the fastest-growing IoT segments.


Singapore banks adopt voice biometrics for user authentication

“Conceptually, this is an attractive proposition that will allow financial institutions to introduce a completely new safeguard that reinforces existing authentication processes, while leveraging the growing availability and sophistication of consumer mobile hardware and merchant point-of-sale devices.” The hurdle for biometric authentication today is its strong hardware and software dependency, according to Ho. “Not all consumers have compatible devices to support fingerprint scanning, the quality of sound capture varies from phone to phone and is not regulated by a common industry standard, and merchant biometric requires investment in specialised tools which most stakeholders may be hesitant to bear,” said Ho.


Deep Learning Isn’t a Dangerous Magic Genie. It’s Just Math

Deep learning is a subfield of machine learning, which is a vibrant research area in artificial intelligence, or AI. Abstractly, machine learning is an approach to approximating functions based on a collection of data points. For example, given the sequence “2, 4, 6,…” a machine might predict that the 4th element of the sequence is 8, and that the 5th is 10, by hypothesizing that the sequence is capturing the behavior of the function 2 times X, where X is the position of the element in the sequence. This paradigm is quite general. It has been highly successful in applications ranging from self-driving cars and speech recognition to anticipating airfare fluctuations and much more. In a sense, deep learning is not unique.


Building Your Big Data Infrastructure: 4 Key Components Every Business Needs To Consider

Big data can bring huge benefits to businesses of all sizes. However, as with any business project, proper preparation and planning is essential, especially when it comes to infrastructure. Until recently it was hard for companies to get into big data without making heavy infrastructure investments (expensive data warehouses, software, analytics staff, etc.). But times have changed. Cloud computing in particular has opened up a lot of options for using big data, as it means businesses can tap into big data without having to invest in massive on-site storage and data processing facilities. In order to get going with big data and turn it into insights and business value, it’s likely you’ll need to make investments in the following key infrastructure elements: data collection, data storage, data analysis, and data visualization/output. Let’s look at each area in turn.


BMW exec says industry ready to battle hackers and make move to 5G

It matters a lot to connected cars. We have been working with major telecos (telecommunications companies) and also with some equipment manufacturers to shape 5G and make it useful for connected cars. In the past a lot of the connectivity was related to classical entertainment services. In the future a lot of the functionality will be more "serious." For example, automated driving will require the car to be entirely safe even without a mobile connection. On the other hand, a lot of the services that 5G can enable will help make that a really good product. Automated cars will move based on maps and sensors, relating what they see to what’s in the map. Updating that map is going to be something done through mobile connections.



Quote for the day:


"It is not that I'm so smart. But I stay with the questions much longer." -- Albert Einstein


June 15, 2016

IaaS demand soars: Why this is great news for Amazon and IoT startups

The big question is: Can they keep up with the demand? Here's the thing: Amazon is dominating that space in ways that has every other company (even Google) shaking their heads. So when you have the likes of Google, Microsoft, and IBM playing a serious game of catchup with the big 'Zon, you know the demand is nowhere near the supply. No surprise, right? What is surprising, however, is that Google does not rank at the top of the heap. Considering the global domination of the Android platform, one would think Google leads the top seven providers, but Google doesn't come close to Amazon's IaaS profit. In 2015, Amazon Web Services drew in over $7 billion in profit, compared to Google Compute Engine drawing in a mere $281 million. Google knows it is lagging behind Amazon and is doing everything it can to shrink the margin.


How IT4IT Helps Turn IT into a Transformational Service for Digital Business Innovation

The next BriefingsDirect expert panel discussion examines the value and direction of The Open Group IT4IT initiative, a new reference architecture for managing IT to help business become digitally innovative. ...  This panel, conducted live at the event, explores how the reference architecture grew out of a need at some of the world's biggest organizations to make their IT departments more responsive, more agile. We’ll learn now how those IT departments within an enterprise and the vendors that support them have reshaped themselves, and how others can follow their lead. The expert panel consists of Michael Fulton, Principal Architect at CC&C Solutions; Philippe Geneste, a Partner at Accenture; Sue Desiderio, a Director at PriceWaterhouseCoopers; Dwight David, Enterprise Architect at Hewlett Packard Enterprise (HPE); and Rob Akershoek, Solution Architect IT4IT at Shell IT International.


Machine-Vision Algorithm Learns to Transform Hand-Drawn Sketches Into Photorealistic Images

A more promising approach is to use machine-vision algorithms that rely on neural networks to extract features from an image and use these to produce a sketch. In this area, machines have begun to rival and even outperform humans in producing accurate sketches. But what of the inverse problem? This starts with a sketch and aims to produce an accurate color photograph of the original face. That’s clearly a much harder task, so much so that humans rarely even try. Now the machines have cracked this problem. Today, Yagmur Gucluturk, Umut Guclu, and pals at Radboud University in Denmark have taught a neural network to turn hand-drawn sketches of faces into photorealistic portraits. The work is yet another demonstration of the way intelligent machines, and neural networks in particular, are beginning to outperform humans in an increasingly wide variety of tasks.


Ransomware Attacks Taking Huge Toll On Healthcare Resources

Traditional reliance on policies, procedures and training to promote confidentiality also no longer are effective when the data integrity is threatened because it’s not accessible, says Paul Bond, a partner in the Reed Smith law firm who specializes in IT and privacy issues. With the availability of health data in peril, organizations must have contingency plans in place so they have an action plan for what to do when facing a ransom incident. Should they pay the ransom and get their data back? Some organizations may not have an alternative if their data back-up processes were not optimal. Some hospitals have paid ransom. For example, Hollywood Presbyterian Medical Center in Los Angles struggled for 10 days to regain its data, then paid $17,000 in Bitcoin—an Internet currency—to get access back to its data. Kansas Heart Hospital paid an undisclosed amount of ransom, but did not get back all its data after the attackers demanded another ransom, and the hospital refused.


Blockchain’s Benefits Extend Beyond The Financial Services Sector

“Any multi-party process where shared information is necessary to the completion of transactions and the coordination of activity and the exchange of value — that’s where blockchain technology can be put to good use,” Ms. Masters told attendees of The Wall Street Journal’s CFO Network in Washington D.C. “It’s one of the great opportunities, I think, in the financial services sector,” Ms. Masters said. “We’re talking about billions of dollars in annual savings for the banking industry.” ...  Blockchain can help companies in all industries manage the movement of money in exchange for goods and services across multiple different parties in a secure, timely and coordinated way. Instituting a centralized, encrypted repository for such information can help companies make complicated transactions more efficiently, she explained.


What is probabilistic programming?

A probabilistic programming language is a high-level language that makes it easy for a developer to define probability models and then “solve” these models automatically. These languages incorporate random events as primitives and their runtime environment handles inference. Now, it is a matter of programming that enables a clean separation between modeling and inference. This can vastly reduce the time and effort associated with implementing new models and understanding data. Just as high-level programming languages transformed developer productivity by abstracting away the details of the processor and memory architecture, probabilistic languages promise to free the developer from the complexities of high-performance probabilistic inference. What does it mean to perform inference automatically? Let’s compare a probabilistic program to a classical simulation such as a climate model. A simulation is a computer program that takes some initial conditions such as historical temperatures, estimates of energy input from the sun, and so on, as an input.


Air Force uses event-driven framework and SOA to support warfighters

The primary reason is really to expose information that's kind of "stove piped" in all our legacy systems and make that available [while also] protecting it from our adversaries. We're moving into the SOA environment precisely for that reason. Most of the legacy systems ... were built on a client-server framework. ... Data is kind of bottled up in those databases. And with the SOA middleware layer, we're exposing that data and making it available to other users without building custom interfaces that pretty quickly become expensive to manage. The success of [these] money-saving and time-saving innovations is critical to the Air Force's ability to operate, particularly in a fiscally constrained environment. We can show case after case of reuse of the SOA environment where we've been able to transition quickly to another operational need, make connections and make data available very rapidly.


Who’s The Digital Transformation Boss, and Why Should it be the CIO?

More and more, the CIO is taking a leadership role in digital strategy. When it comes to digital transformation, however, the CIO can’t go it alone. Digital transformation requires collaboration, and a joint set of initiatives that combine business and technology. “We’re not just talking about IT for IT’s sake, but about innovation with the business around business capabilities,” says Snyder. Digital disruption, he explains, is no longer just about developing new business models — which was the biggest expectation last year. In 2016, expectations have shifted to focus on digital transformation in the form of new and innovative products and services, as well as new forms of customer engagement.  “That’s why digital transformation must be done collaboratively,” says Snyder. “You can’t do this without the rest of the business...it is the business.”


Service Wiring with Spring Cloud

For simple applications, external configuration for dependency addresses may well be sufficient. For applications of any size though, it's likely that we'll want to move beyond simple point-to-point wiring and introduce some form of load-balancing. If each of our services depends directly on a single instance of its downstream services, then any failure in the downstream chain is likely to be catastrophic for our end users. Likewise, if a downstream service becomes overloaded, then our users pay the price for this through increased response times. What we need is load balancing. Instead of depending directly on a downstream instance, we want to share the load across a set of downstream service instances. If one of these instances fails or becomes overloaded then the other instances can pick up the slack. The simplest way to introduce load balancing into this architecture is using a load-balancing proxy.


How to build an effective ransomware defense

Make sure all systems are promptly updated with the latest operating system security patches; Enforce anti-malware scanning across all departments, and ensure your malware signature databases are up to date; Implement content-based scanning and filtering on email servers, particularly where access to cloud services such as Gmail, Yahoo Mail, and Outlook.com are permitted from the enterprise network; Restrict users’ access to only those systems that are necessary for their roles. Avoid “access sprawl.”; Use two-factor authentication, so a stolen password isn’t enough to grant access; Ensure user accounts are de-provisioned promptly. There should be no orphaned accounts of former employees, especially if they served in a technical role; and Deploy and maintain a comprehensive backup system, including offsite storage, in the event that files need to be restored.



Quote for the day:


"Be decisive. A wrong decision is generally less disastrous than indecision." -- Bernhard Langer


June 14, 2016

How To Make A Digital Risk Plan And Sell It To The Board

The plan should find the top half-dozen risks that threaten the business, and those are not necessarily the same as the ones that affect IT, says Garner analyst Jeff Wheatman. The question to address is, “What are top IT related risks that could lead to business risks becoming real?” he says. That’s what the corporate decision makers care about. Security executives have to create controls that balance the need to protect the business with the need of to keep it running efficiently. To do that the security experts have to talk to the business leaders while they are creating the plan, he says. That acts as a trial run of what might fly when the plan is presented to the board. Reactions from business group leaders can go three ways: We never thought of that; we worry about something else that’s not on your list; your list has items we don’t care about.


No robots required: AI will eliminate these jobs first

"AI doesn't have to pretend to be a person to have a huge value to the world," says Scott Crowder, CTO and vice president of technical strategy and transformation at IBM Systems. "It's about providing information and insight to humans, so we can do a better job." That's one reason why IBM prefers the term "intelligence augmentation" -- IA, not AI -- and defines its "Jeopardy" champion Watson supercomputer as "a cognitive computing technology that extends and amplifies human intelligence, working in partnership with professionals." AI is already serving on the front lines of service and support via voice-enabled virtual customer agents like Amelia. But because it also excels at analyzing massive amounts of unstructured data, the technology is ideally suited for identifying potential security threats or helping drive business decisions.


Blockchain Is Not Going To Change The World

The haggling process does not affect our ledger balances. But it does affect our messaging. We are establishing a relationship of some kind of trust. If we don’t trust the other person – for example, if the trader thinks the coins are debased, or I suspect the sword has been stolen (and I think the real owner might turn up to claim it) – we are unlikely to agree to trade. Money issued by a trusted source reduces the need for personal trust: if the trader trusts that the money is real, he may agree to sell me a sword even if he suspects I am a jihadi. (I am not advocating this, by the way). But even so, he isn’t going to hand over the sword until he knows for certain that I have the money to pay for it.


What’s Next for Artificial Intelligence

Deep learning, modeled on the human brain, is infinitely more complex. Unlike machine learning, deep learning can teach machines to ignore all but the important characteristics of a sound or image—a hierarchical view of the world that accounts for infinite variety. It’s deep learning that opened the door to driverless cars, speech-recognition engines and medical-analysis systems that are sometimes better than expert radiologists at identifying tumors. Despite these astonishing advances, we are a long way from machines that are as intelligent as humans—or even rats. So far, we’ve seen only 5% of what AI can do.


We’ve hit peak human and an algorithm wants your job. Now what?

Bank executives know what’s coming. So they’re setting up coder labs and investing in startups, teaming up with digital competitors or buying them outright. JPMorgan Chase, the biggest U.S. lender by assets, is using AI to identify potential equity clients. And it’s marshaling OnDeck Capital’s client-vetting algorithm to speed lending to small businesses. Both Bank of America and Morgan Stanley, which together employ more than 32,000 human financial advisers, are developing automated robo-advisers. More than 40 global banks have joined forces with startup R3 to develop standards to use blockchain, software that allows assets to be managed and recorded through a distributed ledger, to overhaul how assets are tracked and transferred.


How To Foster Curiosity And Creativity In The Workplace

Leaders, like their teams, must become more curious or risk becoming irrelevant. In fact, if they are going to create a corporate climate of curiosity, it is a must for them. So why don’t they embrace this? Mostly because they have to work at it. Curiosity is a developed skill and one that has to be nourished constantly. This takes time and effort, and unfortunately most leaders want to rely on what has put them in their jobs versus what is going to keep them relevant and in their jobs. Liz Wiseman sums it up best in her book, “Rookie Smarts”: “In a growing company everyone is under qualified every day. In business today, it is not about what you know but how fast you learn.” As such, leaders must become experts at learning and practicing curiosity.


The future of the IoT job market

In a nutshell, IoT will do exactly what technology does everywhere — it supplants low-skill jobs with high-skill jobs. Eventually, the Internet of Things will lead to widespread replacement of simple and repetitive jobs in areas such as manufacturing, administration, quality control and planning. But more importantly,IoT will lead to the creation of new jobs that will help organizations champion and pioneer not only their personal success with IoT, but the success of the business as well. So what are these jobs, and how should you rework your resume to be prepared for them? Many of these opportunities are new enough that they don’t even have titles yet. But don’t worry, we made some up.


Is it time to buy cyber insurance?

Cyber insurance is coverage that public- and private-sector organizations can buy to help manage the costs of cyber incidents -- costs that can be astronomical both in terms of dollar figures and loss of reputation. For example, the Office of Personnel Management has spent at least $133 million just on credit monitoring services. Studies last year of the per-record costs of data breaches ranged from $154 to $964. Cybersecurity insurance has been available for nearly a decade, but it’s only recently begun to catch on.  “Now you have like 60, 70 carriers writing policies, you have annual premiums of $2 billion and growing, which is I think big. I think that’s sizable,” Sasha Romanosky, a policy researcher at Rand Corp., said. “That’s not the level of car insurance or health, but it’s still significant.”


Forget the Cloud, Microsoft/LinkedIn Deal Is All About the Data

“What makes the most sense is the untapped value of all that content,” Laney says. “What makes the least sense is -- well, perhaps the price tag, but I'm no financial analyst -- is whether Microsoft is, or can be, positioned quickly enough to monetize all this content.” Laney takes issue with fellow analysts that claim this deal is all about Microsoft’s move to the cloud. “Financial analysts I listened to this morning yapping about "cloud this" and "platform that" have totally missed the big picture. It's all about the data,” Laney stresses. “What can Microsoft do with all this content? Almost anything,” Laney says. “LinkedIn Ts & C's are pretty clear (just like WhatsApps and every other social media co) that they can do almost whatever they want with the content, including transfer it.”


Hiring Disrupters in the Age of Disruption Part 1: Re-imagining Executive Search

Unless you’ve been living under a rock in recent times, you must be well aware of the waves of disruption sweeping through the world. Uber is upending the taxi industry and to think they are just a software tool and don’t even own any cars! Airbnb is practically the biggest hotel company in the world although they don’t own any properties. Google, Tesla, Netflix, Apple, Amazon. The list is endless – there’s never a dearth of newer business models and new technologies, or companies finding new ways to exploit existing technologies. Disruptive players are coming out of nowhere and toppling empires. Remember Kodak? In 1998, they had over 170,000 employees and sold 85% of photo paper worldwide. But in just a few years, their business model practically disappeared, and they were soon relegated to the has-been list.



Quote for the day:


"One if the hardest things in life to learn are which bridges to cross and which bridges to burn.” -- @Oprah


June 13, 2016

Machine Learning Could Help Companies React Faster To Ransomware

Exabeam's Analytics for Ransomware, a new product that was announced today, uses the company's existing behavior analytics technology to detect ransomware infections shortly after they occur. The product uses data from a company's existing logs to build behavior profiles for computers and users. This allows it to detect previously unknown ransomware without pre-existing detection signatures by analyzing anomalies in the file and document behavior of employees. To avoid false positive detections, the technology flags incidents as ransomware when the combined risk score of multiple suspicious activities that could indicate this type of threat reaches a certain threshold.


Blockchain as a Service – The New Weapon in the Cloud Wars?

Setting up an environment to test and research blockchain is not trivial undertaking. Blockchain is a distributed, peerto-peer technology. It requires an ecosystem with multiple systems in order to be able to develop, research, and test. I recently wrote about the benefits of leveraging the public cloud for test environments. One of the big benefits is the ability to stand up, deploy, test, and break down environments. No large hardware investments are needed, nor any capital investment. The cost involved is only during the time the environments are up and being used. From a cost perspective, this is a definite plus. We still have the complexity of setting up and configuring the blockchain ecosystem. This is where the concept of offering Blockchain As A Service (BaaS) can provide added value.


Linux Mint 18: Hands on with the Cinnamon and MATE betas

The Linux Mint developers were in a particularly difficult position, because they have two desktops that they had to adapt the Gnome utilities for (Cinnamon and MATE). This not only made for a lot of work, it created a significant support burden. The Mint developers finally decided to solve this problem in pretty much the same way that they solved the original Gnome 3 Shell problem - they just gave up on following the Gnome utilities, and they took it upon themselves to develop and maintain an equivalent set of utilities - which are now known as the X-apps. The X-apps are based on older, stable, and well-known versions of the Gnome utilities. Finally, the Mint developers have said that the X-apps will be developed and maintained in such a way that they will always be compatible with both Cinnamon and MATE.


Responding to climate change risks: the role of financial services firms

The pressure on business was ramped up following the formation of the Financial Stability Board (FSB) Task Force on Climate-Related Financial Disclosures (TCFD) at the end of last year, announced by Mark Carney and chaired by Michael Bloomberg. Since publishing its first report in April 2016, the Taskforce set the course for an intensive nine months of work, at the end of which it will produce detailed guidelines for companies to enhance how they disclose to their investors and lenders the climate risks they are financing. Again, this is hugely challenging but there is a good degree of alignment amongst Taskforce members and a shared ambition to fundamentally improve disclosure on climate risks, so we shouldn’t underestimate the outcome. While the guidelines will be voluntary, it is possible that some countries might choose to make them mandatory over time, and even if they don’t, pressure from investors


Why every organization needs Business Process Management

Within every organization there are business processes designed to meet objectives. But for any number of reasons they may have become slow, inefficient or come to the end of their days. BPM basically puts all these processes under the microscope using various metrics and analysis to identify where processes can be improved for maximum performance. When implementing new processes, BPM can ensure they are running as smoothly as possible. Organizations are increasingly acknowledging the need to improve their business processes and understand the advantages that come from process automation. BPM can help reduce paper handling and inefficiencies in areas such as contracts and invoicing, and also improve performance of both people and systems by giving remote workers access to the same ‘ user experience’ as those working within the walls of the organization.


How to build a data-driven culture with emotion

The challenge is that it's often difficult to sell the workforce on a nirvana that sits somewhere out on the strategic horizon. That's why it's important to shoot for quick wins. The quicker you can produce some evidence that your analytic prowess is working, the quicker hope is reinforced with strong belief. Look for an opportunity to run a pilot, and deploy your best tiger team to get through it as quickly as possible. And don't make your life more difficult than it needs to be: segment your opportunities by impact and ease of implementation; hopefully, you'll have at least one opportunity that has a high impact and an easy implementation. Take that opportunity and move through your pilot as quickly as possible so you can demonstrate — with evidence — how much better life will be when your company is more data-driven.


Meet the 'number one prevalent' new ransomware: Crysis

The strain copies files and pulls them from the network, placing organizations into the "territory of an actual data breach," says one security expert. "Especially in HIPAA-compliant organizations, (that's) an area no one wants to be." It can be hard to keep tabs on these types of ransomware strains, Sjouwerman said. "They compete; they come and go. We were expecting with the sudden demise of TeslaCrypt (a ransomware Trojan) that Locky would take over. But no. "If you look at the majority of ransomware attacks," he added. "Crysis, at the moment, is the number one prevalent attack." These attacks first began at financial institutions, and then moved to healthcare. While the next big target is the manufacturing industry, according to Sjouwerman, cybercriminals still have healthcare in their crosshairs and "this is unfortunately going to get a lot worse before it gets better."


Don Quixote and the Philosophy of Data

“The Don Quixote never getting to the windmill, the truth, isn’t a bad thing,” said Sherman. “It’s that more and more truths or contexts are being applied today, which just means more and more expansive use of data.” When data moves around, and the context in which it was generated is not maintained, meaning gets lost. In the case of business policies, practices such as undocumented hand coding, be it from ETL or application integration, can lead to what Sherman calls “data shadow systems.” It’s the age-old scenario where the left hand doesn’t know what the right hand is doing, and they both go on doing their own thing. The result? Inconsistency and inaccuracy. “The business person who probably does understand policy and business processes doesn’t understand the technology and the data integration and the consistency of data and how to create that,” said Sherman.


Nordic CIO interview: Johnny Bröms, Swedish fast-food chain Max Burger

To maximise the efficiency of Max’s small IT team (eight people in-house and eight consultants), its role has been divided into two distinctive parts: one works with support and operational issues, while the other focuses on project delivery, agreements and compliance. Bröms does not hide the fact that getting the whole company behind business-orientated IT has not been easy. But he sees it as the role of a modern CIO to get involved with other business functions and ensure everybody understands one another. “I have a technical background. My challenge has been to develop the business side so I can speak to the business the way they want and translate that back to my organisation,” says Bröms.


Data visualisation will drive enterprise Big Data analytics usage

Data visualisation technologies would need to keep pace with broader scope and tool set. The industry has already seen some disruptive technologies in the form of Tableau and Qlikview. There are also few upcoming open source tools like Datawrapper, Chart.js, D3 (Data-Driven Documents), Dygraphs and more. But the space still needs more maturity and still aren’t up to creating major shuffles. Another implication is the need for newer processes and skills that allows you in creating better data models. A decade ago, the concept of storytelling through data didn’t exist. Hence, there is an emerging demand for resources with skillsets to create a powerful story. Capabilities including animations, speech bubbles, auto-suggest would be weaved into the visualisation to create compelling propositions. By choosing for expensive data management tools organisations are underestimating the importance of people skills and the imperative to drive them.



Quote for the day:


"One of the tests of leadership is the ability to recognize a problem before it becomes an emergency." — -- Arnold Glasow


June12, 2016

The Commerce of Things is coming to a retailer near you

Personally, I have over 50 connected devices in my house, from toothbrush to lightbulb to wearables, but they’re not monetizing those devices. I spent the $200 for the Nest product but that’s all Nest (gets) in terms of getting dollars from me. With Revolv, customers were spending their $150, but there’s a service behind the scenes of data analytics that essentially – with every customer they’re gaining – they’re also losing money because of the services they’re providing without monetizing. Think of the Oral B smart toothbrush. It’s connected and has the ability to provide feedback on how effective you are in brushing your teeth, effectively gamefying the brushing process.


5 Ways to Improve Agile Team Velocity

An agile team's velocity is based on how the team sizes stories and how many stories and story points they commit to each sprint. Agile's self organizing principals empower teams to make these decisions in exchange for their commitment to complete the stories and having "shippable code" at the end of every sprint. But what happens when management needs the team to accelerate its delivery? What happens if there is a significant opportunity or critical deadline and management wants the team to take on more stories or story points in a sprint? Here are a number of ways management can either help, or influence its teams when this is neede


The evolution of cloud computing

Some of the more interesting developments in server design are coming from the addition of new chips that serve as accelerators for specific kinds of workloads. Much as a GPU inside a PC works alongside the CPU and powers certain types of software, new chips are being added to traditional servers in order to enhance their capabilities. In fact, GPUs are now being integrated into servers for applications such as graphics virtualizations and artificial intelligence. The biggest noise has been created by Nvidia with its use of GPUs and GPU-based chips for applications like deep learning. While CPUs are essentially optimized to do one thing very fast, GPUs are optimized to do lots of relatively simple things simultaneously.


Does Agile Development Need Project Managers?

Change management is the one aspect of running an Agile workflow that is better done by one person looking at the whole environment, rather than by teams. This is also when an Agile manager can really shine, as preparing the team to adjust to new demands is key to maintaining the Agile spirit. A big part of this is also knowing which steps can and cannot be taken while thinking of making a change. It's mostly about balance between what can and should be achieved in a given time and what will simply block the flow, the productivity and the — key here — team's level of satisfaction. To sum up — it's very tempting to think that self-organizing teams need no management at all. But there are too many facets to running business in any way that need careful looking at and direct management.


Central Banks Can't Ignore Blockchain's Obvious Lure

Central banks should embrace blockchain to fight their own irrelevance. "Central banks, just like everyone else, can't afford to be Uber'd," a top Bank of England official, Andrew Hauser, told the SWIFT Business Forum in London in April. What could possibly "Uber" central banks? A supranational platform created by a big central bank, that is first on the blockchain bandwagon, could do it by leapfrogging others to dominate global trade payments, settling in real time and without counterparty risk. But central banks face more than just threats from each other. A de-nationalized system could also "Uber" monetary systems around the world. Denationalized money – such as bitcoin, ether or XRP – is tiny today but it is steadily gaining momentum in far-flung corners of the world. If central banks don't up their game,


Networking the Cloud for IoT - Pt. 2 Stressing the Cloud

Industries and competing companies within those industries will also be forced to weigh the economic impact of paying for this transport and processing. How will these parochial and business-centered decisions drive networking priorities across the cloud? Will all of the high-priority data get through? Will any data be lost? How will you know? If a piezo-electric sensor detects a crack in the drill pipe, will you get the notification, or will it get out-prioritized by the ambient air temperature reading that you get every 10 minutes? Every day, data gets delayed through the Internet and the results are not catastrophic. Tomorrow, though, a stock trade “trigger” could be delayed costing billions. Key economic indicators could be lost that could trigger large economic movements. As with today’s Internet, tomorrow’s IoT will need to ensure that the RIGHT data gets to its destination in a timely fashion.


Ericsson sees a wearable future that’s easy to swallow

The demographic of wearable owners has also changed over the past few years. In the US, the majority of owners are those who are focused on fitness, and range between the ages of 25-34. However, across the globe, new users are younger and less concerned about fitness and health. Overall, ownership of these gadgets has doubled in the past year, but users predict that it will take another year or so for the current market wearables to become mainstream. Stand-alone wearables are likely to become the next big thing. The constant use and need for smartphones makes it likely that smarter, more independent wearables may end up taking their place in the near future, offering the same if not better service than the current smartphones. In fact, two in five users expect that to happen, though it may take some time.


Keys to Enterprise Architecture Success

The strategic theme that underpins the EA practice, and helps guard against failure, is that of ‘running the EA practice like a business, with a clearly-defined solution offering’. Keeping this philosophy top-of-mind – across the entire ambit of people, tools, process, content, and products/services – is fundamental to ensuring that one’s EA practice is business-appropriate, sustainable, and ultimately successful. By running EA as if it is a business in its own right, in support of the enterprise’s strategic goals, the EA capability is positioned to evolve in scope and importance, and add increasing value to the enterprise over time. However, so many EA programmes fail to achieve meaningful results. More often than not, they either end up on the scrapheap of failed IT programmes and wasted investments, or limp along with limited and isolated impact within the broader organisation.


Enterprise Architecture as the CIO's Digital Business Advisory

Enterprise Architects are in the unique position of having a macrocosmic (top-down/company wide) view of the enterprise. The most immediate benefits of this is that EAs have a more clear view of areas of potential risk and disruption. However, the up sides go deeper than that. As well as being able to spot threats, the Enterprise Architect's macrocosmic view of the organization and its systems also provides them with insight into opportunity.  In short, EA's are best positioned to see where a system or process could be improved, re-purposed, or in cases of redundancy, axed. The Enterprise Architect's perspective on the business can inform the CIO of the organizations current, and future state potential through the application of Business Capabilities for example, ensuring resources are spent in the correct places drive the organization forward towards its business goals.


How Fintech Startups Are Changing The Financial Sector

Fast on the heels of technology are changing expectations, and this is the factor that is truly at the heart of the fintech revolution. What these companies intuitively know is that consumers crave the kind of ease of use with their financial transactions that they have when they order an Uber or book a place to stay with AirBnB. Fintech companies were founded on this craving. Taking a single-minded approach to best in class customer service and giving consumers exactly what they're looking for in a simplified way is their most powerful achievement. It levels the playing field against their far bigger and more established competitors, and makes them a viable and attractive option despite their lack of brand recognition.



Quote for the day:


“A star wants to see himself rise to the top. A leader wants to see those around him rise to the top.” -- @Simonsinek


June 11, 2016

An Organization Development(OD) Approach to Agile Adoption

One of the myths about Agile is that people and organizations tend to believe that by practicing a set of activities, such as Daily scrum, sprint cycles, and retrospectives, they become Agile. On the contrary, organizations which want to become truly Agile need to change their mindset. This needs learning to be redefined. ... Agile frameworks go for a organic structure, which is geared for the highly unstable development environments, where teams are geared for constant changes and complexity through less formalization and standardization, flatter structures and less supervision. In reality, not all parts of an organization, can exist as purely mechanistic or organic. The choice of the kind of structure that has to be designed and chosen is based on the need of the environment, which includes the customer, technology and the kind of work the organization performs. 


Telecom regulator Trai seeks stakeholders' views on cloud services

The Telecom Regulatory Authority of India (Trai) on Friday sought views on defining policies, systems and processes for information governance framework in cloud from the perspectives of lawful interception, more so if it is hosted in a different country, and also whether cloud service providers should be licensed. Cloud computing broadly refers to the on-demand or as-a-service model, which provides shared processing resources and data to computers and other devices on demand. ... "With a view to bring out all relevant aspects of the issues and to provide a suitable platform for discussions, TRAI has initiated this consultation paper to engage the industry and all the stakeholders on the key issues," the regulator said


What Are Software Defined Networks?

There have already been some successful deployments of SDN in the technology’s early stages, for example in data centres and for certain aspects of service providers’ business routing. It revolves around the concept of a routing table where specific services can be routed based on pre-defined parameters – for instance, an organization’s cloud-based Customer Relationship Management (CRM) service could be routed over a faster network route during normal office hours, and then the route changed after this time to a standard network. This benefits the organization because they can be safe in the knowledge that their mission-critical systems can operate at high speeds at peak times, and benefits the service provider as they’re able to offer a premium service at a higher cost.


Windows 10 secret settings make your computer run faster and look better

So, here are five secret ways to make Windows 10 work better than the standard version that 300 million people have already downloaded. You have to know where to find these settings to turn them on. Once you do, you'll find that your computer starts up faster than before and it looks better, too. Here's how to turn on these features. See which ones you like. It may be just one, two or all five. First, to get started type "regedit" into your Windows 10 taskbar (lower left-hand corner of your screen). One you're in, you'll click on each folders you want to open (look for a gray right arrow). To be safe, you may want to backup your registry before you change anything. It's easy.


US blockchain industry calls for national licensing regime

Focusing on digital currency industry, Boring outlined that not all companies associated with digital currencies and digital assets are money services businesses (MSBs). “Companies that are involved in developing and deploying digital currency or asset protocols, crypto currencies, or other digital assets, but who are not involved in the provision of money transmission or other MSB activities, are being denied access to banking services in the current system”, Boring added. “the digital currency and digital asset companies involved in MSB activities are similarly being denied access to banking services without appropriate initial due diligence aimed at understanding the actual business model of the companies.”


Let the budget games begin!

A weakness in our security efforts — one we share with most organizations — is in the area of IT or corporate security. It has improved, now that most of our corporate applications are cloud-based or software as a service (SaaS), which means our corporate network is not populated with a lot of business-critical servers. But that doesn’t mean we can disregard basic security hygiene such as patch compliance, endpoint security, network segmentation and secure configuration management. Like many other organizations, we give our users administrative access to their PCs. We try to protect the PCs by using group policies, but users still install third-party programs. That means that besides keeping up with operating system patches and baseline configuration, we also have to stay on top of third-party application patches.


Pair Programming is no Panacea

People that work together have a tendency to think together. Groupthink can be good in situations where you want to build consensus. But it can also be disastrous if you want to tap into the intellectual diversity of a group of people. Certainly, you can pull off divergent thinking in groups, but doing so is fighting gravity. It requires awareness and techniques employed by the group to tease out a broad perspective instead of a narrow perspective. Contrast this with people working alone. The tendency is divergent thinking. Simply because individuals don't know what other people are doing so they can't be on the same page. The longer the isolation, the greater the divergence. These tendencies explain why brainstorming--locking people in a room to devise creative solutions--is often counter-productive. The multitude of minds follow one train of thought, that of the group.


Valuing Data as an Asset to Aid Data Governance

There is no agreement on data valuation as of yet. Some attempts have been made on the subject. One example is a paper authored by Daniel Moody and Peter Walsh. The paper – “Measuring the Value of Information: An Asset Valuation Approach” -- looked at different approaches that had, in part, been previously researched to value information, including the different accounting valuation models based on cost, market value, and revenue potential. Another valuation approach the authors examined, termed ”Communications Theory,” attempted to measure the value of information based on the amount of information communicated. This, they correctly concluded, leaves out the value of the content and is not a useful approach to data valuation. The report concluded that the best cost approximation of data is based on future cash flow. This prediction is reflected in today’s industry trend.


Here's where fintech is heading next

So when do we hit the tipping point? When is there a notable migration to digital platforms? We've already seen how digital disruption has attacked music sales, video rentals, travel bookings and newspapers. It may not be that far away. There is a point where early adopters proselytize, the technology improves, widespread media coverage of the new platforms takes place and somewhere when market share gets into the low teens digital disruption starts to take off. Citi believes that as well. The bank expects the percentage of North American consumer banking revenue that will migrate to digital will accelerate to 10 percent in 2020 and 17 percent in 2023.


Predicting the next Slack: Finding sticky cloud apps with cult-like followings

While it seemingly came out of nowhere, Slack’s meteoric rise was no coincidence. Between its early focus on winning over developers who quickly became incredibly effective evangelists for Slack throughout their respective organizations, and its aggressive moves to integrate with other popular business apps for a more connected experience, Slack provided a distinct model for other business apps to follow. So who is following such a model right now, and what does their growth look like? My team analyzed more than two billion instances (i.e. any activity a user undertakes on a given app — from sharing to downloading to syncing) across more than one million users and 20,000 different cloud apps to answer that question.



Quote for the day:


"Strategy without tactics is the slowest route to victory. Tactics without strategy is the noise before defeat." -- Sun Tzu


June 10, 2016

We’ve Hit Peak Human and an Algorithm Wants Your Job. Now What?

Bank executives know what’s coming. So they’re setting up coder labs and investing in startups, teaming up with digital competitors or buying them outright. JPMorgan Chase, the biggest U.S. lender by assets, is using AI to identify potential equity clients. And it’s marshaling OnDeck Capital’s client-vetting algorithm to speed lending to small businesses. Both Bank of America and Morgan Stanley, which together employ more than 32,000 human financial advisers, are developing automated robo-advisers. More than 40 global banks have joined forces with startup R3 to develop standards to use blockchain, software that allows assets to be managed and recorded through a distributed ledger, to overhaul how assets are tracked and transferred.


IoT in Africa: Still a long way to go

“While machine-to-machine (M2M) opportunities may be limited across the African continent, significant potential for growth exists, particularly in respect to the deployment of M2M energy, utility, and security services,” the IDC report said. “M2M technology is clearly gaining traction in Africa, albeit at a slower rate than seen in the world's more developed markets,” Oluwole Babatope, a telecommunications and networking research analyst at IDC West Africa added in the report. “And while consumer applications for M2M technology undoubtedly exist, enterprises will be the main customers for such services, and thus the main drivers of growth.” The most prolific example of IoT is the ability to deliver and control solar power consumption through the uses of mobile phones like M-Kopa in Kenya. Users acquire solar units and pay for their daily use through mobile money. If payment is not made, the solar unit is automatically disabled.


Google, Facebook, Yahoo, rights groups oppose FBI expansion of surveillance powers

The companies and groups have pointed out in a letter to senators that the new provisions would expand the types of records, known as Electronic Communication Transactional Records (ECTRs), which the FBI can obtain using the NSLs. The ECTRs would include a variety of online information, such as IP addresses, routing and transmission information, session data, a person's browsing history, email metadata, location information, and the exact date and time a person signs in or out of a particular online account. “The new categories of information that could be collected using an NSL and thus without any oversight from a judge would paint an incredibly intimate picture of an individual's life,” according to the letter on Monday. The companies and groups are opposed to two pieces of legislation that are being considered by federal lawmakers.


Data lakes vs data streams: which is better?

Perhaps someone has run an analysis to find anomalies within a subset of the data and has then contributed this analysis back to the data lake as a new source. However, to get the best out of a complex data lake, a data curator is still recommended to create consistency and allow joins across data from different sources. A data stream, on the other hand, is an even newer concept in the general data science world (except for people who use complex event processing engines which work on streaming data). In contrast to deep storage, it’s a result of the increasing requirement to process and perform real-time analysis on streaming data. Highly scalable real-time analysis is a challenge that very few technologies out there can truly deliver on yet. The value of the data stream (versus the lake) is the speed and continuous nature of the analysis, without having to store the data first. Data is analysed ‘in motion’.


Why CTOs have been thinking about intelligence all wrong

It is a difficult question, and many businesses are willing to throw money at the wall just to see what sticks. The truth is, there is a right and wrong way to go about it. Unfortunately, most CTOs are only aware of the wrong way. Here’s where I believe I can help. First, let’s examine the wrong way. Traditionally, companies and CTOs who want to add intelligence to their applications will take a holistic approach, creating what is known as a data lake. This is done because of the need for context surrounding the data gathered from applications — the categorical information about particular points of data. The belief is that by capturing and organizing all data, businesses will be given a full 360-degree view of their users’ preferences, habits, etc. It's a great payoff — in theory.


Welcome to the API Economy

“The API economy is an enabler for turning a business or organization into a platform.” said Kristin R. Moyer, vice president and distinguished analyst at Gartner. “Platforms multiply value creation because they enable business ecosystems inside and outside of the enterprise to consummate matches among users and facilitate the creation and/or exchange of goods, services and social currency so that all participants are able to capture value.” Uber, for instance, is an example of a business built on a platform because it leverages Google Maps through an API to enable its entire business model of matching drivers who have a vehicle with passengers who need a ride. Walgreens offers an API for its in-store photo printing services that enables others to offer photo apps on its platform. It moves from being a photo printer to being a photo platform.


Network Design: How Cloud Apps Can Leave You Holding the Hot Potato

SD-WAN fabric can continuously monitor network conditions of all the underlying physical transports, so nodes can make intelligent decisions for forwarding application traffic in compliance with desired service level agreements (SLA). This completely redefines the notion of “shortest path” as described earlier in the context of hot potato routing. Instead of choosing the shortest path calculated solely by the routing protocols, the best end-to-end path between users and cloud applications is determined using a combination of best application performing paths (likely more than one with active/active approach). Of course the use of BGP is not mandatory and some regional Internet exchange facilities offer other means of exchanging reachability information, but for the sake of our discussion let’s assume a more generic case of using BGP.


Malware: A Complex Threat Calls for Complex Controls

Malware can be challenging to remediate because it comes in an endless number of varieties and a wide range of threats, including low-end scareware, medium-level ransomware, to high-level advanced volatile threats (AVTs) and advanced persistent threats (APTs). Ransomware made the news recently and has become a concern. This sort of infection often starts with a single user and then expands to any drives that user has access to. Once infected, ransomware can end up overwriting very important files, especially if the user has access to a company shared drive. For retail organizations, point of sale malware has also been very common in recent years. We have seen breaches at many major retailers and will likely continue to see breaches in the future.


Datacentre operators warned of public cloud threat to long-term co-location success

Steve Wallage, managing director of datacentre market watcher BroadGroup Consulting, claimed investors are already getting jumpy at how much of a long-term competitive threat AWS and co will pose to the co-location community. "The number one question [we get] from investors is, ‘Will AWS kill that business?’. If not directly, how about on price, because AWS has cut pricing around 40 times in the past five years,” he said. Wallage added that there is already evidence to suggest public cloud giants are weighing up their long-term position on co-location, with some striking multi-year deals that are shorter than they used to be. “They might take much space [now], but for how long and on what terms?” he questioned.


Technologist sees car as one big computer empowering our lives

Imagine driving to work but instead of trying to find a space in the car park, you drive straight into the office and the automated car finds a parking bay itself. Also imagine that the car’s battery powers your entire office. This is the vision that Nissan paints at the FT Future of the Car Summit in London. Electric cars in the future that will power up entire cities with what is known as ‘vehicle-to-grid’ technology – where cars will be able to charge at ‘off-peak’ hours at specific charging points to power homes and other buildings during peak hours. But society and infrastructure in general will slowly be transformed too. Will buses just become ‘big taxis’ in the future? Car Clubs are on the rise with “143,000 car club owners” now in London. These are all changing the way we think about car ownership. Apple just invested $1 billion in a Chinese car-hailing app which some say is a stake in the self-driving future.



Quote for the day:


"The world is made of Circles. And we think in straight Lines." -- Peter M. Senge


June 09, 2016

Why Russia’s CSD Believes Blockchain is a ‘Blue Ocean’ Opportunity

Yakovlev said a cross-discipline working body was soon created to unite NSD’s business leaders and IT specialists into a dedicated blockchain group, a tactic that is becoming increasingly common at major financial firms. From there, he said, five to six proofs-of-concept were proposed, with proxy voting emerging as the choice for the company’s experiments, as it “wasn’t achievable” in a centralized system, Yakovlev said. "The main problem with all e-voting solutions is, first of all, the voter is not able to verify his vote has not been modified before it is processed, or that votes are correctly counted. The transparency of blockchain and its distributed nature allowed us to create a voting process that provides a voter with [the] right tools to address both problems," he continued.


The fintech world beyond Silicon Valley and Europe: Emerging market contenders

Hitherto, most of the investments have occurred in the U.S. and Europe, with a marked exception this year when China’s Ant Financial completed a staggering $4.5 billion raise at a $60 billion valuation, making it one of the highest-valued private companies in the world. This recent raise may draw to emerging markets attention from the world beyond London, New York and Silicon Valley, which importantly house more than 90 percent of the world’s under-30 population. Countries other than the U.S. and U.K. have collectively spawned a range of visibly successful companies in search (Yandex, Baidu), e-commerce (Alibaba,Rocket Internet’s portfolio) and media (Naspers) by mostly applying tried and tested Western strategies to the local know-how. Reviewed below are some of the emerging market contenders across the fintech space.


Robots Are Invading Malls (and Sidewalks) Near You

Robots have been mingling with humans in several stores, too, including a Target in San Francisco, where a robot called Tally was used for a trial in which it trundled up and down aisles carrying out inventory checks—a mind-numbing task for humans. Tally detects when products are out of stock or moved so staff know to replace them. According to Tally’s creator, a startup called Simbe Robotics, it can complete an audit of a medium-sized store in around half an hour, with 96 percent accuracy. The same task would take a human 25 hours, and the company contends people are only about 65 percent accurate. Simbe Robotics CEO Brad Bogolea says that in order to make shoppers feel comfortable with robots wandering around the store, it’s important that the robots don’t look threatening.


Security Threats Hiding In Plain Sight

Almost anyone active online for a few years is likely to have received multiple breach notifications. So many businesses get hacked or reveal data through inattention that the details become a blur. The potential threat posed by insiders is well known, even if employees, contractors, and partners don't represent the most significant threat vector. According to Verizon's 2016 Data Breach Investigations Report, 172 data breaches around the world last year were attributable to insiders and privilege misuse out of 2,260 breaches analyzed. Privacy Rights Clearinghouse's database of data breaches suggests a relatively small percentage of breaches happened as a result of insiders: 13 out of 229 listed from 2015. Since the cause of many breaches is not publicly known, insider involvement could be greater.


Q&A: Indiana CIO Uses Data to Solve Big Problems

Dewand Neely spent more than a decade working in Indiana’s information technology department before becoming CIO in October 2015. He continues the state’s long tradition of hiring IT leaders from within, creating an organization built on stability. Now as CIO, Neely plans to advance the state’s groundbreaking Big Data project — an initiative that aims to lower Indiana’s infant mortality rate — to other areas. With its IT house mostly in order, the Indiana state government has shown the power IT has to improve citizen life. Neely recently talked with StateTech magazine about his top IT priorities, the future of data analytics and the importance of relationships.


Hot security startups to watch

This roundup of 13 such companies that we’re keeping an eye on runs the gamut from cloud security services to fraud prevention to protecting supervisory control and data acquisition (SCADA) and Internet of Things devices. These vendors clearly see the value of assessing the strength of network security architectures. Among them are four startups that simulate attacks against networks in order to test how well their defenses work and to help security staffers get the hang of what it’s like to get hit by a range of exploits and to hone their responses. AttackIQ, Cybric, SafeBreach and Verodin all have variations on this theme but all try to probe networks for vulnerabilities that could be strung together to create successful intrusions.


Silicon fingerprint on chips could make any gadget unhackable

Just as a human fingerprint is only a useful method for identifying someone once you know how to read it, the trick with PUFs has been to harness these production patterns for the purposes of encryption. A signature can be read simply by passing electricity through the chip – and then used to sign a message destined for just one place. But only recently has this technique become accurate and efficient enough to be built into cheap off-the-shelf devices. What’s more, because a chip’s fingerprint is only produced when current is flowing, the system is even more secure than most existing approaches – at least in theory. Securing a device such as a smartphone is usually done using a system based on digital keys stored on a hard drive. But there is a small – yet real – risk of the key being copied, even when the device is turned off. With PUFs, the fingerprint disappears without the current. “When you turn off the power, there is nothing left,” says Kennes.


Your phone may soon sense everything around you

If Tango fulfills its promise, furniture shoppers will be able to download digital models of couches, chairs and coffee tables to see how they would look in their actual living rooms. Kids studying the Mesozoic Era would be able to place a virtual Tyrannosaurus or Velociraptor in their home or classroom — and even take selfies with one. The technology would even know when to display information about an artist or a scene depicted in a painting as you stroll through a museum. Tango will be able to create internal maps of homes and offices on the fly. Google won't need to build a mapping database ahead of time, as it does with existing services like Google Maps and Street View. Nonetheless, Tango could raise fresh concerns about privacy if controls aren't stringent enough to prevent the on-the-fly maps from being shared with unauthorized apps or heisted by hackers.


How to build a thriving information security function despite the talent shortage

There is some hope on the horizon for resolving the talent shortage, with many colleges and technical schools expanding their programs to include security-specific curriculum. Many college students, recognizing the career potential, are taking advantage of those programs. Sadly, this won’t really help for at least a few years. If you manage information security in an organization faced with this talent shortage, you have likely already discovered that there is no easy button. Fortunately, there are some things you can do  ...  Don’t throw money at tools As I said above, the expensive tools generally require a good bit of care and feeding. While they may be useful in augmenting your security effort, they will in most cases make your staffing issues more acute. Buy tools when they are really needed, but take into account the related staffing requirements. Consider paying the vendor to perform installation and maintenance.


Securing Your Car From Cyberattacks Is Becoming a Big Business

RAlong with the relatively nascent automotive anti-malware industry, system security is further endangered because vehicle engineers typically do not use the most state-of-the-art hardware. Instead, carmakers opts for processors that may be a generation or two older in order to ensure reliability and robustness. That older hardware, however, may be able to run up-to-date security systems, which can expose latent vulnerabilities in the hardware, according to Navigant. The need for cybersecurity software is so critical that the Alliance of Automobile Manufacturers and the Association of Global Automakers set up its own Information Sharing and Analysis Center (ISAC), which enables the sharing of data involving cybersecurity.
Such info-sharing groups exist in most major industries, such as healthcare, financial services and aerospace, but until 2014 the auto industry didn't see the need for a cyber security network.ead more here: http://www.kansas.com/news/business/article82676812.html#storylink=cpy



Quote for the day:


"He uses statistics as a drunken man uses lamp posts... for support rather than for illumination." -- Andrew Lang