July 02, 2016

How the internet of things is revolutionizing retail

Not only will IoT technology allow for better visibility, such as identifying within a 10-minute timeframe when goods will be delivered, it can also aid in loss prevention and be used to measure the impact of environmental factors, such as heat, on goods moving through the supply chain, he explains. Damages to goods can be recorded with the exact time and location of the damage, providing an audit trail to identify the responsible party, he says. Automating and optimizing the supply chain is one of the key uses of IoT among retailers, adds Nayyar. “Everyone knows in advance not to run out of chocolate before Valentine’s Day or beer around the Super Bowl, but the real question is how to handle an unexpected surge in demand due to an unscheduled event,” she says.


OnePlus 3 review: The best smartphone in its price range

Looks matter, and the OnePlus 3's design is a big advance. But there's more to the aluminium unibody than just looks. It's a tough material that's reasonably grippy, although downside is that it lacks individuality -- it most resembles the HTC 10 at first glance. The OnePlus 3 fits a 5.5-inch screen into a chassis that's 152.7mm tall and 74.7mm wide. There's almost no bezel at all on the screen's long edges. The handset is just 7.35mm thick and weighs 158g. These are pared-down dimensions, and it's no wonder that the camera lens protrudes a couple of millimetres from the back of the chassis as a result. The high build quality carries over into the side buttons: the power button is on the right edge and the volume rocker on the left, and both are firm and responsive. Above the volume rocker is a welcome feature carried over from the OnePlus 2 -- the Alert Slider.


What is disruptive innovation?

The theory goes that a smaller company with fewer resources can unseat an established, successful business by targeting segments of the market that have been neglected by the incumbent, typically because it is focusing on more profitable areas. As the larger business concentrates on improving products and services for its most demanding customers, the small company is gaining a foothold at the bottom end of the market, or tapping a new market the incumbent had failed to notice. This type of start-up usually enters the market with new or innovative technologies that it uses to deliver products or services better suited to the incumbent’s overlooked customers – at a lower price. Then it moves steadily upmarket until it is delivering the performance that the established business’s mainstream customers expect, while keeping intact the advantages that drove its early success.


3 Steps to Profit With Shared Data Experiences

The cloud is more than just a server; it offers the promise of a deep connection of shared data points centered on individuals and generated by multiple devices, services and platforms. By implementing deep data integration, businesses can see what these users purchased at the grocery store, what movie they saw over the weekend and how willing they were to be interrupted during certain activities. This information requires more than a cursory collection of data points from within a specific application; it demands data sharing between software and devices. Apple is leading the way. Many users don’t realize how immersive iCloud can be, but when it's working correctly, its users can sync bookmarks, notes, to-do lists and even files across their Apple devices. Set a reminder on an iPhone, and it can pop up on your iPad.


When Globalization Goes Digital

Economists and policymakers alike are guilty of glossing over these distributional consequences. Countries that engage in free trade will find new channels for growth in the long run, the thinking goes, and workers who lose their jobs in one industry will find employment in another.  In the real world, however, this process is messy and protracted. Workers in a shrinking industry may need entirely new skills to find jobs in other sectors, and they may have to pack up their families and pull up deep roots to pursue these opportunities. It has taken a popular backlash against free trade for policymakers and the media to acknowledge the extent of this disruption.


What CISOs Need to Tell The Board About Cyber Risk

A quantitative approach to measuring and reporting cybersecurity risks can empower the board and top management to make well-informed cyber risk decisions. By relying on cyber risk data in financial terms, boards can ensure that they are properly informed and understand cyber risks, and thus ensure that the organization is making cost-effective decisions regarding its handling of cyber risks. In other words, board directors, armed with quantified cyber risk data, can make a strong statement about their oversight of this critical domain. While this concept is relatively new in the cyber area, financial institutions and insurers have relied on risk quantification for decades. Using “Value at Risk” (VaR) to measure cyber risks is a concept whose time has come. In 2015, the World Economic Forum (WEF) released a special report entitled “Partnering for Cyber Resilience — Towards the Quantification of Cyber Threats.


Dangerous keyboard app has more than 50 million downloads

"In particular, it was found to be opening up a net connection, and sending some data it was collecting from the phone to a server somewhere else," he said. "The data was the device, manufacturer, model number, the Android version, the owner's email address, all of the Wifi addresses that it could see, the cell network it was on, the GPS coordinates of where the phone was, information about any of the Bluetooth devices it could see, and information about any web proxies it could see." Once the data is collected, it could also be used to create a very deep personal profile of users, shared with third parties, and vulnerable to state-sponsored hackers and criminals. None of this is information that a keyboard app needs to have, he added.


Security researcher gets threats over Amazon review

Getting your internet-connected socket taken over by an intruder isn’t exactly a cybersecurity nightmare — at worst, you might end up with a hacker treating you to a strobe light party as they switch all your lights on and off. There’s also a slight possibility that repeatedly cutting the power to one of your devices might damage it. But this isn’t the end of the world; it’s just a sort of dumb security flaw. This makes the manufacturer’s outsized reaction all the more unusual. Garrett sent me a few of the emails he received from the company. “Just now my boss has blamed me, and he said if I do not remove this bad review, he will quit me. Please help me,” the representative wrote. “Could you please change your bad review into good?” Garrett responded that he would update the review if the manufacturer fixed the flaw. The AuYou representative insisted she would be fired if the review was not updated.


Approaching Lock-In from a Consultant’s Perspective: An Interview with Nicki Watt

At the end of the day, not all cloud providers are created equal! If you only opt for supporting the lowest common denominator, sometimes you can miss out on many other value add features offered by cloud providers. So completely trying to eliminate custom configurations and options is not necessarily feasible. That said, my approach to minimise coupling is more geared around designing solutions and approaches which try to take advantage of a set of modular, API driven tools and offerings, rather than a single one size fits all type solution. I feel that this approach, coupled with sticking to principles such as always separating your config data from code, and looking to automate everything, gives you a fighting chance of being able to swap out different parts of your solution as required, and adapting to changes in the ever evolving cloud space.


How To Contract For Outsourcing Agile

After all, ASD requires a leap of faith — specifications are not clearly defined and there is a pricing model that motivates the developer to charge as many hours as possible. There are variations of the T&M model that can help control costs, such as capped T&M on an iteration or project basis, a ‘holdback’ for each iteration that accrues but is not paid to the developer until the entire project is complete, and a pool or bucket of development hours paid on a fixed basis that the client can spend as it desires. The T&M model is more palatable due to its more client-friendly termination rights. However, there is a huge risk here: once the project is sufficiently far along, the client’s desire to complete the project outweighs the flexibility to easily exit the project. This could create a situation for the developer to gouge the client towards the end of an agile software development project unless there is a cap on fees.



Quote for the day:


"Intelligence without ambition is a bird without wings." -- Salvador Dali


July 01, 2016

Think different: Cognitive computing systems will bring data-led change

Over the years, as business models have changed and the number of data sources multiplied, organizations tweaked their old programs to fit, patching the logic and creating what Hurwitz called "monster systems." Cognitive computing systems, which use hardware or software to approximate human cognitive functions, will change all that, Hurwitz said. The business applications of the future will be based on fast-moving, ever-changing data from an ever-growing number of sources. Gone will be step-by-step instructions based on the past. Cognitive computing learns from patterns and anomalies, makes guesses about what could happen -- and it doesn't assume there is one correct answer. As more data is ingested and analyzed, the system changes, too.


Cloud Adopters Balancing Cost Savings, Security

Among the reasons for outsourcing security operations is the difficulty of recruiting cloud security experts along with a shortage of technical resources needed to run an in-house security operations center, the company argues. A hefty 79 percent of respondents responsible for cloud security said they welcome outside help in running cloud security operations. Their biggest challenges included managing security content, identifying and blunting "multi-vector" attacks and the high cost of cloud security, the survey found. The Forrester survey also found that IT administrators are turning to outside help for capabilities like threat intelligence analysis (83 percent) as they seek to develop real-time threat detection capabilities. Also cited were assistance for securing public clouds (80 percent), overall security operations (77 percent), network security along with data privacy and regulatory compliance (both 76 percent).


The Inventor of the Merkle Tree Wants DAOs to Rule the World

Because DAOs are designed to operate without a leader, the software on which they are based relies on a series of smart contracts that form their method of governance. Though Buterin’s article, entitled "An Introduction to Futarchy", touches on several alternative forms of governance that might one day power a DAO, at its core is the concept of Futarchy, invented in 2000 by Robin Hanson, a George Mason University researcher and chief scientist of Consensus Point, a markets research firm. Buterin reasoned that Futarchy’s form of governance could eventually lead to a new kind of leadership where governance was controlled by increasingly accurate probabilities derived from what are called prediction markets, designed to determine the likelihood that an event will occur and be free from reliance on any single leader.


Despite Mobile App Demand, Enterprise Spending Lags, Research Indicates

In this week's report, Gartner said the percentage of enterprise application development budgets devoted to mobile has actually decreased from last year, although 42 percent of organizations said they'll increase spending on mobile development by an average of 31 percent this year. Overall, mobile accounts for only about 10 percent of total organizational development budgets, Gartner said. These confounding, non-intuitive statistics echo the findings from many earlier studies. Earlier this year, for example, Red Hat Inc. published survey results gauging the state of mobile maturity in 2015. "Over the last two years, almost half of the organizations surveyed (52 percent) had developed fewer than 10 custom mobile apps, with 45 percent creating more than 10," the Red Hat survey said.


Time-Travel Queries: SELECT witty_subtitle FROM THE FUTURE

The CockroachDB implementation of this feature requires that the timestamp be a literal string in a valid time format. We do not support generic expressions or even placeholder values here (sadly1). However, we are able to support schema changes between the present and the “as of” time. For example, if a column is deleted in the present but exists at some time in the past, a time-travel query requesting data from before the column was deleted will successfully return it. This data is kept in the MVCC layer and garbage collected (GC) at some configurable rate (default is 24 hours and configurable by table). Time travel is supported at any time within the GC threshold.


Microsoft to add Enterprise Advantage to MPSA licensing in early 2017

Microsoft is characterizing the addition of Enterprise Advantage for MPSA as "the next step in the development of modern licensing," in the words of Mark Nowlan, Director of Marketing for Microsoft's Worldwide Licensing Programs. MPSA is Microsoft's licensing/purchasing agreement that is meant to enable users to consolidate various licensing contracts into "a single, nonexpiring agreement for all organizations." MPSA was designed to replace software-centric licensing and purchasing agreements with something simpler that would appeal to customers using a mix of Microsoft software and services. With MPSA, Microsoft's goal is to streamline its multiple licensing/purchase agreements down to a single agreement and two options to buy (transactional/buy as you need or organizational-wide),


Prepping for the Big Cloud Conversation

The chief talking point in favor of the cloud should center on competitive advantage. Present the cloud as a strategic decision, and show how it can align with the organization’s goals. Makes the case why this constitutes a new and better way to deliver business services. Focus on process improvements in terms of increased speed and flexibility. And, yes, point out the reduced operating costs--but set expectations and make it clear that the returns on a new cloud infrastructure won’t be realized overnight. In fact, it may take several years before the average company reaches the breaking point and then starts to realize major savings. For the CFO--and perhaps the CIO--that may sound like a bridge too far. So give management a full picture and identify the real costs of migration;


Cybersecurity: Stop the attacker's offense, don’t do defense

Having full visibility into your IT environment and being able to spot compromised machines is critical for stopping the attacker’s offense. To know their environment better than the attackers, organizations must constantly perform reconnaissance in their environment and collect information and analyze it in real time. With this knowledge, an enterprise can control the situation instead of allowing the hacker to dictate what happens.  You want to be able to see all the elements at work in the hacking campaign and cut the attacker’s access to your network at once. Remediating security threats one by one won’t do anything to protect a company. If anything, this method tips hackers off that they’ve been discovered and provides them with time to rework their plan and figure out how to evade your defenses.


Supply Chain Security Must Mimic Enterprise Security

Supply chain security isn’t a one-way street, either, Cheng reminds us. “Be sure that your vendor takes security vulnerabilities seriously. This means that they can demonstrate a rigorous security program that ensures people, engineering, and processes deliver confidentiality, integrity, and availability of your information.” If vendors don’t hold supply chain security best practices to an acceptable standard, supply chain decision makers have the option to walk away and find a vendor who will. Consumers and customers who are affected by supply chain decisions don’t have that luxury. “In general, every time IoT security is compromised, so too is the security of consumers,” says Lucas. “These types of security concerns range from data ownership and privacy to hackers gaining control of our electrical grid. All these risks compromise the integrity of the supply chain and ultimately the quality of products, which can have a huge impact on consumer health and safety.”


Hands-on: NFC-enabled ATMs make it easy to withdraw cash with a smartphone

Using an ATM with Android Pay is almost identical to using the machine with your bank card. But rather than digging through an overstuffed wallet for a piece of plastic, you simply connect your phone to the machine over NFC. After that, it’s the same familiar process: Enter your PIN, grab your cash, and go. NFC payments also add an extra measure of security. First off, the process is quicker—you won’t have to dawdle as you wait for the machine to spit out you card. Second, the card is protected by Android Pay and Apple Pay’s existing security measures, meaning you’ll have to scan your fingerprint or use a pin number or pattern unlock before you can use it. This, in conjunction with your PIN number, makes taking out cash a two-factor authentication process that’s more secure than using plastic.




Quote for the day:


"Be who you are and say what you feel, because those who mind don't matter, and those who matter don't mind." -- Bernard M. Baruch


June 30, 2016

MoneyLion brings traditional banking ever closer to obsolescence

Tim Hong, one of the key behavioral architects of the platform, wants MoneyLion to dream big. Many of the tedious financial tasks we all dread can be streamlined with readily available technology. How can we prevent fraud? Facial recognition of course. Need a verification photo for a loan application? Just take a selfie. “One of the problems we saw in consumer finance was that marketplace lenders were spending lots of money to acquire customers for one transaction,” said Choubey. MoneyLion uses rewards to incentivize users to stick with the platform. The idea of rewards is not new in banking, nearly every credit card offers benefits or cash back. A large variety of data enables MoneyLion to offer a wide breadth of rewards for building good financial habits. Reward redemptions on the platform have been growing at 39% month over month.


5 secrets for writing the perfect data scientist resume

For better or worse, big data has become a “mine is bigger than yours” contest. Employers are anxious to see candidates with experience in large data sets—this is not entirely unwarranted, as handling truly “big data” presents unique new challenges that are not present when handling smaller data. Continuing with the above example, a hiring manager may not have a good understanding of the technical challenges you’re facing when doing the analysis. Consider saying something like this: “Reduced model error by 20% and reduced training time by 50% by using a warm-start regularized regression in scikit-learn streaming over 2TB of data.”


10 Hot Smartphones To Consider Now

Google meanwhile has promised to deliver developer versions of its Project Ara modular phone this fall, with general availability planned for next year. Project Ara has been scaled back a bit -- the CPU, display, and RAM won't be removable -- but it still has potential to change the dynamics of the smartphone market. Other handset makers like LG are already experimenting with limited modularity. If Project Ara succeeds, smartphones may become a bit more open and more conducive to third-party participation from peripheral makers. But Google has to demonstrate that Project Ara phones won't just be bigger and more expensive than smartphone designs that don't contemplate expansion or modification. While we wait, here are nine great smartphones you can pick up today, and one to look forward to in a few months.


Migrating Azure IaaS SQL Server AlwaysOn Cluster to Premium Storage

Microsoft recommends the use of Premium Storage for optimal performance of SQL Server on Azure Virtual Machines. If you are running a SQL Server AlwaysOn environment on Standard storage, you might plan to migrate your environment to Premium Storage. This Step-by-Step guide will describe how to migrate to Premium Storage an existing SQL Server AlwaysOn Cluster built on Azure VM (IaaS), reducing the down time to its minimum. This blog article will cover infrastructures deployed with Classic deployment model. Microsoft recommends that most new deployments use the Resource Manager model.


Faster Payments says 'open access' model ready for take-off

Faster Payments’ commitment to opening up access to its services via its new aggregator model will provide these PSPs with lower cost solutions and more choice. This will boost innovation and competition, enabling PSPs and Fintechs to offer greater payments choices to consumers and businesses, improving their payment experience and driving economic growth in the country.  Things are moving fast and the rising number of aggregators accredited is evidence that there is a demand from PSPs for real-time payment for their customers. The latest organisations to be awarded the certificate of technical accreditation ‘trust mark’ are ACI Worldwide, Bottomline and Compass Plus. They join FIS and PayPort by VocaLink to bring the number of accredited providers to five, with a further three organisations currently in the testing phase required to obtain accreditation.


Brexit: Cloud community mulls over implications for data protection regulation reform

“Brexit is obviously a challenging time and could provide an opportunity for the UK to get data protection legislation that is practical, commercial and pragmatic,” he said. “There are some areas [of GDPR] that don’t work and will be difficult to implement in practice, but we could revisit those to make them a bit more practical and commercial. “The challenge will be to see if Brussels consider it to provide an adequate level of protection. That’s the key thing, because – if it doesn’t – it all falls apart,” he added. Speaking to Computer Weekly, Andy Lawrence, vice-president of datacentre technologies and eco-efficient IT at market watcher 451 Research, said – once the UK gets the process of extricating itself from the EU underway – there may be an influx of legal experts on hand who can help with this.


Public cloud adoption causing some big vendors to stumble

As with any new technology, security is always a worry. In Moyse's experience, the number one concern with cloud revolves around data security, privacy and sovereignty. Data protection is one of the most important aspects of any business, and any weakness can affect the bottom line. "People are paranoid and justifiably so, in some instances, but … it's just like any other change when you are leveraging the Internet," Linthicum says. The concept of moving your business to an unfamiliar environment can make any organization have second thoughts. But "once they've done it once, they're a lot quicker and more receptive to a second or third [cloud service] because … they've felt the benefit[s] and they've overcome that challenge," Moyse says.


Fintech spawns regtech to automate compliance with regulations

Regtech is “the use of new technologies to solve regulatory and compliance requirements more effectively and efficiently,” as the Institute for International Finance (IIF), a research-oriented trade association in Washington, put it in a March report. “I would define it as technological advancement that assists those focused on compliance and regulatory-related activities in their professions,” Kari Larsen, counsel at Reed Smith LLP in New York, and formerly in the Enforcement Division of the Commodity Futures Trading Commission, told Bloomberg BNA. “So making it easier, swifter, more complete, more efficient to monitor compliance and regulatory obligations.” “For many years post-crisis, the only growing area of personnel, of hiring, in banks was in compliance,” Andres Portilla


CIOs combat messaging overload with mobile 'micro apps'

The lack of user-friendly enterprise software gives Sapho a shot at slipping into IT departments at a time when more CIOs are adopting a mobile first mentality to software development. In its 2015 CIO survey, Gartner found that 48 percent of employee-facing applications are being designed with mobile as the primary or secondary consumption mechanism. Sapho's user interface and push notifications will play well with millennial managers who have grown up using consumer-focused web apps from Google and Facebook, says Gartner’s Baker. It's a digital native generation raised on push notifications that interrupt their workflows, if only for a few brief moments. "It fits seamlessly into a behavior that is already well established. And that gives [Sapho] an advantage to go to market.”


Why antivirus programs have become the problem, not the solution

This vulnerability is particularly bad—exploiting the vulnerability requires no user interaction. The vulnerability exists in a default configuration, and code execution occurs at the highest privilege level, if not the kernel itself. According to Ormandy, open source libraries used in the products such as libmspack and unrarsrc had not been updated "in at least 7 years." This problem is not, itself, an aberration, and is not limited to Symantec. Security software necessarily requires high access privileges to operate effectively, though when it is itself insecure or otherwise malfunctioning, it becomes a much higher liability due to the extent to which it has control over the system. These software issues, combined with logistical and political problems in the antivirus industry itself, are making users less secure.



Quote for the day:


"Structure is more important than content in the transmission of information." -- Abbie Hoffman


June 29, 2016

The devil is in the details: The importance of tight processes to strong information security

Policies do not have to be long. In fact, the more succinct the better, so long as they cover the required details. In my experience, they should be quite granular -- single policies that cover a variety of topics are hard to maintain and follow.  Policies are usually augmented by procedures. A procedure defines the specific steps you will follow in the implementation of the related policy, and by their nature should be very detailed. If a procedure is well written, someone familiar with your organization but not a particular function should be able to follow the procedure and complete the function.


How to install MongoDB community edition on Ubuntu Linux

MongoDB is a NoSQL database that avoids the traditional structure of relational databases in favor of document-oriented JSON-like objects. What this translates to is the integration between application and data is faster and easier. If that's not enough, consider this: MongoDB is one the databases preferred by big data and large enterprise companies, including Adobe, Craigslist, eBay, FIFA, Foursquare, and LinkedIn. There are different versions of MongoDB; the version I'll focus on is the community edition. You can easily install MongoDB on Ubuntu from the standard repositories, but that version tends to be out of date. Because of that, I'll show how to install the version from the official MongoDB repositories.


Windows 10's Biggest Controversies

Since the release of Windows 10 last summer, users of Windows 7 or Windows 8 whose computers have Windows Update set to automatically update the OS have gotten pop-up notices telling them to upgrade to Windows 10, and the large installation files for it (which can be about 6GB) have downloaded in the background onto their system’s main drive, usually without the user directly consenting to this. Initially, Microsoft did provide the option to delay the upgrade, and hacks were figured out by users to put off the upgrading and stop the installation files from being downloaded. But Microsoft has become more aggressive in thwarting efforts to block the download by pushing through strongly worded notices that give just two options: “Upgrade now” or “Upgrade tonight.”


Indian Startups Need Lessons from Their Israeli Counterparts

Solving a problem lies at the core of the Israeli tech startups. Outbrain, one of the world’s most successful content recommendation engine, is one such example which highlights the problem solving nature of these active startups. In the words of Ori Lahav and Yaron Galai, founders of Outbrain, the company has solved a complex problem for two business communities. For newspapers facing tough competition from online channels, it helped them develop a significant and sustainable new revenue source in their hard times while for marketers, it provided them with an opportunity to tell their brand story on the internet in a more effective way. By addressing this problem, Outbrain jumped ahead of the curve by coming up with a new business model that solved problems for all parties involved.


BlueData Introduces First Big-Data-as-a-Service Offering

“One of the challenges for organizations thinking about deploying big data workloads in a public cloud is that their data may already be on-premises, and moving it all to the cloud can be challenging, time-consuming and expensive,” says Jason Schroedl, VP of marketing at BlueData. With the latest EPIC release, end users can run big data applications such as Hadoop and Spark on any infrastructure, whether on-prem, public cloud or hybrid deployment. Initially, the offering will be a direct availability program running on AWS, but over time the company plans to make the platform available on Microsoft Azure, Google Cloud and other public cloud services. The user interface and experience remains constant whether customers are using BlueData on-prem or in the cloud, giving the same security and control in terms of how many resources are given to different groups for individual use cases.


Ransomware and Cyber Extortion Are on the Rise – What Can Be Done?

Hardly a day goes by anymore without ransomware or cyber extortion making the news. A seeming turning point in the severity of this crime was the mid-February 2016, cyber extortion of a large Los Angeles hospital chain where a reported ransom of $3 million was originally demanded. Although the ransom ultimately paid was 40 bitcoins (about $17,000, a far cry from $3 million), its payment nevertheless represents a substantial and noteworthy increase from the hundred dollar ransoms that were previously commonplace. Among those taking note are insurers providing cyber coverage, who often will include ransomware coverage in their policies. Since this manner of cybercrime is going to be with us for the foreseeable future, insurers and their insureds are best served by proactively managing, and thereby perhaps eliminating, the harm that may result from a ransomware attack.


A career in Unix: The best and the worst

Of all the work I've done over the years, the one that I miss the most was one in which what I did every day seriously mattered. I was a Unix admin and managed a network of servers and workstations. My users were highly intelligent, dedicated analysts who helped to ensure that intelligent decisions were being made on a national level. At some other positions, I provided an environment that supported development of products that made a difference to many thousands of individuals (e.g., emergency communications), but was so remote from the end product that I never got a sense that I was contributing to something of great value.


'Socially-cooperative' cars are part of the future of driverless vehicles, says CMU professor

The basic idea is that if you program a robot to do some tasks, it may not behave in a way that human beings would normally behave when other human beings are around. You can imagine situations where robots are in a lab and they really don't care, they just get a job done. But things are different out of a lab, when you're in a driving situation. Think about when our car enters a highway from an entrance ramp. We negotiate with nearby cars; if we're close to another car, if it's ahead, we let it go. If we're ahead, it lets us go. If we're close to it, we negotiate with visual cues, and also with speed cues. We speed up in order to indicate that we don't want to yield to the other car. Or, vice versa—they speed up in order to get in front of us.


Decentralizing IoT networks through blockchain

A decentralized approach to IoT networking would solve many of the questions above. Adopting a standardized peer-to-peer communication model to process the hundreds of billions of transactions between devices will significantly reduce the costs associated with installing and maintaining large centralized data centers and will distribute computation and storage needs across the billions of devices that form IoT networks. This will prevent failure in any single node in a network from bringing the entire network to a halting collapse. However, establishing peer-to-peer communications will present its own set of challenges, chief among them the issue of security. And as we all know, IoT security is much more than just about protecting sensitive data. The proposed solution will have to maintain privacy and security in huge IoT networks and offer some form of validation and consensus for transactions to prevent spoofing and theft.


Cybersecurity: Is AI Ready for Primetime In Cyber Defense?

Machine learning is a subset of Artificial Intelligence, a field of computer science that started in 1958 when Marvin Minsky founded the Artificial Intelligence lab. Everyone, including DARPA, was pouring money into it. Their goal was to build a fully artificial intelligence capable of passing the Turing test in fifteen years. However, their plans were overly ambitious, for two reasons. They underestimated the technical difficulty and simply didn’t have enough compute power. When it became clear they weren’t going to meet their goal, funding suddenly dried up and the lab closed. AI became a dirty word. However, AI research continued and went in and out of favor for years. In the 1980s, the Japanese became enamored with AI and started applying it to everything from rice cookers to automated subway trains. But until recently nobody called it AI.



Quote for the day:


"The first responsibility of a leader is to define reality. The last is to say thank you. In between, the leader is a servant." -- Max de Pree


June 28, 2016

A Letter to the Manager: Release the Power of Your Agile Teams

In knowledge work, like software development, there is an almost infinite amount of new stuff to learn and therefore an infinite potential to get more productive. Just using some of this potential will get you far. A team getting together every week or two in a safe space to discuss what works or not will find the most productive ways to work together. A product developed through exploring different possible solutions, will more likely be the one that's even better than you thought in the beginning. One way you can start is to make sure there is slack in the process. By slack we mean time that is not dedicated to specific work and what the time is used for can be decided by either the team or a team-member when the slack time occurs. 


Microsoft-backed Langauge Server Protocol strives for language, tools interoperability

"We developed the protocol based on many learnings and contributions from teams across Microsoft and partners," Microsoft said in a statement. "Visual Studio Code is the first Microsoft product to take advantage of this protocol but in the future other Microsoft products may adopt it as well, including Visual Studio and Xamarin." ... Driving the protocol has been a shift to micro-services and developers writing business logic in any language, Jewell said. Previously, companies such as Microsoft or Red Hat were wedded to a particular language and provided proprietary tooling. "They protected that stack and made it proprietary and guarded it with zealotry that was very intense. All that has changed."


Little Bits of Security – Micro-Segmentation in Clouds

Wouldn’t it be nice if I could create a hardened shell around each one of my applications or services within my datacenter? Opening access to the applications through firewalls and segmented networks that would make your security even more robust? If my outer datacenter security walls were breached, hackers would uncover a set of additional security walls—one for each service/application in your IT infrastructure. The best way to envision this is to think about a bank that has safety deposit boxes in the safe. Even if you broke into the safe there is nothing to take—just a set of secure boxes that also need to be cracked. One of the benefits of this approach is when someone hacks into your datacenter, they only get access to at most one application.


Microsoft’s open source .NET Core and ASP.NET Core hit 1.0

While the 1.0 release of .NET Core is definitely the most important launch today, Microsoft also made a number of other announcements at the Red Hat Summit. The company, for example, is working with Red Hat and CodeEnvy to bring to other tool and language providers the protocol that allows its free Visual Studio Code editor to support more than 100 programming languages already. “This means that any developer can have a consistent, productive editing experience for their favorite programming language on any tool — even if that tool isn’t Visual Studio Code,” Microsoft’s corporate VP for its Data Group Joseph Sirosh explains in today’s announcement. The company is also showcasing a few more of its open-source technologies today, though the demo that will likely draw the most attention is SQL Server 2016 running on Red Hat Enterprise Linux.


Artificial Intelligence Has a ‘Sea of Dudes’ Problem

That's not so surprising, given how few women there are in the field, said Fei-Fei Li, who runs the computer vision lab at Stanford University. Among the Stanford AI lab's 15 researchers, Li is the only woman. She's also one of only five women professors of computer science at the university. "If you were a computer and read all the AI articles and extracted out the names that are quoted, I guarantee you that women rarely show up," Li said. "For every woman who has been quoted about AI technology, there are a hundred more times men were quoted." Much has been made of the tech industry's lack of women engineers and executives. But there's a unique problem with homogeneity in AI. To teach computers about the world, researchers have to gather massive data sets of almost everything.


What the JIT!? Anatomy of the OpenJDK HotSpot VM

OpenJDK HotSpot VM converts bytecode into machine executable code by “mixed-mode” execution. With “mixed-mode”, the first step is interpretation, which converts bytecode into assembly code using a description table. This pre-defined table, also known as the “template table”, has assembly code for each bytecode instruction. Interpretation begins at JVM startup, and is the slowest form of bytecode execution. Java bytecode is platform independent, but interpretation and compilation into machine executable code are definitely dependent on the platform. In-order to get faster, efficient (and adaptive to the underlying platform) machine code generation, the runtime kicks off just-in-time compilation, i.e. JIT compilation. JIT compilation is an adaptive optimization for methods that are proven to be performance critical.


Y Combinator wants to build a tech city, too

More to the point, perhaps, is that a true city is more like an organic entity, growing on its own when conditions are right, than a planned, organized, intentional creation. To date, most attempts to plan and create new cities have turned out to be sterile failures instead of vibrant communities. Cities aren’t companies, where you can hire and fire your way into making sure everyone is on board with the plan. They’re messy, disorganized, contentious places where multiple ideas and goals and cultures ebb and flow according to the needs and desires of the cities’ citizens and would-be citizens. Trying to carefully orchestrate all of that spontaneous confusion and complex energy isn’t just impossible, it’s not a very good idea. Careful command and control in the service of over-arching principles or goals tends to founder on the shoals of residents’ own goals and ambitions. And that’s how most people like it.


Yahoo Wants to Sell Its ‘Chicken Coop’ Data Center Designs

Yahoo plans to structure the potential transaction in a way that will allow it to continue using innovations in the portfolio, including its data center designs, by licensing them from the future buyer. The Yahoo Computing Coop has been a key part of the company’s data center strategy in the US, and it plans to continue using it and iterating on it in the future. “We’ll continue to have access to the Chicken Coop design through our license-back and will look for opportunities to continue to leverage that incredibly efficient design going forward,” the spokesperson said. “Equally, we see value in sharing our data center cooling technology patents as part of the portfolio that we’re divesting, so architectural design and construction firms can leverage that patented technology.”


Fed Agencies Look to Encourage Use of Ethical Hacking In Healthcare

Given the need to improve cybersecurity, Savage revealed to the group that ONC is studying the issue of how the agency can accelerate the rate at which ethical hacking occurs in healthcare. “We are all in this together, and we have to figure it out,” Savage added. “I have no idea at the end of the day if we facilitate more ethical hacking in healthcare whether it will be happening at hospitals or in some lab where the data’s not live. I don’t really have an answer for that today. That’s exactly the kind of thing we’re thinking about.” Dale Nordenberg, MD, a member of the Health IT Standards Committee and CEO of Novasano Health and Science, said that it was exciting to hear that ethical hacking is being considered in healthcare.


McAfee Labs reveals new mobile apps collusion threats

Mobile app collusion requires at least one app with permission to access the restricted information or service, one app without that permission but with access outside the device, and the capability to communicate with each other. Either app could be collaborating on purpose or unintentionally due to accidental data leakage or inclusion of a malicious library or software development kit. ... “Improved detection drives greater efforts at deception,” said Vincent Weafer, vice president of Intel Security’s McAfee Labs group. “It should not come as a surprise that adversaries have responded to mobile security efforts with new threats that attempt to hide in plain sight. Our goal is to make it increasingly harder for malicious apps to gain a foothold on our personal devices, developing smarter tools and techniques to detect colluding mobile apps.”



Quote for the day:


"People often seek and find complexity where there is none" -- Gordon Tredgold


June 27, 2016

BYOD can pose privacy risks to employees

Another worrying feature of MDM platforms is the ability to do a remote wipe. The software can wipe managed apps, or individual apps, or it can wipe the entire phone. "It's something that organizations might want, but it puts personal data at risk," Hafid said. One reason that a company might want to do a full wipe is if employees download company documents to non-managed applications. But it could result in employees losing personal photos and personal messages. "Say you leave the organization and your employer wants to makes sure that there's no corporate data you take with you," he said. "They may wipe the device without notifying you." In addition, many MDM solutions allow companies to restrict smartphone features such as iCloud backups.


Board presentations on IT risk: Don't make these five mistakes

IT leaders fail in their board presentations when they try to use presentations to advance management decisions, such as setting budgets, making investment trade-off decisions, and soliciting guidance on strategic projects. These types of management decisions are the C-suite's job, not the board's. Rather, the board's role is to fulfill its fiduciary duty to ensure risk is managed. This is primarily accomplished by evaluating leadership's effectiveness and ensuring the organization has the right management team in place.  IT leaders who come to their board presentation asking the board to make management decisions about information security are likely to fail. Instead, the best IT leaders ensure that every aspect of their presentation is designed to build their credibility as a leader.


How You Can Improve Customer Experience With Fast Data Analytics

In today’s constantly connected world, customers expect more than ever before from the companies they do business with. With the emergence of big data, businesses have been able to better meet and exceed customer expectations thanks to analytics and data science. However, the role of data in your business’ success doesn’t end with big data – now you can take your data mining and analytics to the next level to improve customer service and your business’ overall customer experience faster than you ever thought possible. Fast data is basically the next step for analysis and application of large data sets (big data). With fast data, big data analytics can be applied to smaller data sets in real time to solve a number of problems for businesses across multiple industries.


Brexit: Uncertainty around funding and skills likely to affect UK tech startups

Christoph Gerlinger, CEO of German Startups Group, said the Brexit was good news for the German startup scene. “We expect a significant decrease in new incorporations in London in favour of Berlin, as well as an influx of successful London startups,” he said. Techspace, a flexible co-working space for tech startups, has expanded to Berlin – a decision which was taken ahead of the referendum. However, its CEO David Galsworthy added that there is “no doubt London will also continue to be a central hub”. Computer Weekly previously reported that Australia has called on UK technology startups to set up shop on its shores, with the promise of government support, a highly skilled workforce and a stepping stone to Asia.


From not working to neural networking

Deep learning comes in many flavours. The most widely used variety is “supervised learning”, a technique that can be used to train a system with the aid of a labelled set of examples. For e-mail spam filtering, for example, it is possible to assemble an enormous database of example messages, each of which is labelled “spam” or “not spam”. A deep-learning system can be trained using this database, repeatedly working through the examples and adjusting the weights inside the neural network to improve its accuracy in assessing spamminess. The great merit of this approach is that there is no need for a human expert to draw up a list of rules, or for a programmer to implement them in code; the system learns directly from the labelled data.


Talking with your hands: How Microsoft researchers are moving beyond keyboard and mouse

“How do we interact with things in the real world? Well, we pick them up, we touch them with our fingers, we manipulate them,” said Shotton, a principal researcher in computer vision at Microsoft’s Cambridge, UK, research lab. “We should be able to do exactly the same thing with virtual objects. We should be able to reach out and touch them.” This kind of technology is still evolving. But the computer scientists and engineers who are working on these projects say they believe they are on the cusp of making hand and gesture recognition tools practical enough for mainstream use, much like many people now use speech recognition to dictate texts or computer vision to recognize faces in photos.


10 Ways Machine Learning Is Revolutionizing Manufacturing

Manufacturers often are challenged with making product and service quality to the workflow level a core part of their companies. Often quality is isolated. Machine learning is revolutionizing product and service quality by determining which internal processes, workflows, and factors contribute most and least to quality objectives being met. Using machine learning manufacturers will be able to attain much greater manufacturing intelligence by predicting how their quality and sourcing decisions contribute to greater Six Sigma performance within the Define, Measure, Analyze, Improve, and Control (DMAIC) framework. ... Manufacturers are turning to more complex, customized products to use more of their production capacity, and machine learning help to optimize the best possible selection of machines, trained staffs, and suppliers.


Step-by-step guide to a blockchain implementation

IT's involvement with blockchain implementations -- and therefore the level of urgency associated with putting this technology into operation -- will to some degree depend on the vertical industry the company is in, with financial services being the most urgent. But as evidenced by Caraher's enthusiasm for blockchain's application to legal services, interest in the technology is widespread. Vendors active around blockchain -- both broad IT vendors such as Microsoft and IBM, as well as niche blockchain suppliers -- say they're fielding calls from virtually all industries. In addition to financial services and legal industries, others include: insurance, utilities, public sector, advertising, healthcare, auditing, supply chain, manufacturing and real estate.


Automotive Grade Linux wants to help open source your next car

The average consumer doesn't know much about Linux and probably nothing about AGL. Truth be told, that doesn't matter. That same average consumer is already using Linux in devices at home and work; smartphones, embedded devices, clouds, chromebooks, etc. And when they purchase a car running AGL, it won't matter that it's Linux; it will only matter that it meets (and exceeds) their needs. AGL will do just that. Linux has already proved how well it can function in embedded systems and smartphones, so there is no reason to think it will not rise far and above what both Google and Apple are doing with their in-car solutions — solutions that cannot fully function without being connected to an external mobile device.


Banking IT community faces uncertain Brexit future

Emmanuel Lumineau, the CEO of Financial Conduct Authority regulated startup BrickVest, a real estate investment platform, said the company might have to move some of its business and people to other EU member states. “Without doubt, the UK is now a less attractive option for fintech investment platforms that want to operate across Europe,” said Lumineau. “Platforms such as Brickvest are typically regulated by the FCA, whose framework allows us, and companies such as ours, to target investors across Europe. “Brexit now means firms will eventually need to find a new regulator on the continent to continue doing business across Europe. Cities such as Paris, Berlin or Frankfurt can offer this. Consequently, BrickVest may have to shift some of our business and team abroad.”



Quote for the day:


"The key to successful leadership is influence, not authority." -- @kenblanchard


June 26, 2016

2 Ways Big Data and Little Data Are the Perfect Couple

Big Data is so in vogue, that it’s at risk of becoming the next “synergy”. Ah yes, all those wonderful hip words used by executives trying to show just how young and hip they are. While executives wear ball-caps to cover up their bald spot, Big Data is bandied around the Board Room. But what’s the point of Big Data if it doesn’t actually drive decision-making in an effective direction? Or, worse yet, it’s used instead of the tried and true set of smaller data metrics that have driven sales teams and marketing departments for generations?  At the risk of showing my bald spot, I think it’s time we look at Big Data for what it is; a fantastic tool that is more than welcome inside the successful company’s toolbox, but not at the expense of smaller data.


Smart contracts: Welcome to a world of automated digital commerce

Blockchain ledger technology opens the door not only to decentralized transactions, but also to smart (that is, automated and computable) transactions and smart (computable and self-executing) contracts that can take advantage of smart transactions. A smart contract is a digitally signed, computable agreement between two or more parties. A virtual third party—a software agent—can execute and enforce at least some of the terms of such agreements. ... Over the long term, the blockchain concept is about creating new entities and processes that can be automated in whole or in part. New blockchain-inspired systems—public, private, or both—will be essential to the growth of the Internet of Things. They will be fundamental to machine-to-machine transactions at scale.


How Open Data Is Changing Chicago

The action of posting data sets makes everything much more transparent and easier to access. In the past, some of this data might have been public in the sense that you could have requested it from us, but now it’s something that you can get on demand. By making data publicly available, I think you change the type of discourse that you have because you’re being proactively transparent, not reactively transparent. Your trust model changes. For example, if somebody came up to you and told you some facts about themselves, about their life, without you even having to ask that question, you would be hard-pressed to call that person reclusive. Same thing here. Proactively publishing information makes it harder to say that the government is being reclusive—and that helps increase trust.


Docker Momentum Mesmerizes and Threatens

“It’s everything you need to go from simple, containerized development to a whole live system that can receive anything from anywhere, anytime that can span multiple service providers and survive hardware failures,” said Hykes, looking trim and peppy in the uniform of the DevOps crowd — jeans and T-shirt. Despite the growing success of Docker — the company is now understood to have a multi-billion dollar valuation because of its expanding use by DevOps teams — there is some anxiety among its technology partners that Docker will wield its growing power to rule the container management space. Even though many of Docker’s tools are open source, its management platform is a proprietary software product that the company is now monetizing with large services contracts.


Don't clear out your cubicle for a robot just yet

“The cognitive era will create new jobs, such as robot monitoring professionals, data scientists, automation specialists, and content curators,” the analysts wrote. “But the transformation of existing jobs resulting from re-engineering a process to use cognitive support -- such as turning low-value data entry work to higher-level analyst or customer-oriented roles -- will be even more dramatic.” The analysts pointed out, for example, that IBM’s Watson cognitive platform can reduce the amount of time that data analysts spend crunching numbers. That means those data scientists should have more time to focus on higher-value tasks, such as interpreting results. Eliminating mundane tasks and giving people more interesting work, should improve both morale and worker retention, according to Forrester.


World’s Fastest Supercomputer Now Has Chinese Chip Technology

"It’s not based on an existing architecture. They built it themselves," said Jack Dongarra, a professor at the University of Tennessee and creator of the measurement method used by TOP500. "This is a system that has Chinese processors." The new machine shows China’s determination to build its domestic chip industry and replace its dependence on imports that cost as much as oil. The world’s most populous country may also try to lessen its reliance on U.S. companies for defense technology and security infrastructure. Supercomputers aren’t major consumers of chips. But being at the heart of the world’s most powerful machines helps processor makers persuade the broader market to consider their technology.


Are Tech Skills Required to Effectively Lead IT Governance?

“Some IT specialists mistakenly think business leaders cannot govern IT, since they lack technology skills.” The article emphasizes that the reality is that no technology knowledge is actually required. “Understanding the capability IT brings or planning new, improved business capability enabled by smarter, more effective use of IT does not require specific knowledge of how to design, build, or operate IT systems.” 4 To further prove their point, the two authors of the article compared this concept to an automobile: If someone wants to operate a taxi service, they need to understand the capabilities and requirements for the vehicles used to operate the service, NOT how to design and manufacture cars. Therefore, effectively leading IT governance does not require IT skills.


How to know if your organization is ready for data governance software

Understanding the specific scenarios where data governance will provide business benefits to your organization dictates functionality requirements, which then help determine which tool category -- or categories -- you should be looking into. You'll then need to either prioritize your requirements or consider acquiring multiple tools. While most vendors strive to provide a full spectrum of data governance support, or partner with others to achieve that, there's currently no one tool that will meet all data governance requirements. Many companies look for tools that support administration of a data governance program and provide workflow and glossary functionality; they then integrate that software with existing data modeling environments.


Chasing Enterprise Architecture Perfection

The balancing of keeping the lights on and innovation is where Enterprise Architecture is supposed to add direction and most often does. Where most IT organizations seem to focus though is on the lower level stacks. Don’t get me wrong, there’s a need for those levels including integration strategy, master data, and infrastructure management; but what if instead, the attention was centered on the business process? If IT could better align with the business needs and objectives, and everyone came to sit at the same table wouldn’t the end solution be a much more effective design? I’ve seen a few companies do this very well, so I realize I’m not presenting a new idea; just trying to emphasize the thoughts for companies who aren’t yet thinking in this manner.


Change As Core Competency: Transforming The Role Of The Enterprise Architect

The mantle of change agent has graced the shoulders of many an enterprise architect over the years, but it rarely fits well. Today we’re finally realizing why. Pushing an organization to move from a problematic status quo to some other more desirable state has never led to organizations that are better able to deal with change overall. Instead, for such organizations, change is a temporary and difficult chore, best finished quickly so that people can go about their business. Instead of being an agent of change, the EA must become an architect of change. Change is all around us, pervasive and ubiquitous. Organizations need to get better at dealing with it, and ideally, leverage both internal and external disruption for competitive advantage.



Quote for the day:


"When someone says you can't, look at where they are sitting. Perhaps they meant they can't." -- Tim Fargo


June 25, 2016

Configure Once, Run Everywhere: Decoupling Configuration and Runtime

Configuration is a common cross cutting concern across all applications. Properties are usually specified as key = value pairs, and are supplied in files that can be loaded into a Java Properties object. Unfortunately OSGI, Spring, Java EE, SE and other frameworks and solution running in Java all provide their own configuration APIs and formats. Many of them use propertiary XML formats, others use more modern formats such as Yaml. Java EE even does not support dynamic or remote configuration in most cases. And combining different frameworks in an application always is cumbersome due to different configuration formats, locations and redundancies. All these add unnecessary complexity and is error prone. And it affects code written for one application, but also has impact on integration with surrounding systems.


Passwords… can’t live with them, can’t live without them

According to CSID’s ‘password habits’ survey (September 2012), 61% of people reuse the same password on multiple websites and 54% of consumers have only five passwords or less. In fact splashdata recently posted a blog that listed the 25 most common passwords and worst offenders. This list took its influence from the major security breach suffered by Adobe in which 38 million accounts were compromised. Here are the top 10. ... When you calculate risk, you take into account the probability of something happening and the impact it would have, if it were to happen. This is simplifying it somewhat, but in basic terms this calculation will provide a risk level. So the fact that 61% of online users are adopting the same password/s across multiple websites and in some cases choosing commonly used passwords, multiplied by the increasing number of data security breaches over the past 3 years, it becomes clear that the resulting risk could be problematic.


Data Mining Reveals the Crucial Factors That Determine When People Make Blunders

The bottom line is that the difficulty of the decision is the most important factor in determining whether a player makes a mistake. In other words, examining the complexity of the board position is a much better predictor of whether a player is likely to blunder than his or her skill level or the amount of time left in the game. That could have important implications for the way researchers examine other decisions. For example, how does the error rate of highly skilled drivers in difficult conditions compare with that of bad drivers in safe conditions? If the difficulty of the decision is the crucial factor, rather than driver skill, then much more emphasis needs to be placed on this. “We think of inexperienced and distracted drivers as a major source of risk, but how do these effects compare to the presence of dangerous road conditions?” ask Anderson and co.


The implications of large IoT ecosystems

“Most people don’t understand the notion of scale,” says Ken Tola, CEO of IoT security startup Phantom. “Effective security needs to provide a realistic mechanism to control millions of devices.” Which becomes a nightmare with current solutions. “Current options rely on internet connections which kill batteries, overwhelm the extremely fragile mesh networks onto which most IoT systems rely and fail completely when the internet goes down,” Tola explains. According to Tola, the solution is to move much of the functionality to the edge, between devices themselves. “Working in a peer-based manner makes it much easier to handle scale,” he says. “No matter how big a system is, when authentication/authorization takes place between devices, it can happen simultaneously across millions of devices without requiring internet access, heavy network loads or any other burdensome features.”


When Do You Need ECM vs. Cloud File Sharing?

In the past few years, cloud-based file sharing and sync services (CFSS) have become quite popular. The rise of consumer-oriented services such as Dropbox and Google Drive is a testimony to their increasing popularity. These services are simple to use, usually require no up-front investment, run off a public cloud, and provide lightweight document and collaboration services. These tools provide useful services for file sharing, multi-device sync, and the ability to work offline using a cloud-centric deployment model. Not surprisingly, many enterprises want to explore whether these relatively newer category of tools could obviate the need for heavyweight, complex Enterprise Content Management (ECM) platforms. I can understand why, because from a services standpoint, the two segments definitely overlap, and indeed in RSG's research, we evaluate them according to the same criteria.


Why banks shouldn’t fear blockchain

Many individual banks are examining and experimenting intensely with the technology on their own as well — but are doing so in an open, collaborative way. At UBS, for example, we set up our blockchain laboratory in the famous Level39 technology incubator in London, where we can rub elbows with over 190 fintech start-ups, sharing our insights and profiting from theirs. We are also working closely with peers on developing blockchain capabilities. With these initial experiments and projects the industry is collaborating on solving some of the smaller, individual blockchain puzzles, in the hope they will provide the pieces needed to one day solve the great puzzle of a blockchain-enabled financial system. That would benefit everyone involved. At the moment it is impossible to say how or when this puzzle will be solved, or what it will look like when it is.


What Must We Do to Fix Broken IoT Security?

Good security is at least half about good management of the product. Yet the consumer technology industry prioritizes the user experience over everything else. If a more secure product requires one more page of user manual to read, or 30 seconds more brain power for the end-user to configure, the increased security benefit is often dismissed. As an industry, we must weight security more heavily when making product decisions. The recently discovered Samsung SmartThings flaws raise some important questions about smart home security. Do these systems really need a mobile app? Does the app need to connect to central server in the cloud? And, most importantly, is it right to have a smartphone control anything that is critical to you? In many cases the app itself is developed not by the smart device OEM but a third party over which they might have little control or visibility.


Johanna Rothman on Agile and Lean Program Management

A more traditional program manager tends to tell people when she needs this done. That is because a more traditional approach works backwards from the deadline to accomplish the deliverables. If you ever worked on a stage-gate program, it’s a mess before the second stage. Requirements take forever. Architecture boxes the program into a narrow place and by the design/spec stage, the people realize they can not work in the architecture. Or, they realize it by the coding stage and the architects are long gone. The technical people work like crazy, and that’s when the program manager has to make crushing decisions: do we reduce scope or testing? We all know what happens: we have a less-useful product that does not work.



Do you want to be a machine learning ninja

Google’s bear-hug-level embrace of machine learning does not simply represent a shift in programming technique. It’s a serious commitment to techniques that will bestow hitherto unattainable powers to computers. The leading edge of this are “deep learning” algorithms built around sophisticated neural nets inspired by brain architecture. Google Brain is a deep learning effort, and DeepMind, the AI company Google bought for a reported $500 million in January 2014, also concentrates on that end of the spectrum. It was DeepMind that created the AlphaGo system that beat a champion of Go, shattering expectations of intelligent machine performance and sending ripples of concern among those fearful of smart machines and killer robots.


Tesla speaks: How we will overcome the obstacles to driverless vehicles

The typical early response to Autopilot is people are a little bit anxious. They're used to a glitchy laptop or a problematic smartphone, and they tend to implicitly extend that experience into the car, and they think, "Man, if my car were to have a glitch like my phone or my computer typically do, this could be really bad." The extrapolation there is not quite accurate, nor is the standards or the bar the same for some of these consumer devices as they are for vehicles. Autopilot obviously won't account for all scenarios, but it also is explicitly designed not to be at the ultra-pedigree state that a lot of consumer electronics devices typically are.



Quote for the day:


"What lies behind us and what lies before us are tiny matters compared to what lies within us." -- Ralph Waldo Emerson