July 12, 2016

Why Microsoft is betting its future on AI

"It's the modern era — you don't have to be an expert in speech and language understanding," Connell says. "Just use our tools. Go build your branded bot with our tools and put it on whatever canvas — it might be Slack, it might be Facebook Messenger. We hope it might be Skype or Windows. But you choose." And with fears mounting among developers that a war could emerge over bot standards, Microsoft has been uncharacteristically diplomatic. It organized a conference in San Francisco in June to promote cooperation among bot-makers. "We're really interested in it being interoperable — we want it to be an ecosystem," says Lili Cheng, a senior engineer at Microsoft who helped organize the two-day event. (It was called Botness.) "It's more like, what are the problems and challenges that we are finding that we can work on together?"


Israeli Fintech Hybrid: Another Block in the Blockchain

Israeli universities are home to a number of Blockchain research pioneers, including Turing Award winner Professor Adi Shamir of the Weizman Institute of Science and Prof. Eli Ben-Sassonof the Technion. In the private sector, as per a recent report by the global consulting firm Deloitte, there are dozens of Israeli startups developing a wide-range of Blockchain technologies, in various sectors including security, hardware, virtual currency, payments, P2P and social platforms. For example, a startup offering a Blockchain solution to eliminate the need for documents in international shipping agreements, an application for secure and validated purchase and storing of goods online, and another creating Blockchain data templates for use by banks and enterprises.


The New Data Scientist Venn Diagram

What is relevant is to understand where an individual’s interest lies in the broad data science church and where the needs of the organisation are. The individual’s interest may be developing innovative algorithms to solve a new problem (the high-end data scientist described by Davenport and Patil), or identifying new business problems that can be solved with existing tools or distributed programming for Hadoop. The key is to match the organisation’s needs with an individual’s interest and not be bothered with the position title or the candidate’s label. Finally, as for finding this rare species, let me point out that the characteristics of curiosity, self-direction and innovation are required in all scientific research. Fashioning tools to overcome a challenge has always been the hallmark of a research scientist. Didn’t Newton invent infinitesimal calculus when the mathematical tools at his disposal were insufficient to calculate the instantaneous speed?


Surge in real-time big data and IoT analytics is changing corporate thinking

"The Internet of Things will enable sensor tacking of consumer type products in businesses and homes," he said. "You will be collect and analyze data from various pieces of equipment and appliances and optimize performance." The process of harnessing IoT data is highly complex, and companies like GE are now investigating the possibilities. If this IoT data can be captured in real time and acted upon, preventive maintenance analytics can be developed to preempt performance problems on equipment and appliances, and it might also be possible for companies to deliver more rigorous sets of service level agreements (SLAs) to their customers. Kelly is excited at the prospects, but he also cautions that companies have to change the way they view themselves and their data to get the most out of IoT advancement.


How to make sure your Hadoop data lake doesn't become a swamp

If Hadoop-based data lakes are to succeed, you'll need to ingest and retain raw data in a landing zone with enough metadata tagging to know what it is and where it's from. You'll want zones for refined data that has been cleansed and normalized for broad use. You'll want zones for application-specific data that you develop by aggregating, transforming and enriching data from multiple sources. And you'll want zones for data experimentation. Finally, for governance reasons you'll need to be able to track audit trails and data-lineage as required by regulations that apply to your industry and organization. This is no simple matter, Henschen writes. In order to complete it enterprises will require a mature set of tools for data ingestion, transformation, cataloging and other tasks.


Is Artificial Intelligence (AI) the next game changer in IT?

IT companies aspiring for a piece of the AI market can collaborate in areas of development with cloud service providers, mobile application developers, IT infrastructure service providers and analytics engine providers. AI applications and platforms need microprocessors to execute complex tasks at speed, cloud computing for low cost processing, data storage of massive volumes of unstructured data and smarter analytics engines with Natural Language Processing (NLP), voice and pattern recognition, machine learning, and mobility for wide spread use from remote locations. IT companies involved in any of these areas can collaborate to tap into the potential that AI offers. In terms of AI adoption; however, it’s still early days. Global organisations are working to understand various classes of AI solutions, where the technology is now, what is on the horizon, and how to convert in the near to long term.


Self-service BI Success Depends Upon Data Quality & Governance

Non-technical workers can make faster, better decisions because they no longer have to wait during long reporting backlogs. At the same time, technical teams will be freed from the burden of satisfying end user report requests so they can focus their efforts on more strategic IT initiatives. In order for self-service BI environments to be effective, they must be extremely intuitive and user-friendly. The majority of today’s business users simply don’t have the skills or technical savvy to work with complex tools or sophisticated interfaces. A self-service BI application will only be embraced by its intended audience if it gives them a means of simply accessing customized information, without extensive training. Here are three factors for organizations to consider before they implement self-service BI for their user base:


ITSM Capabilities: It’s Not About the Processes!

Outcomes are more important than processes. Pearl Zhu talks about Business Capability versus Processes over at Future of CIO. The article is well worth reading; in it, she describes a process as how it’s done, whereas a capability is what is done. In other words – what’s accomplished, or (the outcome). It comes down to this – a process by itself doesn't produce value. Processes produce outputs. What the business is able to achieve with those outputs are business outcomes, and can be measured in monetary terms. In a corporate environment, directors and senior managers are accountable for how they spend the company's money. They must ensure that what the company is investing in produces optimum value for the stakeholders. IT spend is no different. Whatever investments a company makes in IT must be held to that same standard – that of producing maximum value for the organization.


Why You Should't Pay The Ramsomware Fee

There is the issue of being able to trust that this is a single payment that will result in the return of data as promised, but enterprises that are hit with ransomware also experience the hard fact that a hit can make your most critical information inaccessible and in some cases not recoverable at all. “Some people might argue that paying is a viable option at that point,” Manship said. In paying though, they also have to consider whether they can trust the bad guy is going to keep their word. Certainly, this act of holding their data hostage could become a continuous cycle. Manship said, “There is no evidence that decrypting data means they are out of your system. Are they going to give you the key? How many times are they going to try to extort money out of you until they laugh and walk away and you are out of luck?”


Five questions boards should ask about IT in a digital world

The IT organization can no longer be considered just a service provider; how it manages the integration of emerging technologies can help determine the success of a company’s digital strategy. Therefore, simply relying on cost-related measures will not provide a full picture of IT performance. And the CIO’s boardroom presentations will continue to get lost in translation. Boards need to master a second language—one focused on digital themes, such as speed to market, agile product development, platform-based delivery models, and the benefits and challenges of analyzing various forms of corporate data. With a higher degree of digital fluency, boards can help C-suite leaders make better decisions about how to expand a company’s most successful technology initiatives and when to pull the plug on lagging ones.



Quote for the day:


"Direction, not intention, determines destination" -- Andy Stanley


July 10, 2016

Industry Disruption Analysis: A Role for Risk Management

Rarely have we had to anticipate the disruption of whole industries. Normally, disruption applies to the competition between an incumbent and a new entrant, typically one with lower priced, lower quality goods. This disruptive innovation model is burned into many people’s imaginations. It is also why banks have become obsessed with fintech. What Kallasvuo describes, however, is profound change in the very structure of economic activity. These two elements combined — industry disintegration and the restructuring of global economic activity — are the next context for disruption. But how can we understand industry disruption, as opposed to firm-to-firm disruption?


Bitcoin Won't Disrupt Payment Networks, but Changes Are Coming

Citi believes digital currencies could improve settlement speeds, but they require a widespread acceptance that is unlikely. Using currency as a bridge asset slows settlement since it necessitates re-entering fiat rails. Scalability is a major issue for cryptocurrencies as they can only process a limited amount of transactions. Efforts to increase scalability could undermine security features that prevent double spending. Resiliency is another factor. Existing systems are time tested. Bitcoin has only existed since 2009. Regulation is also a factor. A new system will require major efforts to verify regulations to protect consumers. Bitcoin does not support chargebacks.


An Israeli startup is using the ancient art of military deception to trap hackers

Cymmetria puts decoy virtual machines on its clients' networks with real software and real information on them. They also leave "digital breadcrumbs" in other places like passwords and documents that might lead the hacker there to its platform, which is called MazeRunner. The clients know the decoy servers and how they normally behave, so when an attacker finds it and starts using it, they'll know something is up. The same goes for any of the breadcrumbs left, which a normal user on the network would never access. A military unit might set up an ambush to take out its deceived enemy, but hackers who find Cymmetria decoys are neutralized and taken off the network - along with whatever tools and techniques they want to use later.


New Beginnings on Old Bedrock: Linking Mainframe to Big Data

Big Data platform ITOA solutions and business analytics are now the norm. Although the market is evolving quickly and requirements are changing, everyone is doing it. Those who still think it’s still just talk are missing out big time. Most of these initiatives are not started by Mainframe IT, but in companies with mainframes, the enterprise teams are now at the point of implementation where they realize that they need the mainframe data for an effective or complete solution. The broad uses cases that we see include things like real time monitoring of infrastructure or business services, and real-time awareness of access activity to help spot breaches in security or compliance. What these cases, and others, have in common is a deeper contextual analysis that is impossible with traditional, point monitoring tools.


How Data Is Transforming the Health Care Industry

Apps can be used to measure how far people walk in a day, or how many calories they burn or exercises they complete. Digital systems can make it easier for people to eat a healthier diet, and to monitor their blood pressure, weight, heart rate, sleeping patterns, insulin levels, and more. Such data can then be tracked, compiled, analyzed against the results of others, and sent to doctors and other practitioners for monitoring. The information can be used to glean a comprehensive picture of an individual patient’s current health and risk factors. This, in turn, makes it easier for workers to diagnose ailments, and to draw up a tailored health care plan. Predictive modeling can take place too, in order to identify patterns or potential issues that emerge during comparison of one person’s medical files against thousands of other patients with the same genetic factors, condition, and/or lifestyle.


The pivotal role of CIOs in digital readiness: Three principles

Giving responsibility for the enterprise's digital readiness to the CIO, or to any other C-suite role, falls into the same trap as recruiting a CDO. But that's not to say that CIOs don't have a huge contribution to make. CIOs should help their companies define and create frameworks to guide digital initiatives and prepare IT teams to provide support. ... Traditional collaboration processes are typically structured around a single point of contact, such as a business relationship manager, but this setup prevents business leaders from easily accessing the IT expertise they need. Our research at CEB shows that 78% of business leaders want direct access to broader and deeper expertise in IT, so it's no surprise that CIOs are looking for ways to make IT's expertise more accessible and flexible.


Cybercrime Surpasses Traditional Crime in the United Kingdom

The report notes how cybercrime has surpassed normal or traditional crime, in terms of impact. The UK’s Office of National Statistics included cybercrime for the first time in their 2015 annual Crime Survey of England and Wales. The survey estimated that there are 2.46 million cyber incidents and 2.11 million victims of cybercrime in the UK last year. Computer misuse and computer enabled crime accounted for 53% of all crime in the UK in 2015, making it larger than all other kinds of crime. ... Trend Micro actively encourages victims of cybercrime to report these crimes to their local law enforcement or national fraud reporting service, if one exists. If your house was burglarized, of course you would report it. When an attacker uses malware, phishing, and other attacks to steal data from your computer or money from your accounts, why would things be any different?


The Future of Digital Banking is Now

Despite the aggressive competitive environment, the vast majority of fintech firms lack scale and market awareness. While part of this can be attributable to a lack of successful marketing by all but a few of the new entrants, the major hurdles for fintech firms include a lack of capital, no legacy customer base, the trust level afforded legacy financial organizations and the understanding of regulatory and compliance issues by traditional banking firms. As a result, many fintech firms (and legacy banking organizations) are pursuing partnerships. “The fintech companies have the advantage in terms of speed, agility, and the capacity to understand and quickly build a very good user experience. However, they don’t have the legacies that banks have and they have a completely different mindset ...” says the report.


Banking on the Internet of Things: More than Restocking Fridges

"In this connected world, with the proliferation of mobile devices and things like wearables, it means banks have the ability to collect enormous amounts of data," said Geri-Lynn Clark, vice president and head of client services and partnerships at NextAngles, a compliance technology vendor that is part of IT services company Mphasis. "Fifteen years ago, banks would learn about their customers only when they had major financial events, like applying for a mortgage. But the ability to collect data now means banks can offer a much more personalized experience to their customers." Clark, who was the chief information officer for Citigroup's North American retail bank from 2004 to 2007, said the "banking of things" could be the most disruptive force in financial services since the advent of the credit card.


Digital in corporate banking reaches the tipping point

Competition from a cadre of nontraditional-banking entrants is also shaking up the status quo. Players such as Syncada, Ripple and Earthport are carving out a market niche in payments, trade finance, and enterprise-resource-planning integration. Others, such as Amazon and Kabbage, offer loans to small and midsize enterprises (SMEs), and companies such as Western Union and OzForex are gaining share in foreign exchange. Together, they are filling unmet customer needs for real-time, low-cost payments; integrated platforms that link to tax, reporting, and other systems; and quick pre approval and decision-making processes that make financing easier to obtain. Unchecked, their growth risks eroding trade finance and transaction-banking profits. Those slow to adjust may find themselves locked out of certain niches as fast-moving peers with innovative offerings corner lucrative market subsets.



Quote for the day:



"If you don’t have some self doubts and fears when you pursue a dream, then you haven’t dreamed big enough." -- Joe Vitale


July 09, 2016

Why African businesses need to embrace open source software

“The main thing about open source is the community behind the projects, there is always a hive of contributors and reviewers participating in enhancing and advancing the project,” Serem told IDG Connect. “This results in a more feature rich project and more secure as well. There is also the factor of ease of access and usage that comes with open source. Open source licenses are mostly free and flexible.” Serem said that such advantages can push Africa companies in terms of technology deployments. He added that: “Africa being an emerging economy means most companies and governments are not that high up the revenue scale, this can limit their access to certain technologies that enhance their productivity and service delivery due to their proprietary and mostly expensive nature.


Industry Differences in Data Science Roles, Skills and Project Outcomes

The frequency of data science roles varied considerably across industries. Researchers were the most popular type of data scientist in 6 of the 10 industries reported here. The other three data science roles were the most popular roles in the remaining industries. These different industry profiles could simply be a reflection of the amount and type of work that each industry requires of its data scientists. For example, Information Technology was the only industry in which Developers were the most common type of data scientist. Some industries, on the other hand, are driven less by technological innovation and more by insight generation and creative problem-solving in which other data science roles come to the fore including Researchers and Creatives, respectively.


Will Automation and Robotics Lead to a Better Life?

In March, Judy Wajcman, Professor of Sociology at the London School of Economics and Political Science, streamed a lecture on automation and robotics at the Oxford Martin School (University of Oxford) via the 21school channel on YouTube. She talks about a few very interesting aspects of the “Could vs Should” in technology and science fields. I found her takes on how invention and design reflects the shape of a society truly fascinating. Clearly you need to remember it’s not all black-and-white, but there’s a lot of intriguing ideas heres. Interested in the future, in science, technology, design or other forms of innovation? This video will be very interesting for you, enjoy!


Cyber spies are still using these old Windows flaws to target their victims

"Even though the vulnerabilities used in the attacks were patched by Microsoft, the attackers can still rely on a social engineering trick to compromise their targets if they ignore multiple security warnings displayed and agree to enable dangerous features of the document. The content of the malicious PPS is based on carefully chosen, genuine news articles featuring widely discussed geopolitical topics, which makes the document look more trustworthy and likely to be opened. This leads many users to become infected," the researchers warned. Once malicious software has been installed on the target's machine, it sends the attackers Word documents, Excel spreadsheets, PowerPoint presentations, PDF files and any login credentials saved into the browser.


Software is Eating the World(?)

While fintech is not a “hardware” business, which is the main point Elad is making, it seems like a software-enabled, network connected, smart bank account is still just a bank account. A digital wallet is still the same payment information, just on your phone. Just as software-turned-hardware investors have to understand the change in fundamentals, I believe too many founders and investors underestimate the complexities of the financial services system and regulatory environment. You still need a bank account or credit card somewhere to transfer money, regardless of the app/mobile wallet/bot you use. Forward-thinking banks can replicate or acquire customer experience or process improvement technology. However, to truly change the paradigm of financial services, we will need more innovation around the regulatory environment and infrastructure of the system.


Connected Cars World: Auto makers still adapting to a changing market

“The value of the data collected [by cars] will be far more than $10 a month,” he says. Instead, they should be looking at telematics as a way to save money: real-time diagnostics can predict problems and save the driver money, while at the same time help avoid costly recalls. Currently the customer has no idea what kind of data their cars are generating, while the car industry doesn’t understand the value of that data per car. But once they are ready to collect, integrate and offer data in the right way, new possibilities will open up. Fiat Chrysler’s Cavazzini says that once OEMs get a grip on the data, they will be able to “understand the life of the customer and offer new & better services.” Andrew Weil, a Senior VP at Nuance, sees the car a whole new way to interact with people. Rather than merely repeat the smartphone experience, he sees the connected car as an opportunity to manage the whole journey from door to door.


Relational vs. graph databases: Which to use and when?

Start by drawing the domain on a whiteboard. If your domain entities have relationships to other entities, and your queries rely on exploring those relationships, then a graph database is a great fit. Developers find the whiteboard test very convenient to work with because of its adaptability. This ability to adapt is particularly useful as new information about the domain becomes known or changes in requirements cause the model to change. Existing deployments are also potential candidates for introducing graph databases, of course. Again, this is because graph databases can really help improve or even dissolve performance and scaling problems caused by joins. While graph databases can support transactional data with ACID guarantees, data warehouse systems and offline analytical workloads can also be moved into a real-time environment using graph database.


Blockchain: the answer to life, the universe and everything?

The core of the idea is to get computers burning energy in order to prove that they are trustworthy, and stamping that trust on the “blocks” of recorded transactions. You could still lie to the network – but you’d need to burn more energy doing so than every honest participant, combined. Bitcoin was the first technology to use the blockchain, but the currency is now starting to look a bit like the steam pumping engines invented in the 17th century. Yes, it’s ingenious, but the real revolution comes when the underlying technology is used for something altogether new. And so the technology world has fallen over itself to find out what that invention could be. A permissionless, distributed, trust-free network has the power to revolutionise not just financial technology, stock markets and banking, but also the music industry, digital access in some of the world’s poorest nations, and could even ensure your Italian extra-virgin olive oil really is from Italy.


Docker usage rises, but high portability pointless for most

Docker is a sound approach to running and scaling applications. Those enterprises willing to spend money for additional development -- and hire some pricey Docker talent -- will find that it works and delivers on most of what it promises. But that doesn't mean it's a necessary tool. But we're still in the honeymoon stage with Docker -- and containers in general. Docker satisfies many requirements for independent software vendors that are moving to cloud or new application development. Software vendors need to build cloud-based applications that have hardened product-oriented capabilities. Moreover, they value Docker portability because they may have to support all public cloud providers at some point. Applications can be built from the ground up using the container-oriented architecture versus containerizing applications that were not designed for that purpose, making Docker usage attractive for new application development.


Mobile banking: Is it worth the security risk?

Clearly, the big cost is your security. As I've already explained, so long as you remain within the usage constraints of your bank, you should not fall under any undue malice. This same thing applies to any online activity. A nod to caution and common sense will go a long way. However, should you find yourself on the wrong end of a spoofing (or other) attack and a ne'er do well winds up with your account information, you can rest assured (according to this Bankrate post) that most banking and credit card institutions promise to cover 100 percent of mobile fraud loss. Although that is reassuring, there can be a period of time before your bank actually does cover that loss. That means you cannot lean on the bank to make up for missteps when using mobile banking.



Quote for the day:


"Action is not about talking. It's about how you are listened to." -- Bob Dunham


July 08, 2016

Can the evolving CIO role break a glass ceiling for women?

Clearly the numbers are not about ability. They are more likely a reflection of bias, both in advertising and recruiting for senior roles. That’s a tough one to crack but conditions are changing. So what can be done? Inspiring the young is one step. Heneghan believes more needs to be done to promote technology career paths to school pupils and much of this is down to destroying stereotypes by using those female role models as inspiration. Meeting the demands of the evolving CIO role is another step. Businesses can cultivate female talent based on key strengths, promoting a diverse culture and a strategy built on technology business cases rather than nuts and bolts IT management.


Home Computers Connected to the Internet Aren't Private, Court Rules

The judge argued that the FBI did not even need the original warrant to use the NIT against visitors to PlayPen. The Electronic Frontier Foundation, a digital rights group, warned that the ruling is far outside any current legal notion of privacy. The group expects, however, that law enforcement will begin to use the ruling unless it is overturned. "The Justice Department has a practice of carving out novel legal interpretations and then advancing them in court," Andrew Crocker, a staff attorney for EFF told eWEEK. "I would not be surprised if they did try to rely on the idea that they don't need a warrant for this type of hacking." Few people will have sympathy for the defendant, a man who allegedly visited PlayPen and downloaded images from the site, but the precedents in the case could affect everyone, the EFF stated.


Enterprise Business Intelligence vs. Self-Service: It’s Not a Fight

This is the holy-grail question of BI. Enterprise BI tools have historically delivered on the governance front; however, had limited self-service capabilities. On the other hand, data discovery tools have launched a liberalizing platform for users to connect, prepare, and analyze data all on their own but with little governance capabilities. Instead, they rely on storytelling, social media features, and annotations for report creators to share their analyses with background knowledge on how they arrived to their interpretations of the data. While both tools differ in terms of level of governance, it is important to consider their core purpose. Discovery tools are meant for users to conduct data mashups and independently find or create insights while enterprise BI is used for information delivery and monitoring.


12 Ways To Cultivate A Data-Savvy Workforce

"Every employee needs [to understand] what it means to be part of a digital, datacentric organization," said Susan Peters, senior vice president of Human Resources at GE, in an interview. "Whether you're on the shop floor of a manufacturing plant, in a research lab, or at the corporate headquarters, everyone is responsible for a company's shift to becoming data-savvy." Of course, not all companies have GE's vast resources. The company spends $1 billion a year worldwide on employee learning and development alone. Even without such resources, here are 12 things your company can do to effectively attract, build, and retain a data-savvy workforce. Once you've reviewed our tips, tell us what you think in the comments section below. Is your corporate culture ready for a data-driven workforce?


4 ways to make agile and waterfall work together

Whether it’s a consulting engagement or an internal software project, IT departments like the flexibility and productivity of an agile project. But in selling the project to upper management and the finance organization, waterfall concepts will nearly always be introduced as requirements. If you think hard about it, agile and waterfall are nearly contradictory philosophies. So how do you get them to work together? In too many software projects, particularly those involving consultants, it’s a pretty uncomfortable marriage. Unlike the song, opposites do not attract. ... Even though it is common to discover many details after that first phase, these new items are not the project implementer’s problem: they are the consuming or client organization’s problem. They should not be accepted as binding requirements without a change order. Unfortunately, I’ve seen projects that were still in discovery after deployment.


Writing Maintainable Configuration Code

A lot of work has been done to write maintainable code and achieve high design quality in traditional software engineering. Similar to production code, configuration code may also become unmaintainable if the changes to configuration code are made without diligence and care. ... Configuration smells are the characteristics of a configuration program or script that violate the recommended best practices and potentially affect the program's quality in a negative way. In traditional software engineering practices, bad smells are classified as implementation (or code) smells and design smells based on the granularity of the abstraction where the smell arises and affects. Similarly, configuration smells can also be classified as implementation configuration smells, design configuration smells, documentation configuration smells, and so on.


Database architects help scientists deal with data floods

The North American Space Agency (NASA) built a SciDB database that helped it manage and process a mass influx of Doppler radar as part of its study on the intensity and frequency of storms in the US. Since the technology for gathering this data is constantly evolving, the data feeds come in a variety of file formats and levels of detail. Some of the information is measured by the degree, while other sources compare changes in tenths of a degree. Meanwhile, the representation of the data is equally diverse, with grey scale and raw signal data jostling alongside derived data values like precipitation rates and wind speed. Without SciDB, NASA’s scientists would miss the bigger pictures evolving as they’d be too busy writing code that could map the various representations together, says Brown.


The Enterprise Is In An Arm's Race With Cybercriminals

“Attackers use the deep web for anonymized communications that they encrypt over web protocols and for trade in rootkits that they use for nuisance attacks to serve as smoke screens that cover real attacks,” says Professor James Hendler, Director of the Institute for Data Exploration and Applications, Rensselaer Polytechnic Institute (RPI). Cyber hoodlums orchestrate the real attacks using threats such as the latest exploits, APT approaches, and zero-days, which they keep close to their chest while enterprises still have no defense against them. “The current state-of-the-art happens off the deep web because attackers are not willing to share that information. Ransomware for example is extremely sophisticated and these criminals go to great lengths to obscure its source,” says Hendler.


More People Work From Home Now Than Ever Before

The number of people working from home increased from 19% in 2003 (the first year the ATUS was conducted) to 24% in 2015. Concurrent with the findings of the previous surveys on longer hours, the ATUS reveals that the average time employed persons spent working at home on days they worked increased by 40 minutes from 2.6 hours to 3.2 hours. Breaking this down by gender, men who were employed full time reported working from home 3.24 hours on an average day while women working full time said they clocked in 3.44 hours on the average day. Those who earned a bachelor’s degree are more likely to work from home. The ATUS found that compared to less educated workers, full time workers who are college graduates were the least likely to work at their workplace on days they worked (74%), and they were the most likely to do some or all of their work from home (39%).


What EA learned about building successful mobile app infrastructure

Some of the best practices include learning from failure, focusing on user experience, creating a plan and leveraging a platform. This allowed the company to go from a few unused applications to a mobile application factory that made it easy to update apps and deploy new ones. Bendrot said it is surprising how often planning the infrastructure does not get considered in implementing a mobile strategy. EA realized it would be much better to leverage a mobile backend as a service (MBaaS) to allow developers to focus on writing new features. It ultimately adopted the FeedHenry MBaaS platform that was recently acquired by Red Hat. In addition, EA needed a strategy for provisioning new apps. They settled on a mobile application management (MAM) platform from Apperian for managing an enterprise store.



Quote for the day:


"High expectations are the key to everything." -- Sam Walton


July 07, 2016

What is a smart contract and what's it good for?

Like traditional legal contracts that are standardized -- think LegalZoom -- many smart contracts will be standardized. "A very large portion of contracts are not going to be the kind where two parties will end up negotiating the entire contract from scratch," Buterin said. Standardized contracts are expected to be available as templates that users can choose among. Panel members described the wide applicability of smart contracts. Speaking from the perspective of a technology vendor operating within the blockchain ecosystem, Mark Smith, co-founder and CEO at Symbiont, a blockchain software vendor, said: "There are so many possibilities. You really need to put your blinders on and decide: What am I going to be good at? We've decided to be good at financial instruments."


Product Development Mechanisms

The first mechanism is tenets, which are basic principles that we all agree just make sense and should guide our actions. Tenets can be used within multiple contexts for a program. For example, we may have some tenets that help guide what work we do such as the product management decisions we make about whether to undertake an initiative or feature. Other tenets may be used to guide how we deliver software, such as constraints or guiding principles for the development process. The second mechanism is exit criteria, which specify conditions that must be met before moving on to the next activity in a value stream. Exit criteria serve as checklists to keep the team honest about ensuring activities have been performed with sufficient rigor so as to avoid re-work or other undesirable phenomena later in the value stream.


Blockchain Revolution review – Satoshi Nakamoto’s world-changing innovation

Overall, the shift the Tapscotts envisage – from hierarchies to networks, and towards a new era of “distributed capitalism” – sounds appealing. But each of the four examples mentioned above, like the numerous others in the book, raises the same two questions. Is this blockchain revolution likely? And is it actually desirable? In answer to the first question, the Tapscotts acknowledge barriers to adoption, particularly in the chapter on “showstoppers”. As regards the second, they allude to the possibly dystopian consequences as well as the utopian: at one point they suggest that blockchain technology could, if we get it wrong, allow institutions to entrench their wealth, provide a platform for a new kind of surveillance society, and even, together with related technological advances, get out of control and turn against humans.


Cognitive Computing Is Marketing’s Shiny New Object

What’s so disruptive about cognitive technology? To answer that question, let’s go to the source. Clayton Christensen – famous Harvard professor and author – is credited with the original theory of disruptive innovation. Forbes paraphrased Christensen’s work, saying that “disruption displaces an existing market, industry, or technology and produces something new and more efficient and worthwhile. It is at once destructive and creative.” Disruptive innovation destroys inefficiencies in order to create new, more efficient opportunities. Applying this to cognitive – where you transfer the embodiment of human touch points to a system – you can see numerous opportunities to both destroy and create – whether that’s happening at the person, process or product level. We’re going to see new business models created through cognitive systems, new processes that make transactions more efficient and products that alter how we think and interact with technology.


Banks, Financial Services Firms and Insurers Open Innovation Labs in Singapore

During the past years, banks and financial institutions have opened innovation labs in Southeast Asia and most particularly in Singapore to explore emerging technologies. Citi was among the first banks to do so, launching in January 2011, the Citi Innovation Lab in Singapore. Said to be the first lab of its kind to be established in the country, the Citi Innovation Lab in Singapore aims at leveraging cutting-edge technologies to engage Citi’s institutional clients and deliver innovation products. Citi Innovation Lab recently won an award for its Citi Working Capital Analytics solution at the 2016 FinTech Innovation Awards in London. Another front-runner is MasterCard, which launched in early-2012 a MasterCard Lab in Singapore focusing on researching and developing new payment solutions including emerging payments, chip, contactless, mobile and e-commerce.


DAO Attack Fallout Sees Public Blockchains Questioned by Australian Bank

From an operational standpoint, Groves insists that private blockchains will prove to be more “sensible” than public blockchains. “For a lot of what banks need to do, private blockchains are the most sensible and realistic option, and more than that it’s actually a technology that’s been around for quite a long time,” Groves stated. He was pointing to the work of computer scientist Leslie Lamport, a pioneer in the field of distributed systems and computing, decades ago in the ‘70s and ‘80s. Indeed, a lot of private banks, including the major ones from around the world have banded together as a part of the R3-led banking blockchain consortium, R3CEV. Under a common roof, banks, financial firms and investment houses are exploring blockchain solutions for the industry, together.


At W3C Event, Industry Seeks to Weave Blockchains into New Web

It all comes back to identity, said Doug Schepers, a W3C technologist and team contact that organized the workshop. "The reason people are so interested in it is because usernames and password and the existing way identity is done is so flawed and hard to deal with," he said. The idea is that transacting with a public/private key pair over a blockchain is more convenient and secure than today’s username/password identity schemes. Standardizing these identity iterations could move forward at a quicker pace because Microsoft is a powerful member of the browser-focused W3C already. Plus, the vendor has secured a number of partners for its blockchain identity program, and several representatives from Samsung’s mobile browser work spoke with Microsoft at the workshop about joining the identity initiative.


5 Cybersecurity Tips That Can Save Your Small Business

Just like Fortune 100 companies and other large enterprises, small businesses face a constant threat of cyber-attacks and data breaches from hackers all around the world. According to a 2014-2018 forecast report by the IDC research group, 71 percent of all security breaches target small business. The misconception that cyber attackers only go after large organizations to net bigger monetary gains or to steal more sensitive data—such as intellectual property or competitive trade secrets—is simply untrue. Cyber-attacks don't cost very much, so compromising any organization or individual typically results in profit. Moreover, cyber attackers usually go after computing systems they know well, so often times it’s more about compromising a particular technology rather than targeting a specific person or entity.


Facebook OpenCellular: A Baby Antenna Brings Internet to the Boonies

Subramanian sees OpenCellular as something that would allow just about anyone to set up a wireless network, even in rather rural areas. Measuring 19.5- by 8.5- by 4.5-inches, it’s something you could easily carry as you angle to install it on a tree or a telephone pole. “You could wear it like a backpack as you climb the pole,” he says. “Anyone who can climb a tree can put it up.” Yes, the device still requires power and some sort of “backhaul” connection to the Internet—a wireline cable or the like. But Subramanian and team are working to keep power requirements to a minimum, and separately, Facebook is fashioning antennas that could provide wireless backhaul, streaming Internet signals from cities out into distant rural areas. But part of the attraction of OpenCellular is that it can work even when a backhaul connection goes down.


Is the State of Analytics REALLY That Bad?

Seventy-five percent of CompTIA's survey respondents said their businesses would be stronger if they could use all of their data. Conceptually, that makes sense. Practically speaking, it may not. After all, not all data is valuable. A lot of it is just noise so "all" is a slippery slope. Do the survey respondents think they need access to all their company's data or do they actually need it?. Tim Herbert, SVP of Research & Market Intelligence at CompTIA said in an interview that companies can do a much better job with what they have. "Doing more with what you have in some cases is not as interesting as adopting the newest big data tools. The other part is taking advantage of new opportunities. Even small businesses can tap into certain data streams without a lot of heavy investment," he said. In short, "more data" is probably a more realistic desire than "all data."



Quote for the day:


"Great effort springs naturally from a great attitude." -- Pat Riley


July 06, 2016

10 Tools to Help Remote Web Developers Collaborate With Their Team

Since you can’t do face-to-face client meetings, present projects in person, or sit at the same desk as your programming buddy, it’s easy to feel like being a remote web developer has major disadvantages. I’ve found that to be nowhere near the truth. Remote developers are happier, work harder and naturally learn to take advantage of collaborative tools that are more efficient than working side-by-side. ... Remote work is challenging because we’re programmed to need the company of others and communicate face to face. There’s a learning curve when moving from an office to a remote team, but the tools you’ll use are ideal when used with a remote first attitude.


Firmware exploit can defeat new Windows security features on Lenovo ThinkPads

The exploit, dubbed ThinkPwn, was published earlier this week by a researcher named Dmytro Oleksiuk, who did not share it with Lenovo in advance. This makes it a zero-day exploit -- an exploit for which there is no patch available at the time of its disclosure. ThinkPwn targets a privilege escalation flaw in a Unified Extensible Firmware Interface (UEFI) driver, allowing an attacker to remove the flash write protection and to execute rogue code in the SMM (System Management Mode), a privileged operating mode of the CPU. ... The exploit can also defeat the Credential Guard feature of Windows 10 that uses virtualization-based security to prevent the theft of enterprise domain credentials, and do "other evil things."


What is the Best Strategy for Dealing with Ransomware?

To combat the threat from ransomware, companies need to take proactive, preventative steps to reduce risk and to increase their defense of the latest threats. The basic principles of security in IT networks are: training, establishing robust security processes, and making use of new layers of protection to reduce the risk of your network being compromised. To reduce the threat of ransomware, companies should use protection against exploits and ensure that their security solutions include behavioral detection methods. These are all things that an IT service provider should have built into the cybersecurity strategy of their services. Effective disaster recovery plans and business continuity plans must also be in place in case the worse does happen, however.


People Can’t Tell What Apps Use Encryption, And Don’t Really Care, Study Finds

The researchers found that almost 7 percent of the more than 1,500 people they surveyed wrongly believed to be using a secure and encrypted app while, in fact, they were not. Moreover, as the researchers put it, the data they collected suggests that both geeks and non-geeks voluntarily “behave insecurely” when it comes to using messaging apps. “In general, participants were mostly happy with the level of security and privacy their messengers provided, even if they did not know the real security properties,” Google researchers Alexander De Luca, Martin Ortlieb, Iulia Ion, Ben Laurie, and Carnegie Mellon University’s Sauvik Das, concluded in a paper presented at last week’s Symposium on Usable Privacy and Security.


This All-Star Team Plans to Jumpstart 100 Cybersecurity Companies in 3 Years

Hack/secure will operate as follows: Whenever one of the group’s members finds a cybersecurity firm worth investing in on AngelList, hack/secure will contribute up to $250,000 in additional funding. The goal? Nothing short of “protecting the free world,” as Lynch likes to say, through technological innovation and unabashed venture capitalism. “We’re under siege and I think people are distracted,” Lynch says. “Everything runs on software—planes, trains, automobiles, the stock market, utilities—when someone really wants to fuck up the free world, that’s how they’re going to do it.” “We’re not only going to stop that from happening, but innovate and fund companies that can proactively eradicate those threats,” he adds.


Two-factor authentication (2FA): why you should care

Security works in layers. Think of a medieval castle – these castles never relied on just one thing to protect them. They were built in naturally defensible locations, and had strong doors, drawbridges, high towers, heavy stone walls, and more. Even if one of these protective factors failed during an attack, the castle had many other features in place to keep up its defense. The same idea applies when it comes to keeping your information safe on websites and applications you use every day. Cybercriminals are always thinking of new ways to try to obtain sensitive information, so in defense we make sure we have more sophisticated measures in place to stop them. 2FA is an additional layer of security on top of more common methods you already know, like a username and password. The more layers of defense in place, the harder a bad guy has to work to get at your information.


How Big Data Is Changing Disruptive Innovation

Because any new entrant is hard pressed to deliver superior value to a mature market, where products have been refined over decades. But although the low-end approach was pretty common, it wasn’t what was holding incumbent firms captive. It was their own cost structures and their focus on driving marginal profit increases that kept those companies headed down the wrong paths. As long making the right decision on a short-term basis (trying to drive more value out of outdated infrastructure) is the wrong decision on a long-term basis (failing to adopt new technology platforms), CEOs are destined to struggle. Unfortunately, the focus on the low-end approach of disruption is actually clouding our ability to spot the things that are: cheaper, more accessible, and built on an advantaged cost structure.


The Current State of Integration Platform as a Service

RESTful APIS are changing the integration landscape. Having these APIs, not only for SaaS apps, but all apps, makes it easy for everyone to connect and build innovative stuff on top of them. Because of this, MuleSoft has been investing a lot in this area to make it easy for developers to design, find and consume RESTful APIs. We joined the RAML workgroup to help make it easier to document RESTful APIs, and have seen tremendous uptake of the RAML specification. The 1.0 version, recently released, makes it easy to do things that before were extremely difficult. Ever try to write JSON or XML schema by hand? No thanks. Check out RAML data types and you’ll see what I mean. We’re trying to make it very easy for customers to get started defining and cataloging APIs so they can be reused.


Wealth Managers ‘Dangerously Behind’ in Digital Tech Adoption

The research found that wealth management is one of the least tech-literate sectors of financial services; a trend that comes into conflict with HNWIs’ growing enthusiasm in adopting new technologies. 85% of HNWIs are using three or more digital services in their day-to-day lives, and yet, only 25% of wealth managers are offering digital channels beyond email. Over half of HNWIs surveyed believe it is important for their financial advisor or wealth manager to have a strong digital offering – a proportion that rises to almost two-thirds among HNWIs under 45. 47% of HNWIs who do not currently use robo-advice services would consider using them in the future. Meanwhile, two-thirds of wealth relationship managers said they do not consider robo-advisors a threat to their business and repeatedly insist their clients do not want digital functionality.


Connected Insurance: Internet of Things changes Insurance Industry

To begin with, the kind of self- connecting ecosystem that IoT will create in the insurance industry will bring positive effects on all the processes involved, such as better consumer involvement, process optimization as well as preventive care in case of mishaps. With the sensors and ever- efficient gadgets making their way into the field of insurance, insurers will be able to connect the dots as well as mitigate risks much before they reach a threshold level. Internet of Things also makes sure that there is better product development, underwriting, sales, deliveries, distribution as well as claims and services being offered to the insurers exactly as claimed by the insurance companies. In simple words, we can say that the Internet of Things technology will make the concept of insurance and risk management simple and quick for all customers



Quote for the day:


"If your workers are micromanaged, you are killing the intrinsic motivation that you have spent time fostering." -- Rachel Mendelowitz


July 05, 2016

Top tablets with keyboards

The rising popularity of tablets has some people ditching their laptops and desktops for a more portable experience, but the benefits of a full keyboard can still come in handy. The models on this list blur the line between tablet and laptop, usually coining them as "hybrids." The double-life of a hybrid appeases business professionals, students and those who want more PC capabilities in a portable and -- sometimes -- more affordable package. Here are our top recommendations for tablets with complementary keyboard options.


Is your car secure? Maybe not, but enterprise users can still learn something

Ironically - given their brilliant automotive innovations - one example of good security for phones is Google. Sullivan noted how Google aggressively patches the Nexus line. With Chrome OS and the Chrome browser, the Internet giant puts automakers to shame as well. Google updates its software in the background and patches constantly, but the end-user barely notices. Your typical Ford or Buick has nowhere near that level of sophistication for security. Another lesson is related to openness. Mónica noted how the automakers do not report on vulnerabilities as thoroughly and tend to hide behind a curtain, which creates a vicious cycle -- ethical hackers do not get any credit if they find a problem so they lose all incentive to help.


Democratizing Data Takes More Than Just Tech Upgrades

IT teams can’t ignore the cry for data democratization – the broad availability of all the metrics needed to make decisions and measure performance. But the response will not be easy. There are technological challenges involved, of course, but the political hurdles are just as difficult to jump. On both fronts, IT has to lead the way. Technology questions to ask on the way to data democracy Before tackling the thornier political questions that can impede data democracy, IT leaders need to evaluate the technological impediments. ... All of these technology challenges need to be addressed to make data democracy a reality inside the enterprise, but solving them is not enough to destroy the siloes. Many of the walls that separate information were put there by people, and people will need to agree – enthusiastically – to bring them down.


Corporate boards seek more IT expertise, but CIO presence still small

Even if more boards want to add CIOs, they face challenges doing so. Observers say many CIOs lack the experience and expertise to sit on boards -- in particular, boards at the large companies that are the ones currently seeking them out. "They're looking for a business person who has experience with large-scale transformation and has a commercial orientation and governance experience," Banerji said. "They're looking for people who have gone through and faced similar challenges and opportunities and the same scope, scale and complexity as to what they're facing in their current organization. "The challenge is that many operating CIOs do not have meaningful experience interacting with boards," he added, "even if it's just within their own company."


10 cutting-edge tools that take endpoint security to a new level

The best products combine both hunting and gathering approaches and also look at what happens across your network, tie into various security event feeds produced by both internal systems and external malware collectors, work both online and offline across a wide variety of endpoint operating systems and versions, and examine your endpoints in near real-time. The good news is that as these EDR tools become more capable, the sensor or agent that is placed on the endpoint has remained small in size and low in terms of consumed system CPU resources. What is also impressive is that three of the products – ForeScout, Outlier Security and Promisec – are agentless.


3 ways the Internet of Things could help fight climate change

Given the growing number of synergies the IoT creates between different industries, we could see for the first time a simultaneous reduction of industries' environmental footprint, thanks to energy savings and smarter solutions. Even more important is the fact that all those industries have the incentive to increase the adoption of IoT solutions, if they want to keep growing and stay competitive in the global arena. Therefore, the Internet of Things may well be considered a powerful ally in the fight against climate change, precisely at a time when global leaders advocate for more accessible, scalable and economically viable ways to protect our planet. While the disruptive potential of these technologies is quite straightforward, and given the tremendous economic consequences of climate change, the development of the IoT will be also positive


Why Wearables Will Replace Your Smartphone

With the rise of virtual assistants and bots, we'll increasingly talk to our smartphones through wearables instead of poking at their screens. Notifications and updates will be spoken to us through our wireless earbuds. Haptics will nudge and inform us with increasingly sophisticated vibrations. The electronics now used in smartglasses will vanish inside ordinary looking glasses and sunglasses, and we'll use them to take photos and videos with a tap or swipe to see high-resolution mixed- and augmented-reality images. Doppler Labs' Here One earbuds are a great example of the future of all wearables: They're so good they make a smartphone component obsolete. Mixed- and augmented-reality smartglasses will eventually do something similar.


How to use scrum for app development QA testing

Quality assurance (QA) is one area that could benefit from the scrum process. QA often gets short-changed during app development, especially when there are major time to market pressures on applications to get placed into production quickly — for example, the federal government's healthcare database. When QA is done incompletely, or not at all, apps don't end up performing the way they were supposed to perform. ... A pullback of an app from production can be embarrassing —and it can even be more embarrassing if it impacts customers. This is exactly what scrum at the beginning of the development process was designed to prevent—and also an excellent reason for application development managers to consider extending the reach of scrum beyond just app design and prototyping, and into the frequently neglected areas of app QA and checkout.


When intelligent algorithms start spoofing each other, regulation becomes a science

Amicangioli said the probability going forward that there could be unintended AI outcomes is high. From a regulatory perspective, the net behaviour as analysed, could be deemed to be bad, but the author could be deemed to be completely blameless. Much was made of the fact that market regulators were eons behind the complexity that precipitated the 2010 flash crash. So what can regulators do to evolve in a ML markets environment? "I don't believe the government or regulators could ever just hire teams of scientists and compete. These hypothetical problems I have outlined may be around the corner; I don't think they exist today; I could be wrong.


Android is imploding, and there's nothing that can be done to stop it

This is a classic case of too many hardware makers and not enough customers. And while Sony ceasing production in Brazil is down to a number of factors - although the word is that sales in that region didn't pan out as expected - Dell's exit and LG firing executives are both purely down to sales. And it's not because Dell and LG didn't make good hardware. The Dell Venue 8 7000 is probably the best Android business slate available (even if the name is a mouthful). But the tablet market is contracting rapidly, as consumers turn away from pure tablets in favor of 2-in-1 devices. The eagle-eyed among you might have noticed how few tablets were on show at CES this year, and how Google really downplayed tablet features in its new Android



Quote for the day:


"Distilling truth from overwhelming amounts of information is the essence of leadership." -- Carly Fiorina


July 03, 2016

Four Ways CFOs Can Add Value to IT Strategy

When it comes to technology purchasing decisions, a CFO should ask how a solution mitigates risk to the business. For example, a company may be running on infrastructure that is end of life and no longer supported by the vendor. The CFO, along with the CIO, needs to assess whether deferring investments to upgrade is an acceptable risk. One would want to make sure that mission critical applications are not running on platforms such as Microsoft Server 2003, which has stopped support some time ago. When selecting a disaster recovery and business continuity solution, a CFO should be a major part of the evaluation. The Recovery Time Objective (RTO) is an important component of these solutions, especially since the cost of downtime in a catastrophic situation is quantifiable


AI experts weigh in on Microsoft CEO's 10 new rules for artificial intelligence

Why would we want the second kind? Because if ever they do NOT work (and no AI is perfect), we can *understand* why and fix the problem. Especially for mission-critical systems, we must choose transparency. We must to be able to introspect our AI, so that if something unexpected happens, we can debug and fix it. Transparency means control. The UK principles of robotics also have a transparency rule. Nadella also says, that empathy, which is so difficult to replicate in machines, will be valuable in the human-AI world. I agree. A study from the University of Michigan shows that college kids are 40% less empathetic than their counterparts 20 to 30 years ago. We have a responsibility to think about our whether our technology will deteriorate or improve our empathy.


How government bodies can unlock the power of digital

Working in what can be a fragmented environment with legacy infrastructure adds to that challenge. So how can central and local government organisations make the move faster to effective digital citizen engagement, while at the same time providing a more cost-effective and ultimately better service? Given the pervasiveness of smartphones and the use of messaging channels in today’s society, mobile devices are vital for effective citizen engagement, using the right channel aligned to people’s preferences. Today’s citizens can be reached on a range of interactive channels including SMS, Facebook, WhatsApp, Skype and Twitter, as well as voice. And because one or more of these channels are supported by every mobile device, government groups can connect with people in a quicker and more inclusive way by utilising the right technology to manage multiple channels under one framework.


The big data explosion sets us profound challenges - how can we keep up?

the use of data raises important ethical questions about privacy. The 1998 Data Protection Act now seems distinctly archaic in the face of such abrupt technological advances, and there is understandably a balance that must be struck between public benefit and individual privacy in relation to the use of big data. While personal data remains a small proportion of big data, the public’s justifiable suspicions and concerns must be addressed in policy, with safeguards for their security set in statute. I was personally quite shocked when given a demonstration of readily available popular software which was able to link voter details with their Twitter and Facebook profiles. With most people unaware of the risks, it is far too easy to know far too much about very intimate details of people’s lives.


IoT: Changing the Foundation of Your IT Strategy

Harley Davidson is an example of a company that has employed IoT to increase both sales and overall efficiency. Every piece of equipment in its York, PA plant is now connected to the internet. Its software allows for both reactive and predictive analytics so that if a machine begins to overheat, the system can make real-time adjustments to compensate. At the same time, cost efficiencies are constantly updating, allowing for increases in the speed of production and delivery. Some experts are estimating that between 2013 and 2020, this growing business trend will result in a 25 percent decrease in connectivity costs. Businesses that operate with IoT-focused philosophies can expect to not only lower operating costs and increase productivity but also to expand their markets and develop new products. This is the powerful crossroads of personal sensor tech, business integration of IoT, and the updated systems to support them.


Build your Android applications in Visual Studio using Gradle

Gradle provides flexibility as well as the ability to define common standards for Android builds. Gradle allows Android developers to use a simple, declarative DSL to configure Gradle builds supporting a wide variety of Android devices and App stores. With a simple, declarative Domain specific language (DSL), Gradle developers can easily describe and manipulate the build logic (e.g. manifest entries – minSDKVersion, targetSDKVersion etc.), use the built-in dependency management via Maven or Ivy and essentially have access to a single, authoritative build that powers both the Android Studio IDE and builds from the command-line but this ability to use Gradle in Visual Studio has been missing until recently.


Google Opens Faster Big Data Pipe Between US and Japan

"Ten terabits per second is a lot of capacity, but it's consistent with Google's current bandwidth consumption," Blum told TechNewsWorld. Because tech companies need to transport so much data around the world, it makes sense for them to invest in the infrastructure, and cable still has advantages over other technologies when crossing the seas. "Major Web services companies -- like Google, Facebook and Microsoft -- are investing in transoceanic cables, as well as domestic fiber capacity, because their internal data transport needs are on the same scale as major telecoms companies," Blum pointed out. "In fact, the distinction is becoming increasingly irrelevant. When you send a message via Gmail or respond to a Facebook post from the other side of the world, it's transported primarily on internal networks," he said.


The rise of the revenue-generating CIO

CIOs can craft new businesses within their existing organization that contribute to their company's earnings. In fact, the proliferation of data is the primary driver behind the revenue-generating CIO. Today's CIOs can use data to create better products, new products and services, more targeted marketing programs and a better customer experience, according to Ashley Stirrup, CMO of Talend. ... "As data has become more malleable, more prevalent and more accessible, there is now an opportunity to use it in products that can help drive growth for a company and it's a great idea to move in this direction," said Christian Carollo, co-founder and CTO of Dropoff. "It's about creating efficiencies and directionality for those people in the company tasked with moving the ops and sales forward."


The Age of Artificial Intelligence in Fintech

The fintech sector is starting to use artificial intelligence in several ways. Most recently, the California-based robo-advisor, Wealthfront, has added artificial intelligence capabilities to track account activity on its own product and other integrated services such as Venmo, to analyze and understand how account holders are spending, investing and making their financial decisions, in an effort to provide more customized advice to their customers. Sentient Technologies, which has offices in both California and Hong Kong, is using artificial intelligence to continually analyze data and improve investment strategies. The company has several other AI initiatives in addition to its own equity fund. AI is even being used for banking customer service. RBS has developed Luvo, a technology which assists it service agents in finding answers to customer queries.


From technology first to business first: It's time for the IoT to get strategic

By deploying processing capacity at the source, data can be executed at the edge, in context with other local data if required, and the actionable insight shared with the central resource. This model is cost effective; it leverages existing infrastructure and investment and, most notably, provides a platform for incremental expansion of IoT. And this is key; while IoT standards are still to be defined, a strategy that includes interoperability with other IoT platforms will ensure an organisation can evolve and leverage one infrastructure to deliver a set of applications at a scale and pace that suits the business. As organisations increasingly look to extend their use of IoT, it is becoming essential to recognise the underlying business opportunity.



Quote for the day:


"Sometimes people don't want to hear the truth because they don't want their illusions destroyed." -- Friedrich Nietzsche