Daily Tech Digest - November 09, 2016

Companies will 'get serious' about AI technology in 2017

CIOs will have to determine where to place their biggest bets -- either on AI technology or skills. Open source libraries from the likes of Google and Facebook make AI cheap and accessible, but the talent needed to leverage these libraries doesn't come cheap, Davenport said. At the other end of the spectrum is IBM Watson. Davenport called it "the big, high-price and, in some ways, high-risk option because they really want to sell it for transformative applications." In a recent Harvard Business Review article, Davenport explained that IBM helps assess where the cognitive technology will make the biggest impacts and provides consultants and researchers to help companies get there.


Docker, machine learning are top tech trends for 2017

For Docker, PaaS, and microservices, developers see containers as a self-contained process and the PaaS as the common deployment target, using microservices as the common style, according to ThoughtWorks. "What we're seeing today is the level of abstraction is being raised up," Mason said. In the previous paradigm, a process ran only on a machine. "Now, we think about a Docker image as that basic unit of work and computation," and APIs and microservices serve as a communications fabric. Intelligent empowerment, meanwhile, has companies frequently open-sourcing sophisticated libraries and tools that would have been "stratospherically expensive" and restricted a decade ago, ThoughtWorks said. New tooling has been made possible by commodity computing and targeting of specific hardware like GPUs and clouds.


Gaps starting to close in cyberinsurance policies

Some insurance companies are trying to fill the middle ground. One example is Willis Towers Watson, an insurance brokerage that recently announced its CyFi plan—that's short for cyberinsurance and fidelity, vice president Peter Foster explained. Fidelity bond is insurance-speak for a crime policy involving the theft of money. A client of Foster's in the financial field nearly lost a large sum when one of their corporate officers was asked to surreptitiously transfer money online, which inspired Willis to expedite its product offering, he said. That wouldn't have been covered in a standard cyberinsurance policy. "They managed to stop it in time, but it's what got them concerned," Foster said.


Changing IoT Passwords Won't Stop Attacks. Here's What Will.

The solution is to ensure security throughout the IoT environment — from the manufacturer, through the supply chain, into the home setup process, and on through the connection and integration a device has with other devices and apps such as Wi-Fi routers and cloud services. The initial process by which a device is brought into the home, how it's added to the home network, how it's configured, and how security credentials are established will determine the security and privacy of that device over its life cycle. The current reality is that these processes don't implement many security best practices or standards. The industry should take this opportunity to determine a set of best practices and security technologies for this key piece of device life cycle. This will take an industry effort, not just a public service announcement to consumers. And it won’t happen overnight.


Robots Present A Cyber Risk

First, these machines are generally integral to assembly line operations and other similar activities, Overly says. “An attack could literally bring a manufacturing or assembly plant to its knees,” he says. “We have seen this very outcome in a ransomware attack targeted at robotic assemblers in a plant in Mexico.” In that case, the ransomware locked up the specifications files from which the robots drew their operating parameters, he says. Second, robots are generally large and capable of causing significant bodily and property damage if operated other than in accordance with their specifications. “If the subject of an attack, the machines could cause dramatic harm, both to individuals and to property,” Overly says.


The Serious Fun of Shared Experiences at Work

Once a team is formed, ongoing shared experiences continuously elevate its performance. Shawn Achor, a happiness researcher and former Harvard professor, studied NFL teams and elite military units, investigating why high-pressure situations cause some teams to perform at a high level and others to fail. Achor’s findings suggests that the critical difference was the way in which the teams viewed stress. When stress is combined with meaning — for example, trying to win a Super Bowl — teams performed better. This link to purpose is underscored by the classic teaming theories of my colleague Jon Katzenbach, who proposes, in The Wisdom of Teams (with Douglas K. Smith), that shared purpose is one of the elemental basics that must be in place for a team to perform.


5 flavors of hybrid cloud transforming the enterprise

Public IaaS providers let you have it your way, so you can come very close to duplicating your on-premises environment in the public cloud and make one an extension of the other using a secure virtual private cloud, where cloud resources reside in a virtual network hosted by the provider. Customers choose workloads or environments that would most benefit from cloud extensibility—dev and test, analytics, or even core line-of-business applications that need to scale. ... The idea of “burst” capacity, where a private cloud acquires additional VMs from a public cloud in response to spikes in demand, got a boost with the recent deal between VMware and AWS, in which the entire VMware software-defined datacenter stack will be available as a service on AWS next year.


Security risks from the internet of things

As awareness increases, some “smarter” IoT devices can be brought up to current security standards with periodic firmware updates. While it’s a start, the majority of internet-ready devices cannot be integrated into the conventional IT hardware or software protections with which companies protect themselves against internet-based attacks. The variety of new internet-ready devices brings a mass of new data traffic to the network that must be managed and secured by IT departments. But it’s complicated by the variety of network protocols used by all of these various device types. The consumerization of IT is another factor due to the increasingly permeable borders between devices for personal use and those for business.


Future enterprise companies will be run by robots

Volkswagen has already utilized ML to predict future sales performance, depending on release date, vehicle type, area, and accessories. The CIO says the use of such technology has so far been a "stunning, surprising success," with machine-based sales predictions reaching accuracy levels of up to 90 percent -- whereas human predictors can only manage an average of 60 percent. It may also be that one day, these bots will be smart enough to automatically approve financial decisions based on cost control. Finally, Hoffman says that bots will also be used in decision making and execution. These "Mr. Know-it-all" bots will be used in team management, scheduling, time planning and the automatic management of corporate documents. Do these future applications mean that robots will be taking over all of our jobs?


HTTP Benchmark and Pipelining

Now, the problem is that this is really expensive. As in, wowexpensive. So pretty much as soon as the web started to hit it off (mid-90s or so), people realized that this isn’t going to work, and the notion of Keep-Alive was born. With Keep-Alive, you are going to reuse the same TCP connection to send multiple requests to the server. The idea is that once the connection is open, there is a strong likelihood that you’ll use it again soon, so why pay the 7 packets cost for opening and closing the TCP connection? And the more requests we make to the server, the better we are. Now, there is another trick that we can apply here. Remember that TCP is stream oriented, not packet oriented. That means that as far as the calling code is concerned, we aren’t actually seeing packets, just bytes arriving one after another.



Quote for the day:

"Talent is a dreadfully cheap commodity, cheaper than table salt. What separates the talented individual from the successful one is a lot of hard work and study." -- Stephen King,


Daily Tech Digest - November 08, 2016

Cloud-Based Network Analysis Drills Down To Users And Apps

"The applications have never been in the domain of the network guys," said G.T. Hill, Nyansa’s director of technical and product marketing. Voyance+ will give them eyes in that realm, helping them investigate and solve specific user complaints, he said. The software can identify 218 applications so far, Hill said. For some, like Skype for Business and Cisco Unified Communications Manager, it uses APIs (application programming interfaces) for specific kinds of measurements. For some applications, including SaaS offerings, it uses third-party software to get application signatures. Nyansa can also identify custom enterprise applications as long as it has information like server names, Internet Protocol addresses, and TCP port numbers.


Smartphone Security: Technologies Protecting Your Personal Data

It was very well understood from the beginning that fingerprints will have issues – the efficiency and reliability of fingerprints get affected by age and occupation. Fingerprints are known to not work for women or children with soft skin and older people who have brittle skin. Fingerprints for people in manual labour get wiped out or get damaged, hence do not match affecting the efficiency and reliability. Iris, being a protected internal organ, does not get affected by external conditions, does not change with age or occupation. Hence, it is more efficient and reliable. With respect to response time, the current devices that have been used have certain technological limitations that force subjects to stand at specific distance and sensitive to motion etc.


Cloud Infrastructure Spending Is Increasing, but Is Cloud Adoption Jumping as Well?

Despite this growth in spending on IT infrastructure for the cloud, it’s unclear if cloud adoption is growing in tandem. An online survey of 500 business and IT executives conducted earlier this fall by industry trade group CompTIA found a broad decline over the past two years in the reported use of cloud-based apps, the Wall Street Journal reports, noting a decline in the use of business productivity, email and analytics tools; and collaboration, customer relationship management, enterprise resource planning and expense management apps. CompTIA’s survey found that the number of companies running cloud productivity tools this year fell to 45 percent, down from 63 percent in 2014.


Mobile is becoming the baseline for all branded digital experiences

For brands hoping to capitalize on all this, Ask recommends that they get started now on building those experiences, which will depend on agility, continuous learning and automation to succeed. To that end, Ask predicts that we’ll see three particular trends in 2017. First, consumer app fatigue will push enterprises to build a portfolio of mobile experiences to serve customers, as well as reinvest in their owned mobile moments with renewed investment in the web to support that breadth. Second, as mobile becomes more mission-critical to their business, enterprises will take more ownership of designing mobile experiences rather than outsourcing mobile-related projects to third parties.
 writes


What’s Next For IoT Security?

One of the big problems with security is a lack of consistent and current standards. Standards that do exist, such as Transport Layer Security, do little to secure a device such as a surveillance camera or a connected entertainment system, which the U.S. Department of Homeland Security identified as the culprits in the Dyn DDoS attack. Homeland Security Secretary Jeh Johnson said in a statement last month that his department has been “working to develop a set of strategic principles for securing the Internet of Things, which we plan to release in the coming weeks.” Still, even if everything works as planned, connected devices are not suddenly going to be secure overnight. For one thing, there are plenty of legacy devices in the market. For another, even where technology does exist it isn’t always used.


French Plan For Biometric Database of 60 Million People Sparks Outcry

Minister of State Axelle Lemaire told French journalists the megadatabase used 10-year-old technology and had real security problems. For the Council, the creation of TES (from the French abbreviation for Secure Electronic Identity Documents) will result in abuses "as inevitable as they are unacceptable." TES is a dramatic expansion of an existing database used for the creation of biometric passports. The government plans to merge it with the (non-biometric) database of holders of the French national identity card This cycle of clandestine database development followed by public outcry is nothing new: France has been here before. Several times.


Russian users far better at passwords than U.S. users

When it comes to names or email address usernames used in passwords, several countries finally did worse than the US. China was the worst offender with close to 14 percent, followed by India and then Pakistan. In the US, a little more than six percent committed this password sin, compared to a little less than four percent in Russia. While India and Pakistan tend to have close percentages, India scored a bit better. Ahmad wrote, “This proves the fact that Indian people are indeed better at security than Pakistani people.” Being from Pakistan, Ahmad said, “People here use really, really weak passwords.” He followed that comment with analysis about using the weakest passwords.


Solving Business Problems with Data Science

Data science is a catch-all term for a set of interdisciplinary techniques which put data to work to extract useful insights, predictions, or knowledge - calling on elements of statistics, programming, data mining, and machine learning. It shows up in a large variety of areas, some that are literally rocket science while others are much more prosaic. Data science is behind consumer internet magic like Amazon’s book recommendations or LinkedIn’s People You May Know. It’s behind new things like self-driving cars, which use these techniques to learn how to drive safely. And it’s behind day to day practical applications like a supermarket loyalty scheme, such as Tesco’s Clubcard, figuring out which vouchers to send you. The theory behind most of these applications has been around for decades.


IT/OT Convergence and Industrial Cybersecurity Q&A

The IT/OT convergence is a phrase used to describe the trend that is blurring the line between what had traditionally been well-differentiated classes of IT-based systems. As noted in my previous IT/OT blog, this trend is well established, but the full implications are still developing in areas such as the management and protection of systems against cyber security threats. The diversity of technologies involved ensures that there is effective collaboration across multiple disciplines. Key issues covered in the recent webinar include: How the convergence is reflected in international standards for cybersecurity, such as ISA/IEC 62443 The typical and needed responses from the various stakeholders The importance of consequence estimation for the asset owner


How Do You Define Prevention?

It’s time to adopt a new definition for the word “prevention” when it comes to cybersecurity. New or next-generation prevention should stop focusing on trying to stay on top of a constantly changing pool of malicious tools and start focusing on the underlying techniques employed by threat actors, such that blocking a single technique could stop an entire class of attacks. The fact is that, while malware and other tools are growing in number daily, the ways cyberattackers use to deliver threats (spear phishing or stealing legitimate credentials, for example) haven’t changed nearly as significantly. In light of this, wouldn’t it be more efficient to focus on stopping the methods used to deliver threats, rather than the threats themselves?



Quote for the day:


"Encouraging Smart Risk Taking Doesn't Mean Tolerating Dumb Mistakes." --  @GordonTredgold


Daily Tech Digest - November 07, 2016

IBM hybrid storage play acknowledges enterprise realities

Systems such as file and block storage weren't designed to deal with petabytes of data and file counts that can climb into the trillions, but object storage is ideally suited for metadata capabilities and rich database capabilities needed to automate data management, said Steven Hill, senior storage technologies analyst with 451 Research. " ... what IBM has come around to understand is picking up the value of what object storage does and trying to do it better in cloud than Amazon is doing," Hill said. In some scenarios, whether regulatory or financial, it makes more sense to continue to store data on premises, so the IBM hybrid storage approach will be attractive to customers that aren't all-in on public cloud, said Patrick Harr, CEO of Panzura, a cloud storage provider based in Campbell, Calif., that partners with IBM, Amazon, Google, Microsoft and others.


Digital Asset Holdings Targets Systemically Important FIs With New Blockchain Tech

The first function of the GSL is to ensure that "mutually exclusive events" are in fact unique. Or to put it another way, to ensure that smart contracts only exist in one place and that if an older contract is referenced by a newer contract, only the new one survives. Notably, the paper does away with the term "smart contract" altogether, opting instead for the more traditional term "contract." But in addition to ensuring duplicate contracts don't exist, the service works as a messaging system to inform all parties affected by a contract — perhaps thousands of them — that something has happened on the blockchain that they should know about. To do this, the contract is processed off-chain. This could include processing ranging from flows of transactional data to common models of workflow behavior.


Big banks have nothing to fear, but need to learn, from fintech, Salesforce says

Rather than regarding fintechs as disruptors out to take over their market share, banks should regard them as partners, Mahna says. “Banks have an unbelievable knowledge of products and services, really understand the regulatory landscape, not only in Canada but around the world,” he says. “Fintechs, on the other hand, are innovative, agile… they’re very complementary when you think about it. ” For her part, Drew-Lytle disagrees with Mahna’s assertion that banks could be in danger of being eclipsed by fintechs if they don’t adopt an innovation mindset; and though she agrees the two sectors should collaborate she notes that the banking industry has never considered fintechs their enemies to begin with.


Container interoperability: Do standards really matter?

A group of container loyalists believe that Docker should not become the way that the industry defines containers. CoreOS has Rocket, a competing container runtime, as well as its own container format. In addition, Google, Red Hat and VMware have aligned with CoreOS.  While Docker and CoreOS looked like they were going to battle it out in the market, that hasn't happened. Both have decided to cooperate, at least for now, and both are stakeholders in the Linux Foundation's Open Container Project (OCP).  The Docker format and runtime forms the foundation of the evolving OCP standard, and Docker, to its credit, will provide both the draft specifications and the code around its image format and runtime engine. This has jump-started the project. Now the container community is waiting to see what will come from it.


The Challenge Facing Businesses in The Machine Learning Age

Companies that look at this changing roadmap and understand its challenge are already repositioning themselves to take advantage of the new deluge of data that they can now tap into and see the new patterns it reveals. In the not too-distant past, marketing personas allowed a company sales director to create marketing campaigns that passably addressed the personality profile of the company’s targeted audience. This led to a sense that the company understood customer needs and it created a connection with its audience which is how it found its customers. The better representative of its potential customer the marketing persona construct was, the closer was the connection and relationship between the company and its public.


How to become a data-driven 'algorithmic enterprise'

"Harnessing data is absolutely crucial for incorporating the latest generation of machine intelligence, but most organisations suffer from having data locked up in legacy systems or dispersed across a variety of databases, often with poor data quality and conflicting sources of truth. "IT leaders must implement an effective data strategy to unlock, preserve and grow their data assets. Data strategy often relies on an underlying platform strategy - such as public or private PaaS - in order to manage and process data, as well as rapidly deliver applications that unlock business value. In our experience, organisations have difficulty gaining full value from cloud, often building superficial private clouds which we caution against.


The inside man: your biggest risk may be closer than you think

The business of healthcare has drastically changed in a short amount of time. As such, cyber security is fast becoming one of the biggest concerns for the healthcare industry, with more pressure than ever before to minimise the damage associated with a data breach. This can be a daunting task for digital healthcare providers in particular, given the nature of the information they deal with. While addressing the fear of coming under external attack is an important part of the puzzle, for many data breaches the risks lie much closer to home. Insider threats can result from human error or intentional theft, but both are equally damaging for health professionals that aren’t prepared. In today’s digital world, users need access to a myriad of critical systems, applications, and data in order to do their jobs.


Data Dive: Square, Ripple and Mastercard Embraces The Blockchain

Mastercard is taking a collaborative approach to leveraging the blockchain, both exploring the technology itself and encouraging developers to use distributed ledger technology to create solutions that Mastercard may want to incorporate in the future. According to Pinkham, Mastercard is looking into using blockchain for interbank payments — key to cross-border transactions — and trade finance use cases. “Mastercard’s virtues are well-appreciated by the stock market, but the evolution of mobile payment habits and the rise of blockchain ledger technology could pose longer-term challenges to the company’s wildly profitable business model,” Mastercard investor Sequoia Fund warned of the threat the blockchain could pose to operators of traditional credit card rails like Mastercard.


Flood of threat intelligence overwhelming for many firms

"Despite the fact that we have the finest tools that can defend against advanced persistent threats, we still need qualified security analysts or engineers to look at the incidents thrown out by the tools, comb out false positives, and take actions," he said. To help deal with the issue, 66 percent of companies said that they used third-party consultants or managed security service providers to develop or implement their cyber security plans. Intergration was an issue here as well, Chabra added. "Your security technology vendor isn't the same as your managed security service provider," he said. "You've got multiple vendors involved -- one vendor managing the security, another managing the technology, and there's a gap there."


Doing the Bare Minimum for Compliance Could Leave Enterprises Overexposed

When trust is lost, relationships with shareholders, stakeholders, peers, customers and employees are stressed. The impact extends beyond the enterprise or its industry. In the United States, exploited vulnerabilities cost American enterprises billions of dollars and the American economy hundreds of thousands of jobs each year. Fewer jobs translate into less tax revenues, more deficit spending, more debt, and less infrastructure spending, handicapping a superpower. The law is immature. Enterprises should turn to leading published perspectives for more timely and accurate guidance. Latent vulnerabilities are inherent in the business processes and technologies in all enterprises. 



Quote for the day:


"Every shadow no matter how deep is threatened by morning light." -- Isabel, The Fountain


Daily Tech Digest - November 06, 2016

Analytics: The lifeblood of the Fourth Industrial Revolution

Healthcare is an industry that's been described as ‘data rich but insight poor.’ Yet, it’s on the cusp of a data revolution. Two-thirds of the data generation are comfortable sharing their personal information with the healthcare sector, more than any other sector. Also, they're more willing to share vital health statistics than any other form of data. This generation understands that by making better use of the data available – be it patient data, performance data, clinical data or administrative data – the healthcare industry will be able to be better understand patient conditions. And as a result, they'll be able to diagnose diseases more quickly, support better interventions, deliver new models of care and improve quality of life.


The future of big data

There have been many instances where businesses had been ahead of their time in regards to big data – for example when Boots first introduced the loyalty card in 1997 as a way of rewarding people in return for their data. ... These larger organizations have now moved on from simply analysing their data to report on how they are performing, and are now attempting to analyse their data to predict the future. Staples are a great example of this – they measure the behaviour of their customers directly before they stop buying from the company, giving them the ability to predict when their current customers will stop buying from them. With this data, Staples can focus their marketing efforts on the people who look like they are about to stop buying from them – it’s cheaper to retain a customer than it is to acquire a new one.


How Cloud Is Driving The Next Industrial Revolution

Now, the fourth Industrial Revolution is gathering steam thanks to developments in Internet of Things (IoT), automation and robotics. These technologies, along with big data and analytics, are key elements in this new industrial revolution, commonly called Industry 4.0.This is driving developments in a range of sectors. In manufacturing, smart factories with automated maintenance and significant improvements to efficiency are becoming a reality. In the financial services sector, automation is being used to cope with an ever-increasing volume of data, whether for customer service or shifting focus to areas such as security and risk. No matter what industry you’re in, cloud technology is a critical enabler of the next Industrial Revolution, by providing the means for businesses to innovate around these technologies.


Improving lives with digital transformation in healthcare

Technology isn’t just centered around medicine. It can also enhance the patient experience, help ease their life while at hospital and reassure families. Dr Samir Abbas Hospital has also deployed tamper-proof RFID ankle bands for babies to track the location of infants within the hospital. The system has been designed to eliminate risks of abduction or baby swapping. You may be surprised to find that Orange has been involved in these transformation developments at Dr Samir Abbas Hospital, as you probably don’t associate us with health. In fact, we are making huge investments in the sector. A few years ago, we set up a dedicated unit, Orange Healthcare, within Orange Business Services to provide reliable and effective solutions that can help both patients and healthcare professionals.


Machine Learning Is No Longer Just for Experts

For most software developers, there have historically been many barriers to entry in machine learning, most notably software libraries designed more for academic researchers than for software engineers as well as a lack of sufficient data. ... In tandem, the last few years have seen a proliferation of cutting-edge, commercially usable machine learning frameworks, including the highly successful scikit-learn Python library and well-publicized releases of libraries like Tensorflow by Google and CNTK by Microsoft Research. The last two years have also seen the major cloud providers Amazon Web Services and Google Cloud Services release machine learning–specific services — both Machine Learning as a Service platforms and graphics processor unit machines optimized for machine learning work.


IoT edge analytics is transforming manufacturing

Edge analytics can increase your ability to monitor and react to equipment health, resulting in lower costs. Evaluating asset performance at the point of monitoring helps drive corrective action and reduce premature degradation. It is estimated companies can recover as much as half their annual maintenance budget by aligning maintenance investment to asset condition. Increased condition-based and predictive maintenance frees up capital investment for other expansion projects or return on shareholder value. As examples, consider condition-based maintenance (CBM) and predictive maintenance. CBM uses sensor data from equipment and applies a monitoring strategy that uses the actual condition of the asset to decide when and what maintenance should be done. CBM can augment a time-based maintenance strategy and help reduce failures.


Making Algorithms Accountable

“We urgently need more due process with the algorithmic systems influencing our lives,” says Kate Crawford, a principal researcher at Microsoft Research who has called for big data due process requirements. “If you are given a score that jeopardizes your ability to get a job, housing or education, you should have the right to see that data, know how it was generated, and be able to correct errors and contest the decision.” The European Union has recently adopted a due process requirement for data-driven decisions based “solely on automated processing” that “significantly affect” citizens. The new rules, which are set to go into effect in May 2018, give European Union citizens the right to obtain an explanation of automated decisions and to challenge those decisions.


Virtual Panel: State of Reactive in JavaScript and Elm

Exciting things have happened over the past two years: Reactive programming has come to the forefront in front-end JS on several fronts, and has become mainstream in terms of technique and mindshare. However, the current generation of implementations have some issues that we need to solve. For example: hot vs. cold can add significant cognitive overhead for developers, glitches and weird gotchas such as diamond shapes like: combine(f, stream1, stream1), while infrequently encountered, will be surprising to many devs. The community is just starting to research other implementation techniques, including rigorous FRP approaches to correctness, such as signal functions, signal vectors, pull-based, and push-pull-based. These can help us create implementations that rule out glitches.


Top 7 Programming languages to learn in 2017

The description of a programming language is usually split into the two components of syntax (form) and semantics (meaning). Some languages are defined by a specification document (for example, the C programming language is specified by an ISO Standard), while other languages (such as Perl) have a dominant implementation that is treated as a reference. Some languages have both, with the basic language defined by a standard and extensions taken from the dominant implementation being common. You don’t need us to tell you that when it comes to tech, staying ahead of the curve is a pretty good idea. In such an innovative and fast-paced industry, new technologies are emerging every week, every day… basically all the time!


Why don't developers have a 'spellchecker' for security'?

Wouldn't it be nice if software developers had something like a spellchecker, but instead of catching typos and simple grammar mistakes, it caught basic security problems? Developers would be able to fix them immediately, and also learn to write more secure code in the process. The traditional approach is to test software for vulnerabilities after it has been written. But today the testing is moving to earlier in the development process, to when commits are made, or even earlier, while the developer is actually writing the code. "We really need to be implementing this type of application security in our software development stage," said Doug Cahill, analyst at research firm Enterprise Strategy Group. "There are some organizations that are integrating these types of security best practices into their software methodology, but not enough.



Quote for the day:


"Oh yes the past can hurt. But you can either run from it or learn from it." -- Rafiki, The Lion King


Daily Tech Digest - November 05, 2016

How to Boost Your Skills to Become a Better Developer

Having the final user in mind is the first skill of a good developer. Make sure you know the problems of your end users. Make sure to know their needs. Then develop the product that solves their problems and fills their needs. Software development is all about that. The second skill concerns the quality of what you deliver. Delivering with zero defects is a skill. Obviously, it is hard to reach — but it’s not impossible. ... The third skill is about simplicity and not fearing inherent and accidental complexity. This skill is about decomposition and abstraction: your ability to break down complex systems/problems into smaller ones, contrast those smaller parts to make them independent, and organise those smaller parts to make them understandable at the right level of abstraction


Prince George’s County Grooms Millennial IT Workers for the Future

For Sinclair, the leadership training has had as much, if not more, of an impact than the technical training. “I’ve grown tremendously working under Mr. Loveless and Ms. Longs, as well as others, but definitely my leadership skills have grown tremendously,” he says. “The first day I started, I would’ve been scared to read a report in front of my parents. But now, I can give a speech on the spot to a room of 50 people, confidently, that I don’t even know.” If Prince George’s County’s approach to internship and young professional training in IT pays off in the long run, it can hopefully shift perceptions about the county and get young people to realize that they don’t have to move to Silicon Valley or Manhattan to do challenging and rewarding IT work.


This Evil Office Printer Hijacks Your Cellphone Connection

Oliver’s fake printer, which he calls the Stealth Cell Tower, could potentially eavesdrop on the voice calls and SMS messages of any phone that’s fooled into automatically connecting to it. Since it sits indoors near its victims, Oliver says it can easily overpower the signal of real, outdoor cell towers. But instead of spying, the printer merely starts a text message conversation with the phone, pretending to be an unidentified contact with a generic message like “Come over when you’re ready,” or the more playful “I’m printing the details for you now.” If the confused victim writes back, the printer spits out their response on paper as a creepy proof of concept. It’s also programmed to make calls to connected phones and, if the owner answers, to play an mp3 of the Stevie Wonder song “I Just Called to Say I Love You.”


How to thrive in a hybrid cloud world: Data governance and management best practice

It can be difficult to retrofit governance into existing systems. Often, the focus is on the initial data migration to the new operational application or analytics, where a simple bulk data loader is employed in the interest of speed and agility. ... Once the new applications have gone live, focus shifts to ensuring data consistency. Moving between cloud and on-premise systems and cloud-to-cloud brings new challenges, and leave fewer resources dedicated to overall data management. If you don’t want to slow down the business initiatives that are driving the new applications, but still want to prevent that data complexity or chaos, it will pay to have a data management architecture and best practices in place before-hand.


Spending on enterprise mobile apps is up, will continue to increase for the next three years

Enterprise mobility continues to serve as a driving force in boosting company productivity and flexibility. The ubiquity of mobile devices ensures that the business apps running on them can reach large-scale audiences and address an array of organizational needs. This driving force will only increase as wearables and the Internet of Things (IoT) become more mainstream. It's a common trend now for employees to choose the business apps they feel best meet their needs, and this in turn challenges enterprises to produce mobile apps to solve these needs. With that trend in mind, Adobe conducted a recent survey to examine the state of mobile apps in the enterprise, with a focus on the opportunities for organizations seeking to leverage apps to stoke productivity and remain competitive.


Information Governance Insights: Ch-ch-ch-Changes!

Many of us in Information Governance already know plenty about this group because we’re part of them! Like it or not, most organizations consider that Information Governance comes under the purview of the Information Technology. The one thing that many Information Governance professionals fail to understand is that the job of Information Technology is to keep the computers running. They are mechanics, highly skilled and very adaptive, but they want to solve problems and keep the trains running. They can find new software, add new servers to solve business issues, and implement it faster than you can keep up with. The best way to solve this is to get involved! Do what you can to become an active part of your organization’s procurement process.


How Artificial Intelligence Will Redefine Management

Many alarms have sounded on the potential for artificial intelligence (AI) technologies to upend the workforce, especially for easy-to-automate jobs. But managers at all levels will have to adapt to the world of smart machines. The fact is, artificial intelligence will soon be able to do the administrative tasks that consume much of managers’ time faster, better, and at a lower cost. How can managers — from the front lines to the C-suite — thrive in the age of AI? To find out, we surveyed 1,770 managers from 14 countries and interviewed 37 executives in charge of digital transformation at their organizations. Using this data, we identified five practices that successful managers will need to master.


Citibank's plan to fight the fintech revolution

"I describe it as the extinction phase," said Stephen Bird, Citigroup's CEO of global consumer banking, to Fortune.com in June. "What happens in an extinction phase is that you either rapidly adapt and new means of competition are created, or you go extinct.""The future of banking is about focusing on advisory and consultation rather than transactions," said Baxter. "We need to take cost out of the middle and back office of doing simple repetitive rules transactions and move those people into other roles." Citibank plans to do this by retraining their employees through a range of educational classes to help them expand their skill sets to be more relevant as the bank expands the remits of its staple employees.


Are smart cities just a utopian fantasy?

Current funding for smart city initiatives is only good enough for proof-of-concept trials, which would lead, at best, to a piecemeal approach to smart city construction. The reluctance is understandable — Songdo cost roughly $35 billion to build from scratch — but without genuine investment in changing the infrastructure of a city to fit smart city needs, widespread deployment will be riddled with integration and adoption issues. Maybe the biggest obstacle to its full deployment is one question: Are smart cities profitable? There have been compelling waste-reduction efforts based on smart city sensor technology, like using sensors in the water supply to mitigate waste. While these efforts have resulted in corking budget leaks, they haven’t appeared to bleed over into other aspects of smart city deployments.


Databricks has designs on democratising Deep Learning

“Most of the time and effort of building machine learning systems goes into configuring them, collecting these massive amounts of data that these algorithms need, doing feature engineering, extracting the features that you need, tuning that, and then running it through machine learning, then doing the verification, using tools to make sure that you’re managing all these resources that you have. “The hard part of this is really all the other stuff that goes around it, not necessarily running the algorithm. So how do we democratize this?” The company first released the Open Source TensorFrames - a software library that enables the Google’s Tensorflow deep learning framework to run on Spark – in March.



Quote for the day:


"Beginnings are scary, endings are usually sad, but it's the middle that counts the most." -- Birdee Pruitt


Daily Tech Digest - November 04, 2016

2016, Where is the IT Workforce Headed?

Over the years the global workforce has adapted and evolved to suit the various needs of the market and in turn the society. So, the big question is where are we headed? What does the future have in store for us? I begin by quoting Ray Kurzweil “By the time we get to the 2040s, we’ll be able to multiply human intelligence a billion-fold. That will be a profound change that’s singular in nature. Computers are going to keep getting smaller and smaller. Ultimately, they will go inside our bodies and brains and make us healthier, make us smarter.” Needless to say, technology has taken center stage and would continue to do so, the point is how fast we would be at picking up the latest trends and implementing them successfully. The Global IT market is assumed to have crossed $ 3.8 trillion in 2016.


Robotic process automation is killer app for cognitive computing

By injecting RPA with cognitive computing power, companies can supercharge their automation efforts, says Schatzky, who analyzes the implications of emerging technology and other business trends. By combining RPA with cognitive technologies such as machine learning, speech recognition, and natural language processing, companies can automate higher-order tasks that in the past required the perceptual and judgment capabilities of humans. Some leading RPA vendors are already combining forces with cognitive computing vendors. Blue Prism, for example, is working with IBM’s Watson team to bring cognitive capabilities to clients. And a recent Forrester report on RPA best practices advised companies to design their software robot systems to integrate with cognitive platforms.


Datacentre industry faces looming skills crisis as need to replace retiring engineers grows

“We need to fill this funnel with new people, but the question is: where on earth are we going to find them?” The challenge is particularly acute because it is not a case of replacing like for like, as new entrants to the market will need to be well-versed in both mechanical engineering and IT matters, said Hannaford. “Anyone who runs datacentres knows that people who come to a datacentre are, nine times out of 10, looking to deploy cloud applications,” he said. “So you can talk until you’re blue in the face about how low your PUE is, but what they really want to know about is connectivity and how they can use your cloud. So you need people from the datacentre companies and providers who understand IT as well.”


The History Of Wearable Technology – Past, Present And Future

The 80’s and the 90’s are the times of the so-called “commercial pioneering” in wearable computing. In fact, the first wearable devices with mass market impact arrived in the late 70’s. One of the first wearables with real commercial success was the calculator watch, launched by Hewlett-Packard in 1977. ... Speaking about smartwatches, the history of wearable technology cannot ignore the Japanese company Casio and its “fashion statement,” at that time, the “Databank” watch. It was so influential that the Police lead singer Sting wore one in the making of the song “Wrapped Around Your Finger” and Michael J. Fox showcased his watch too, in the movie “Back to the Future.”


Close Common Security Holes with Azure Security Center

Unfortunately, anyone who’s ever been involved with a minor, medium or major security incident knows it’s the “low hanging fruit” that gets overlooked that ends up creating the security hole that lets the attacker in. Attackers take advantage of easy exploits against easy to fix security issues – and while the security issues are easy to fix, too often the fixing doesn’t happen. We can have a major impact at reducing the risk of compromise if we can find a solution, a tool, a service that makes it easy to quickly find and remediate these common security holes. Azure Security Center is one of those solutions. To demonstrate that, let’s look at a collection of “easy to fix” security issues that when they’re not fixed, bad things can happen.


Microsoft HoloLens, hands-on: What it's like to wear the future

The current model only allows you to see the virtual images through a limited 'letterbox' directly in front of you. Look the wrong way or let the headset move position and you can lose them, which means it's not as immersive as other technologies that fill the whole field of vision. As the technology improves, that letterbox is likely to get bigger. Even so, my initial response was to be wowed: this is what science fiction has been telling us the future should look like for decades -- bright, crisp, impossible images right before your eyes. The headset itself is too heavy and cumbersome -- but again that's likely to change quite rapidly. Think of the difference between the first mobile phones and the smartphone in your pocket today.


The Importance of Embracing Customer Data in Tandem with Trust

When it comes to using sensitive data to enhance customer communications, we have to remember that people have decided to confidentially submit information to us as brands and in return they'd like some information back about products or services related to that information, and we have to provide that confidentiality back to them when it pertains to sensitive data. Consumer trust has a massive impact on brand reputation. Customers come to rely on brands known for taking security seriously and conversely, are less likely to trust brands that have had known security breaches. Targeted marketing is all about identifying a specific audience. We have to consider not only the positive impacts of our marketing efforts, but also the unintended or potentially negative impacts.


Gartner’s top cybersecurity ‘macro trends’ for 2017

Paying the security tax. Answering to Dr. No. Submitting to the control centre. If you’ve ever been responsible for running IT security at a business, these will all sound familiar – too familiar. But there’s another way to look at security, says Earl Perkins, a research vice-president in the Internet of Things group at Gartner. Presenting at the research firm`s symposium in October, he spoke of cybersecurity trends to look out for in the year ahead. He also had some helpful advice on how to frame cybersecurity as a benefit to your organization, rather than be viewed as a hindrance. “We’ve been playing a poker game for decades,” Perkins says. “We’ve been betting just enough chips on security and now we’re hoping the hand we hold will be enough to win.”


Are we drowning in a sea of negative security press?

The volume of new vulnerabilities, exploits and exposures seems to be increasingly impacting those inside and outside of the security world. For the consumer and nontechnical business person, the overwhelming volume of bad security news is causing "security fatigue," as identified by the National Institute of Standards and Technology (NIST) in a recent study. The study shows that people become so overwhelmed with news about vulnerabilities and security issues, they in many cases surrender and accept a less secure existence.  For those of us in the information security industry, the effect is somewhat different. We tend to wake up in the morning feeling like we are fighting a losing battle. We tend to be busy remediating a vulnerability discovered weeks ago, even as five new ones are reported.


Intel Security warns window to address Internet of Things security is rapidly closing

“The problem here is that the consumers who owned the devices that were breached weren’t really negatively impacted,” she indicated. “The real victim was usually somebody else. But in the next phase of attacks, the attack could bring ransomware, which would have direct impacts.” Wigle said that Intel Security is responding to this by protecting across the threat defense lifecycle, which with the IoT, is manifested in a couple different ways. “First, it means taking full advantage of what we can build into processors and SoCs and putting the right software on top of it,” she said. “Being able to determine actual device identity will be fundamentally important for the IoT. “The other thing different about the IoT that needs to be comprehended is that they interact with the physical world – like oil pipelines,” Wigle stated.



Quote for the day:


"Obstacles are those frightful things you see when you take your eyes off the goal." -- Henry Ford


Daily Tech Digest - November 03, 2016

Machines can now recognize something after seeing it once, Cybercrime in Canada: The impact on SMBs, How integrated reporting is changing the role of the accounting profession, Saudi Arabia turns to big data to boost business innovation and more.

Machines Can Now Recognize Something After Seeing It Once

The best algorithms can recognize things reliably, but their need for data makes building them time-consuming and expensive. An algorithm trained to spot cars on the road, for instance, needs to ingest many thousands of examples to work reliably in a driverless car. Gathering so much data is often impractical—a robot that needs to navigate an unfamiliar home, for instance, can’t spend countless hours wandering around learning. Oriol Vinyals, a research scientist at Google DeepMind, a U.K.-based subsidiary of Alphabet that’s focused on artificial intelligence, added a memory component to a deep-learning system—a type of large neural network that’s trained to recognize things by adjusting the sensitivity of many layers of interconnected components roughly analogous to the neurons in a brain. 


A glimpse of the future, part three: the internet of things

Certainly, there are many projects that are focused upon creating a self-sustaining planet where, instead of using fossil fuels or other dirty power systems, we get all our energy from the Sun. Elon Musk’s company announced just the other day a range of new house tiles that look like tiles but are actually solar panels. The world is changing fast, super-fast, and much of it being driven by the visionary Elon Musk but he’s not alone. For example, Jeff Bezos is quietly building a whole new world through Amazon. In fact, it seems that we have two sorts of billionaires out there. Those who want to create new solutions for the future (Musk, Bezos and Branson), and those who want to solve present problems in the future (Gates, Buffett, Zuckerberg).


Mobile apps to take over HR technology

Businesses are showing interest in using mobile tools to measure the culture of their business. “That is becoming interesting and big,” he said. Deloitte, for example, has introduced an app called CulturePath. It asks people 10 to 15 questions about their workplace, such as how much freedom they have, how safe they feel and how much collaboration there is, to assess the culture of the organisation. “In most companies, the CEO believes the culture is a certain way. It may be that way around him or her, but it may be completely different out in the company depending on who the manager is,” he said. ... A number of recruitment tools now have tracking systems that measure how diverse the process is, highlighting any unconscious bias.


Cybercrime in Canada: The impact on SMBs

The picture of Canadian SMB cybersecurity that emerges from this survey is of many good intentions and a broad awareness that cybercrime is a threat to organizations. For instance, 96% of SMB employees think backing up company files is important, and 92% think having IT security software installed on all devices is an important IT security measure. A very encouraging 88% place a strong emphasis on “training on your company’s IT security procedures”. Yet much work remains to be done. Only 43% on SMB employees felt confident that their business and its reputation could “survive and thrive” after a cyberattack. And only 40% said they were “very satisfied” with their company’s current IT security policies, procedures, and products.


One in three targeted cyberattacks results in a security breach: Accenture Survey

A new security survey from Accenture has found that, in the past twelve months, roughly one in three targeted cyber attacks resulted in an actual security breach, which equates to two to three effective attacks per month for the average company. Still, a majority of security executives (75 percent) surveyed are confident in their ability to protect their enterprises from cyberattacks. For the survey report ‘Building Confidence: Facing the Cybersecurity Conundrum,’ Accenture surveyed 2,000 enterprise security practitioners representing companies with annual revenues of $1 billion or more in 15 countries about their perceptions of cyber risks, the effectiveness of current security efforts and the adequacy of existing investments.


How Integrated Reporting Is Changing The Role Of The Accounting Profession

The ability to adapt to the rapidly changing business environment and anticipate the information needs of our investors, shareholders, partners and clients is a vital part of corporate reporting. At its core is the need to develop and use a best practice approach that will assist the decision-making process and contribute to the successful implementation of our strategy. As I lead the implementation of the Integrated Reporting (IR) framework and embed its principles into the fabric of our corporate reporting, my goal is to influence behavior and shift the focus to a more comprehensive view of the factors that contribute to increased strategic alignment and the long-term sustainability of our institution.


Saudi Arabia turns to big data to boost business innovation

“When you are only focusing on your strategy, you can miss significant changes in the business model of your industry and suddenly a brand new competitor arrives on your doorstep. This is why Saudi CIOs are becoming more anchored in their business strategy.” Barig Siraj, director of IT and ERP at Zahid Group, one of the region’s biggest conglomerates, agreed that big data strategy would loom large as his business becomes more globalised. Although Zahid is not currently undertaking big data initiatives, Siraj said global partners of its leasing division, such as Caterpillar and Volvo Trucks, would soon require data exchange and analytics to gain global information insights.


Q&A With The Author on "Designing the Requirements”, an Alternative Approach

Obviously the book is about design of IT applications but I have long felt that it is very odd that IT design should be so different from other kinds of design like designing a building. For instance, you would never incrementally design a house; start by designing a wall say, showing it to the customer and asking if that was what they wanted and then, when they were happy with that, showing them another wall and so on. When starting on this journey many years ago, I wanted to know exactly how IT design was different from “normal” design and why. And the first point I noticed was that design of buildings or machines was hierarchical. It’s the hierarchy that gives you traceability – if something is changed or breaks, you go up the hierarchy to understand the ramifications on the rest of the design.


The True Potential of RegTech: Fostering Systemic Financial Stability

RegTech platforms to date have primarily been designed to help major financial institutions meet the burgeoning, new demands of regulators and policymakers. Yet RegTech offers regulators much more. It offers a proportionate risk-based approach where access to and analysis of data enables more granular and effective supervision of markets and market participants. This new form of data reporting and monitoring has the potential to benefit macro-level supervision and stability ... Yet to date RegTech has fallen far short of this vision. For now, RegTech’s growth has principally been in processes that substantially decrease compliance costs and the potential for regulatory fines. The most immediate practical use has been to make it easier to attact and monitor clients in compliance with know-your-customer (KYC) rules.


Do We Need Two Types of CIO?

More traditional CIOs, with a long history of infrastructure projects, are likely to be more suited, and more comfortable, keeping the lights on. They will be focused on automating core tasks and driving efficiencies in existing processes. Whereas more digitally ambitious “change agents” will want to explore disruptive technologies to transform operational models altogether. A good example of this is the IoT2.0 approach adopted by Panera Bread to digitally mobilize customer-facing processes, including ordering and paying. I talked about Panera’s innovations in some more detail in my previous post. Perhaps there is a role for both types of CIO―and perhaps we’ll see a rewriting of senior job titles to reflect this increasing alignment between IT and business strategy.




Quote for the day:


“I do not think that there is any other quality so essential to success of any kind as the quality of perseverance.” -- John D. Rockefeller


Daily Tech Digest - November 02, 2016

Tech Bytes - Daily Digest: November 02, 2016

The biggest cyber security threat is right under our noses, Will digital economy create a developer shortage, What big data is doing for shipping on a global scale, Defending against insider data breaches, Bitcoin isn't anonymous enough to be a currency and more.

The Biggest Cybersecurity Threat is Right Under Our Noses

Technology is advancing at a rate where the convergence of progress in multiple areas is finally making it possible to detect malicious insiders. The cost of storing data continues to go down. The processing capabilities of servers to sift through data keeps marching forward. And advances in machine learning—artificial intelligence—makes it possible to make sense of the data in meaningful ways. It is this confluence of massive secure scalable computing at a low cost, combined with exponential algorithm advances, that has made a breakthrough AI cybersecurity solution like Cognetyx possible. Take one of the toughest scenarios as an example. Let’s say an employee of a hospital for whatever reason decides to steal patient data. Maybe they hold a grudge against their boss. Perhaps they are going to sell the data.


6 trends that will shape cloud computing in 2017

The global public cloud market will top $146 billion in 2017, up from just $87 billion in 2015 and is growing at a 22 percent compound annual growth rate. The lion’s share of this growth will come from Amazon.com, Microsoft, Google and IBM, which have emerged as "mega-cloud providers,” Bartoletti says. They are opening new data centers and making concessions, such as Microsoft’s agreement to have T-Systems manage its cloud in Germany to meet data localization requirements. But the big players won’t be able to service every unique request, which means smaller regional players will see an uptick in adoption in 2017. Bartoletti recommends: "Keep you options open and don't be afraid to use multiple providers."


Will Digital Economy Create A Developer Shortage?

According to Sam Ramji, CEO of the Cloud Foundry Foundation, the companies that don't see a gap are not those furthest behind the effort to move into the digital economy. They are the ones that have been functioning as part of it for several years (companies such as Amazon, eBay, Google, Apple, and Netflix) and are attracting talent because of their position in the economy. The gap shows up more clearly in companies that are still dominated by their legacy systems, he noted. He said his impression that this might be the case was confirmed when Netflix made some of its internal code for managing AWS cloud operationsavailable as open source. When he asked Netflix officials why they released home-grown code, they explained that it would make knowledge of what they were doing more widespread.


What Big Data is Doing for Shipping on a Global Scale

Another important way that the use of Big Data can help optimize the shipping process on a global scale is to provide the information necessary to help shipping companies better manage multi-stop routing, which is a nightmare for any industry, and the shipping industry is no different. The use of Big Data will allow shipping companies to use a mathematical approach to determine where shipping containers should be placed on the ship. By using data to effectively place containers where they can be reached at the proper time, the entire process can be streamlined to run more effectively and efficiently — not only making the company more productive, but also saving the shipping company money.


ALM and DevOps tooling still a critical part of orchestration

With continuous development and DevOps integration, the DevOps models or recipes associated with each ALM phase have to be designed following the ALM processes. Then it can be codified in DevOps language -- declarative or imperative, as appropriate. When development changes are made to an application, component or service, the changes not only have to be tested in terms of application functionality, security and compliance, but also in how they impact the integration between ALM and DevOps. The tight coupling of development, ALM and DevOps demanded by continuous delivery has changed DevOps already. The two most popular tools, the imperative Chef and declarative Puppet, have both evolved to support modular declarations of resources.


Defending against insider data breaches

Internal data breaches have the potential to damage reputation and incur significant financial loss – not only for law firms but clients too. As highlighted by the Panama Papers, the impact of an insider cannot be underestimated. An anonymous source from within Panamanian law firm Mossack Fonseca was able to leak an unprecedented 11.5 million documents over the course of a year, with consequences that reverberated across the globe. Of course, this is an extreme example, but it does serve to highlight the danger posed by an insider who can go undetected for long periods of time.  While there is no silver bullet, there are steps that every law firm can take to reduce the risk of internal data leakage – and these aren’t constrained to the IT department.


Bitcoin Isn’t Anonymous Enough to Be a Currency

On the surface, privacy-preserving cryptocurrencies seem designed precisely to undermine such controls. Monero mixes multiple transactions together so that a source cannot be directly linked to a destination. Zcash creates shielded transactions where everything is hidden except for a string of data that proves the transaction is valid . Bitcoin also plans to add some of these features in the near future. As bad as it looks, though, developers aren’t creating anonymous payment systems because they want to help criminals evade the law. They're doing it because that’s the only way a decentralized currency can work. If, say, users have to evaluate the acceptability of each bitcoin based on its transaction history, then one coin can be worth more than another and the currency loses its reason for existence.


How Advanced Technology Can Save Us From Future Internet Shutdowns

“One self-help mechanism would be for a ‘good’ hacker to write a virus that finds insecure devices and simply disables them. This would remove insecure devices from the pool of computers that could be used as bots,” Eli Dourado, technology policy director at the Mercatus Center, told TheDCNF. “It would be inconvenient to consumers whose devices suddenly stopped working, but that inconvenience may be necessary to prevent more serious attacks in the future.” There are also security network services available, like Cloudfare and Akamai, but they can be expensive, said Ryan Hagemann, technology and civil liberties policy analyst at the Niskanen Center. “As with any decision, a company or individual will need to assess whether the benefits of employing such a service outweigh the costs.”


How To Find The Best Wi-Fi Router For A Home Office

Before you rush out to buy an expensive Wi-Fi router with MIMO, you should know that to utilize that speedy wireless your Wi-Fi devices must also support the tech. Unfortunately, the majority of today's Wi-Fi devices, including smartphones and tablets, only support one or two spatial streams, and they won't be able to take full advantage of Wi-Fi routers with more streams. The same thing applies to MU-MIMO routers, because only a handful of mobile devices available today support the tech. In some cases, it may make sense to buy a more affordable Wi-Fi router that delivers optimal performance with your existing devices, and then later opt for a more advanced router when you upgrade your mobile devices to phones, tablet or computers that support MIMO.


Cisco says it'll make IoT safe because it owns the network

Within the next year, Cisco will launch a program to certify IoT devices as compatible with its network-based software. Among other things, the software should be able to automatically authorize these devices on a “white-list” basis, allowing only endpoints that are safe instead of trying to find and block those that are not. Devices themselves will play a role here, telling the network what kinds of things they should be able to do, such as only connecting to the home server for the service it provides. This approach might help to prevent devastating events like the recent Mirai botnet attack that employed thousands of insecure internet-connected cameras. But the IoT onboarding and management capabilities go beyond security to include automation of other tasks like network configuration that administrators would otherwise have to do.



Quote for the day:


"The aim of education should be to teach the child to think, not what to think." -- Indira Gandhi