Daily Tech Digest - November 18, 2016

How To Integrate Disruptive Technologies With IT Outsourcing Contracts

Business and IT leaders may want a trusted partner to manage their entire technology environment. By expanding the scope of an existing deal, the customer can retain integrated performance standards and service levels for the entire environment and maintain streamlined governance processes. It also may be a way to minimize any transition or termination costs. However, the integration of disruptive technologies into an existing sourcing arrangement can present a number of new challenges, says Linda Rhodes, partner in the Washington, D.C. office of law firm Mayer Brown. “The contractual rights and protections available to the client in important areas — such as control rights, approval rights, audit rights, intellectual property ownership rights and post-termination rights—are likely to be different in many respects,” Rhodes says.


Is ice cream the real reason IoT was invented?

“Smile, there is nothing ice cream can’t solve.” Despite going to great efforts T-shirt sayings rarely catch the real mood of our times but this one is something special. For one it is true and two, it seems to dovetail neatly as a great example of why one of the biggest technology trends of the past couple of years actually exists. The internet of things (IoT) has had a lot of hype, some of it justifiable and some of it misdirected. It is still climbing the slope of expectation on Gartner’s Hype Cycle and while numerous analyst reports throw around big-number forecasts about future IoT device market penetration, the reality is that in most sectors it still needs a viable use case. But things are changing, certainly in the industrial space. At Dell EMC World in Austin, Texas last month, one booth was dedicated to showing how collaboration through IoT can work to make ice cream manufacture more efficient.


Building Security Resiliency Into Critical Infrastructure

Developing greater resilience in our critical infrastructure systems requires addressing several interrelated factors. On a broad scale, we must identify, assess and address risks while creating continuity practices to ensure essential services are still available when disruptions occur. The best way to contribute to this resilience, from a cybersecurity standpoint, is to build a more resilient cyber threat prevention strategy. One that can adapt to the changing threat landscape to stay a step ahead of attackers’ plans. Such a strategy must begin with the most common entry point for attackers – the endpoint. Other than the recently disclosed nuclear plant breach, for which we have no details, all of the above examples have one thing in common – the attack began at the endpoints. Take the case of attacks on the power grid.


Is critical infrastructure the next DDoS target?

“The DDoS attack is most effective against targets that are inherently dependent on internet communications and the ICS/SCADA (Supervisory Control and Data Acquisition) environment is just not engineered to operate with that sort of dependency,” he said. According to Gabe Gumbs, vice president of product strategy at Spirion, “the IoT should be strictly defined as consumer-connected devices. Much of critical infrastructure is connected, but it is not consumer-grade technology. Organizations that own things like SCADA systems are invested in securing them, in stark contrast to the consumer end of the spectrum.” And Robert M. Lee, CEO of Dragos, said while there are still ICS assets on the internet – “too many, to be honest” – a lot of them are not.


How To Fix The Internet Of Things Security Mess

For their part, consumers must first recognise that they are partly to blame for the lack of security in the IoT industry. With customers being focused on ease of installation and use rather than security, there’s no incentive for manufacturers to make more secure devices, and they’ll go out of their way to avoid disenchanting users. While it is the duty of manufacturers to create frictionless security into their devices, customers must come to accept that increasingly connected lives will warrant a change of culture at the consumer level. This effectively means that consumers must understand that connecting vulnerable devices to the internet will not only harm the owner, but all internet users in general. Therefore they should hold companies to account for insecure devices and be mindful of the security of the devices they purchase.


Without tech industry guidance, U.S. may resort to weakening encryption

A Trump administration has a “greater likelihood” than the Obama administration of supporting legislation that will force tech companies to break into their customers' encrypted data when ordered by a judge, Rosenthal said. “You have a commander-in-chief, who said at least on the campaign trail he’s more favorable towards a backdoor regime,” Rosenthal said. Earlier this year, one such bill was proposed that met with staunch opposition from privacy advocates. However, in the aftermath of another terrorist attack, Congress might choose to push aside those concerns and pass legislation drafted without the advice of Silicon Valley, he said.  Rosenthal said U.S. law enforcement needs surveillance tools to learn about terrorist plots, and that’s where the tech industry can help.


Teach Users Smart Security Habits and They Become Partners in Cybersecurity

The University of Wisconsin–Madison developed audience-specific education training as part of its five-year Cybersecurity Strategy plan in 2015. One of the plan’s top strategic objectives was to “Build a community of experts and improve institutional user competence through security education, training and awareness.” The plan calls for IT security staff to develop group-specific education for professors, researchers, business staff and IT professionals. To address the need for ongoing education about phishing attempts in particular, the plan also calls for quarterly phishing campaigns. Most important, the university measures campaign results to ensure that the ultimate goal — reducing the number of users who respond to phishing attempts — is being achieved.


IBM sets up test range to practice fighting nightmare cyber battles safely

Staff running the simulations can tune them on the fly to make the situation more or less complicated to suit the group carrying out the exercise. “We don’t want them to fail but we want them to be challenged,” says Caleb Barlow, IBM Security’s vice president of portfolio marketing. Scenarios can be spiced up with interjections – unexpected new developments that complicate matters. For example, word might come in that a nosey reporter has gotten wind of details about the attack or that the CEO is angry about how the response is going and creating more problems than they are solving. The range includes a TV interview studio where an actor plays a reporter who grills participants about the breach that has affected the fake business set up for the simulation.


Top Reasons For Network Downtime

New research paints a somewhat bleak picture of network performance. Outages are frequent. Hours typically pass before an issue is reported and resolved. Protective measures are manual and error prone. The source of the data is a survey of 315 network pros at midsize and large enterprises. The survey was sponsored by Veriflow, a San Jose, Calif.-based startup that aims to minimize the risk of network vulnerabilities and outages. Veriflow’s software is designed to catch network problems before they happen by predicting possible network-wide behavior and continually verifying that a network model adheres to an enterprise’s security and resilience policies. The survey results are interesting


Nothing good is free: How Linux and open source companies make money

Many open source projects were originally created because the developers themselves needed a solution for their own use, and then chose to release the code as open source. This can happen when an individual or a company doesn't really want to be in the software business but want to provide value to others for free. Sometimes, they hope that by releasing their project to open source, they can multiply their development resources for free, without having to hire more coders. Other open source projects begin in educational or nonprofit organizations, or as a result of a hobby project. No matter what, a piece of software comes into being with an open code base, but without the need for a business plan guaranteeing an income stream. For this model, there is no promise of ROI needed before investing in the software.



Quote for the day:


"The sharpest criticism often goes hand in hand with the deepest idealism and love of country." -- Robert F. Kennedy


Daily Tech Digest - November 17, 2016

Learning To Trust Cloud Security

As you begin your journey, enlist the help of public cloud and software-as-a-service providers. Learn how they think and operate. Check the "us vs. them" attitude at the door and be realistic about your own capabilities. Their reputations rely on their ability to execute, and to do it securely. There's a reason the National Security Agency, for example, turned to Amazon Web Services to build the NSA cloud — instead of attempting it on its own. It's OK to learn as you go. Many organizations have approached the move to the cloud as they would any major IT transition. They analyzed it and tried to glean as much as they could about the cloud and how it's provisioned, managed, and secured. That's not all bad, but the traditional vetting and risk processes slowed them down. 


Your future job (part 1) – Cloud Architect

So how do you become a cloud architect? Many of these roles are now filled by people who changed in line with technology and had a background in infrastructure architecture. Some come from a developer background and go involved as part of the delivery of automation services. A good place to start is an understanding of infrastructure design. It is also a core requirement to both know, and keep up with the relevant product portfolios. Along with technical prowess, there are a set of equally important soft skills. Being able to relate business objectives (application uptime and performance for example) with the underlying technology. Then being able to explain to non-technical colleagues or customers how the two interact. Being the bridge between management and developer, and being comfortable in both arenas is essential.


Tech skills earning the highest cash premiums -- no certification required

How do you know if your employer is a victim? Say, for instance, your company doesn’t normally have trouble retaining tech talent and suddenly the best people start walking out the door. Most likely your company wasn’t able to match competing salary offers. Then, to make matters worse, it's soon discovered that the competing offers were actually realistic average local market salaries for these positions -- your employer was actually underpaying people what they were worth from the start. It’s called "salary compression": when market driven pay for talent is growing at a faster rate than the annual salary increases employers are able to offer their workers. Compression is a widespread systemic reality that tends to be much worse in the tech workforce because of the rapid evolution of technology, skills, and jobs.


What the history of open source teaches us about strategic advantage

Collaboration with regards to fixing each other's software challenges had been taking place since the 1960s, but it wasn't until the 1990s before the open movement began benefitting a widespread number of organizations. What movements are slow-cooking within your own organization? If they are slow moving, don't give up on them; instead, remain patient. ... Open is a here-to-stay movement. But what will the next movement be? The most successful organizations will embrace the next movement by taking human nature into account: spending patterns, technology trends, and psychological dynamics. The winning strategy is to go with the flow, listen, be alert, and remain balanced. It's common sense to do so. It's practical.


Social Engineering

Smokers are one of my favorite targets while Social Engineering. Often these employees are frustrated and looking for a quick break from the stress of the day. Sometimes just having a lighter in your pocket or an extra cigarette is all you need to strike up a conversation. Other times it’s just relating to their frustration and using Neuro-Linguistic Programming (NLP) to create a bond while having a smoke. By mirroring the target’s body language, breathing rate, voice and vocabulary, I can begin to build a connection on a subconscious level. This will often throw my target off and they will allow me to walk into the building behind them without a badge. There are ways to improve your protection from these attacks though.


Why Business Departments Choose Their Own Tech

CIOs should view this as a natural evolution of the ongoing digital transformation—one in which the lines between tech and business get increasingly blurry, and close collaboration proves critical. "As digital innovation accelerates, the winners will create new customer experiences, make faster and better decisions through smarter collaboration, and create new digital business models and revenue streams securely," said Mark Rogers, CEO at Logicalis. "CIOs and IT leaders can play a leading role in enabling that innovation, drawing on skills from insightful partners to help shape their businesses and lead their sectors through the application of digital technologies." The findings cover a broad range of other tech topics—such as the internet of things (IoT), app development, big data, the cloud and cyber-security—and we've included some of those here.


The Right Cyber Coverage Can Protect a Business from Financial Ruin

An essential point to remember when seeking to address cyber risk is to take a proactive stance regarding cyber security. This includes implementing training, education and regular testing for employees as well as developing a cyber risk strategy that includes an examination of IT infrastructure to identify potential exposures, key cyber stakeholders, types of data held and the value of that data. Tackling cyber risk is an ongoing process that requires engagement at all levels of an enterprise. A knowledgeable broker can use analytics and cyber exposure expertise to determine how much cyber coverage limit is needed, how that limit should be allocated based on the unique needs of the business and how to avoid off the shelf policies that typically are limited in scope and coverage.


Frankfurt’s fledgling fintechs show a city racing to catch up

German fintechs could benefit from more technology “sandboxes” for testing software in a safe environment with banking regulators’ cooperation, said Bussmann, who introduced Blockchain digital ledger software at UBS. He’s also credited with modernizing the bank’s information technology system before departing earlier this year. Europe’s biggest banks are increasingly tapping into startups to aid the development of digital services and products to retain clients and stave off competitors. Technology that’s changing how customers can get loans and pay bills is reducing the need for costly branches, adding to pressures on Deutsche Bank and Commerzbank, which are grappling with the squeeze from record-low interest rates in the region’s most-competitive market.


Microsoft Doubles Down On Linux Love, Joins Foundation

"Microsoft is hitting all the right notes in terms of aligning its developer business with an ecosystem much broader than Windows," he said in an email. "Joining the Linux Foundation is a natural progression of this strategy and one that might still generate a double take if it wasn’t for all the actions the company has already taken in terms of supporting Linux in Azure and with SQL Server." With the release of the pubic beta for SQL Server on Linux, anyone will be able to take the relational database software for a spin on a Linux machine, though they shouldn't expect the full set of features available on Windows to make their way over to Linux just yet. Microsoft has planned to make SQL Server on Linux available in the middle of next year, and Wednesday's launch is an important step along that path.


Using vfsStream to Test File Uploads with Laravel

Testing of uploading files can be tricky, but with the right tools and the knowledge of a few tricks, the process can be more efficient and a lot less difficult. If you haven’t been exposed to vfsStream in the past, it allows interaction with a file that is stored in memory vs. one that is physically on the machine. This is nice since you don't have to delete files that are used for testing, which is more of a problem when a test fails and the teardown or other code doesn't run to remove the files used in testing. Additionally, it's faster since it is dealing with memory rather than the physical hard drive. Simply put, it's cleaner and faster. This post will go over creating an endpoint (route) to upload a CSV file of users and testing that users in the CSV are displayed in the JSON response, as well as adding validation to ensure CSV files are the types of files being dealt with.



Quote for the day:


"The smarter you get, the less you speak" -- Unknown


Daily Tech Digest - November 16, 2016

As Watson Matures, IBM Plans More AI Hardware & Software

IBM is also planning hardware and software for inferencing, which requires lighter processing on the edge or end device. The inferencing engine takes results from a trained model, adds additional data or input, and provides improvised results. Drones, robots, and autonomous cars use inferencing engines for navigation, image recognition, or data analysis. Inferencing chips are also used in data centers to boost deep learning models. Google has created its own chip called TPU (Tensor Processing Unit), and other companies like KnuEdge, Wave Computing, and GraphCore are creating inferencing chips. IBM is working on a different model for its inferencing hardware and software, Gupta said. He did not provide any further details.


How to Develop Business Acumen in the IT Workforce

“Developing strong business acumen in IT is a prerequisite to effectively shift IT focus from optimizing IT operational efficiency to driving business effectiveness, value creation and growth,” said Lily Mok, research vice president at Gartner. “At the heart of an effective IT communication strategy is the ability to clearly link the vision, strategy and action plans of IT to the business to drive desired behaviors in the workforce that contribute to improved IT performance and business outcomes.” In the digital business world, it is essential that CIOs and IT leaders be able to show the role of IT within the business strategy. Business acumen enables CIOs to combine technology know-how with a broad understanding of the market and industry, and design solutions that create new business value and growth.


Machine learning: The deplorable state of deployment

Modern production machine learning systems do often contain common inference and preprocessing techniques that PMML can represent, but they also contain data transformation and feature engineering steps that are particular to the problem at hand, and modeling approaches that have not yet been canonized in the PMML standard. Thus we commonly see PMML-based deployment strategies that are decorated with Python scripts or other kludges that cover those functional gaps but detract from the raison d’être of the intermediate representation: a single description of the computation that ops needs to manage in production. Because of its restriction to a canned set of functionality, PMML is a failed standard.


IT automation: Where it's working, where it's not

With the growth of mobile devices and the many applications that now support them, IT departments everywhere have witnessed an uptick in requests for new applications at a time when staffing has remained relatively flat. This has prompted the adoption of IT automation that can promote a more rapid development and deployment of new applications. It has also prompted leaders to take a look at other areas of IT that can benefit from automation. At the same time, moving to IT process automation can be difficult. It requires the rewriting of policies and procedures, vetting these rewrites for governance compliance, reworking workflows in the data center to accommodate the automation, and of course, retraining and/or redirecting IT personnel to work with the automation in their daily routines.


CIOs may finally get a seat at the grown-ups' table

“CIOs are tired of hearing about the cost of IT and how to shave it further. By being able to discuss value, they can get a strategic seat at the table,” says Apptio’s Gupta. “They can take it to the level of a services construct, with cost metrics behind that. Security is a great example: The board asks why are you spending so much on security. With TBM, you can have a model of cost and value of security. That means you can talk to business executives at a higher level. And the transparency of the standard TBM model builds a foundation of trust.” Thus, when a CIO comes to the board the discussion isn’t about “why are we spending so much on storage?” but “we can use these existing systems more effectively for these business needs if we invest more here and less there, or replace some with different technologies or cloud services.


Spire Technologies is reengineering HR with its robots

"It takes some time for the ecosystem to realise the importance of disruptive technology, but now the world is waking up to the reality of AI. AI will disrupt and change the way HR functions and all the current cutting-edge technology in prevalence is going to disappear. This technology is going to grow and since we are one of the few early entrants we will get our fair share of growth," says Sanan.
Growing at a fast clip, Spire is poised to take advantage of a world which is slowly, but steadily accepting the impact and understanding the efficiencies of an AI-based platform. While the US, being the frontrunner in the tech world, is the primary market for Spire, many businesses in India are also keen to take advantage of disruptive technologies like Spire TalentSHIP.


The Long Decline Of Online Freedom

“Freedom on the Net,” Freedom House’s annual study on internet freedom around the world, sheds light on the fact that in many parts of the world, access to the free and open internet is simply not a reality. While this is due to a number of factors, for many people government-mobilized access restrictions and shutdowns present a significant barrier to the tremendous benefits of the internet.  The Internet Society is a proud sponsor of this year’s report. As an organization that supports the global development of an open internet free of undue regulation and censorship, it considers the findings of “Freedom on the Net” troubling. In particular, we believe the disruptions in internet access identified by Freedom House have harmful social, free speech, political and even economic consequences.


Microsoft partners with OpenAI to advance AI research with Azure

In addition to the partnership with OpenAI, Microsoft also announced the its Azure Bot Service preview that allows developers to build bots on the "Microsoft Bot Framework and easily deploy and manage them in a serverless environment on Azure." These bots run on Azure Functions—available now—to help them scale and more efficiently use resources. However, Microsoft hasn't always had the best luck with bots. Back in April, a chatbot from Microsoft called Tay was manipulated by users into spewing racist and sexist messages before being taken offline. While interesting, the partnership between Microsoft and OpenAI was preceded by the launch of the Partnership on AI in September, when Microsoft joined Facebook, IBM, Google, and Amazon to promote best practices in AI development.


Google adds new services to its cloud machine-learning products

Google fired its latest salvo on Tuesday, announcing a set of enhancements to its suite of cloud machine-learning capabilities. The first was a new Jobs API aimed at helping match job applicants with the right openings. In addition, the company is slashing the prices on its Cloud Vision API and launching an enhanced version of its translation API. On top of that, Google is offering GPUs in its cloud both through the company's managed services and its infrastructure-as-a-service product. Companies that want to roll out their own machine learning systems and algorithms can now take advantage of the new hardware. These moves are important steps for the company as it continues to compete with Microsoft, Amazon, IBM and other vendors.


Hindered by legacy IT systems, Texas CIO forges a way ahead

"What makes it legacy is when it can no longer perform its purpose and deliver value to the business at any cost. That's when it becomes a hindrance to move your business forward," said David Mayer, vice president of product management-software at Insight. He pointed to legacy-related issues with corporate networks as case in point. Many companies have networks initially built to handle data moving only through internal systems; now those companies expect their networks to handle significant amounts of data moving both internally and externally. "There are a lot of networks designed for 'Old World' interchanges and not for interchanges out in the cloud," Mayer said, adding that legacy networks create bottlenecks that slow down business.



Quote for the day:


"Success is what happens after you have survived all your mistakes." -- Anora Lee


Daily Tech Digest - November 15, 2016

Transparent machine learning: How to create 'clear-box' AI

OptimizingMind's brain-based algorithm is meant to let developers "peer inside of their networks, understand what they are doing, and easily edit them without retraining from the beginning," said Achler. It allows for "one-shot" learning, through which a neural network can be taught on the spot. For example: Siri could be told the definition for a word, which would then be stored. Today, neutral networks can't do that—they need to be trained to incorporate new things, learning using thousands of examples. So what does "clear-box" mean? According to Achler, it provides a way to view decision-making in real-time. "It can access weights, features and nodes, providing flexibility to read them as well as change them. Ultimately this enables understanding of how the neural network is arriving to a decision," he said.


DOS Technique Lets A Single Laptop Take Down An Enterprise Firewall

According to experts from the Security Operations Center of the Danish telecom operator TDC, it would take from 40,000 to 50,000 ICMP Type 3 Code 3 packets a second to overload a firewall. This is not a large number of packets and the bandwidth required to generate them is 15Mbps to 18Mbps, which means that BlackNurse attacks can be launched from a single laptop. "The impact we see on different firewalls is typically high CPU loads," the TDC Security Operations Center (SOC) said in a technical report. "When an attack is ongoing, users from the LAN side will no longer be able to send/receive traffic to/from the Internet. All firewalls we have seen recover when the attack stops."


Major Linux security hole gapes open

The root of this root problem is in the /scripts/local-top/cryptroot file. Once you've gone past the maximum number of trials for transient hardware faults, 30 on x86 architectures, you gain root-level access. This is an example of how open source fails. Just like the OpenSSL Heartbleed security hole, once you look at the code, the problem leaps out at you. But, if you don't look, it just hides there in plain sight. Open-source security only works if you actually read the code. What's even more annoying, this only works if you've encrypted your system partition. Yes, by doing the smart thing of using encryption, you've actually opened the door to this attack. Fun! You can't use this to break into users' encrypted partitions. Of course, you can still wreck them.


Google taps into your life to personalize its streaming music

"This is smart, using an established Google strength in machine learning to help buttress a potentially important product, Google Play Music," he said. "Actually, predicting what people will like is important and difficult. Everybody, from Amazon to Netflix to all the content-creators in the universe, works hard on this problem. I think Google's new machine learning approach will slightly improve their suggestions..." For Zeus Kerravala, an analyst with ZK Research, machine learning is going to be the "next big thing" because it enables service providers to be predictive. "I think [Google is] slightly ahead of the curve in that they're factoring in time of day, location, etc.," he said. "It would be interesting to see where they go next, like who is in the room with you. Will the music change depending on whether your kids are home?"


Should the Manager be in the Ideation Meeting? 

Hand over the meeting to an external facilitator. It is hard for the manager to change from their normal management persona into a creative cheerleader. It is much easier for a facilitator to get people to think and act differently. Bring in someone from an entirely different function or business and tell them the outcomes you want e.g. we want to find three new ways to cut waiting times and improve customer service. Then let them run the meeting and you take a back seat. ... Leave the room. I facilitated a brainstorm meeting for a marine engineering company. We started by discussing some of the key challenges and the broad types of solution we needed. The Managing Director then left the room. He was a very intelligent, forceful and dynamic character.


Q&A with Jason Bock: Testing Tips, Advice and Insights

Finding a bug or a painful interaction with an API when you're running tests locally on a developer's machine takes less time to resolve than it would if it was discovered in production. That's even quicker than having the QA team finding these issues (assuming a project has QA involved). ... For teams that haven't written tests before, they sometimes don't treat test code like application code. Their tests end up being hundreds and hundreds of lines of code with no clear focus. As a result, those tests are hard to maintain, take a while to finish, and can be frustrating the developer team. They may even abandon their unit tests. Therefore, my advice for teams not familiar with writing unit tests is treat them with the same love and discipline they take with their application code.


Microsoft has found a way to bring human language intelligence to our dumb computers

The Microsoft Concept Graph is a massive graph of more than 5.4 million concepts derived from machine-learning algorithms and billions of web pages and anonymized search queries. The idea is a major component of ongoing efforts to computationally simulate human thinking. If a computer can understand the concept behind a word, it can then understand the context surrounding the use of the word. So a computer can stop taking everything we say literally and instead start understanding and anticipating what we actually mean. One of the practical concepts the researchers mentioned was keyword advertising. It would be helpful for all concerned if the keyword advertising you see when you are web browsing were more pertinent and a lot less ham-fisted.


C3 IoT: Is Tom Siebel's Startup An Emerging Powerhouse?

C3 came to the industrial internet by way of instrumenting and analyzing data from gas and electric utilities. Pacific Gas & Electric is one of its customers, along with the New Orleans giant Entergy. The young C3 Energy struck pay dirt in Europe, where it signed up Enel (National Entity for Electricity) in Rome, running utilities in Italy and Spain, as well as Engie in Courbevoie, France. With those two customers, it installed "the largest set of IoT production applications on earth," Siebel said. "More than 80% of European smart meters are under management by the C3 IoT platform," said market research firm Harbor Research, which issued a report on C3 and the IoT market in July.


Responding to a Data Breach Starts at the Top

The first thing every leader should remember is that a data breach can happen to anyone. As globalization continues, breaches are becoming an even greater problem. Target, LivingSocial, Facebook, and other prominent companies have been the victims of clever cybercrime. It’s easy to think that a data breach is the kind of thing that happens to other companies—until it happens to you. No security system is completely un-hackable, and every company needs to have a breach response plan in addition to solid cybersecurity. Members of the team should know how to spot signs of an attack—and take that information to leadership immediately. Good leadership during a crisis like a data breach is key to preserving morale and helping the company move past the incident.


Thousands of low-priced Android phones are reportedly sending user data to China

A newly-discovered piece of software running in an unknown number of Android phones is reportedly sending a variety of private user information directly to Chinese servers every 72 hours. The software, created by a Chinese firm named Shanghai Adups Technology Company, is said to be in hundreds of millions of devices - it's not clear how many of those devices are in the US, or how many users are affected. The news comes from a report Tuesday morning in the New York Times - a security firm named Kryptowire identified the malicious software, and said it does more than just archive/collect your text messages (though it also does that). Apparently the software collects "the full contents of text messages, contact lists, call logs, location information and other data," and then sends that data to a Chinese server.



Quote for the day:


"Am I not destroying my enemies when I make friends of them?" -- Abraham Lincoln


Daily Tech Digest - November 14, 2016

Machine Intelligence in Ad Tech

Advertising is a field that is ripe with unstructured and high-dimensional data. Advertising edicts, bylines, articles, reports, jingles, ad copy, ad creatives, social sentiments, user generated data, brand guidelines, audio and video content are all forms of unstructured data. From a dimensionality perspective, the number of products and categories in the advertising space and feature of each product and the utility it provides contributes to dimensionality explosion. Added to this, the demographic, behavior, geography, consumption habits, social bias, cultural make and content consumption channels of an individual consumer explodes the dimension of data beyond comprehension.


Work With Parallel Database Streams Using Custom Thread Pools

By default, parallel streams are executed on the common ForkJoinPool where they potentially might compete with other tasks. In this post we will learn how we can execute parallell database streams on our own custom ForkJoinPool, allowing a much better control of our execution environment. Speedment is an open-source Stream ORM Java Toolkit and Runtime Java tool that wraps an existing database and its tables into Java 8 streams. We can use an existing database and run the Speedment tool and it will generate POJO classes that correspond to the tables we have selected using the tool. One distinct feature with Speedment is that it supports parallel database streams and that it can use different parallel strategies to further optimize performance.


How to avoid becoming a part of a DDoS attack?

The scale of this attack, and the fact that it used devices we’re normally not taking care of, makes it a real wake-up call for IT administrators, but also for various IoT device users in general. Think not only about the flaws in your patch management strategy at work, but more about the complete lack of patch management strategies that exist at the homes of most, if not all your coworkers, friends, and family. Do they run vulnerability scans regularly? Manage and deploy patches to all nodes under their control?  ... While defending against a DDoS may be beyond the capabilities and capacities of many of us, we can at least ensure that we are not contributing to the problem, so here’s a list of things all of us can do to help.


What Trump’s Win Means for Cybersecurity

Security and foreign policy analysts warned that it would only embolden the Russian hackers who injected chaos into the presidential campaign and the Democratic party. Election day itself got a taste of alt-right hacking, as an anonymous poster on 4Chan appeared to target a Clinton get-out-the-vote phone bank—but inadvertently hamstrung both Democrat and Republican calling efforts. Edward Snowden and other privacy activists warned that the surveillance powers expanded under Obama could be abused by Trump and called for Americans to use encryption tools to protect themselves. And WIRED offered a primer on how Trump will reshape national security policy, including his likely support for the Syrian regime of dictator Bashar Al-Assad.


Clearing the fog: a vision of security for hybrid clouds

Perhaps the biggest issue that IT teams face is that using hybrid clouds can put data and business applications beyond their traditional IT security controls, which don’t typically touch the cloud – especially public cloud environments. At the same time, the number of cyber threats and breaches are increasing. Once an environment is breached, attacks are able to spread laterally within the cloud infrastructure and even extend externally outwards from the cloud to on-premise networks. ... It all adds up to an enlarged, complex and blurred attack surface for organizations, so they need a comprehensive solution to bridge security gaps and extend protections, visibility and control from data centers to the cloud in a way that works with the cloud’s elasticity and automation.


What E-Commerce Business Owners Need to Know About Artificial Intelligence

"Companies integrating deep learning into their eCommerce site will drastically improve user's search capabilities," says the AI expert Akash Bhatia, cofounder and CEO of Infinite Analytics. "For example, a woman could take a picture of a dress that she likes, upload the photo into the search bar of an eCommerce site and, using AI, the site would immediately analyze the image, understand the patterns, fit, style, color, brand, and other attributes to identify the dress. Voila! That consumer is able to convert right away." Other experts agree with Bhatia. Ryan BeMiller, inbound marketing expert focused on the ecommerce sector, writes, "Photos alone cannot be expected to provide a full understanding of the product. The array of products on display should have distinct and clear product descriptions.


The Current State of Machine Intelligence 3.0

The danger here, unlike the mobile app explosion (where we lacked expectations for what these widgets could actually do), is that we assume anything with a conversation interface will converse with us at near-human level. Most do not. This is going to lead to disillusionment over the course of the next year but it will clean itself up fairly quickly thereafter. When our fund looks at this emerging field, we divide each technology into two components: the conversational interface itself and the “agent” behind the scenes that’s learning from data and transacting on a user’s behalf. While you certainly can’t drop the ball on the interface, we spend almost all our time thinking about that behind-the-scenes agent and whether it is actually solving a meaningful problem.


What Is the Future of Data Warehousing?

While the concept of BI is not necessarily new, traditional BI tactics are no longer enough to keep up and ensure success in the future. Today, traditional BI must be combined with agile BI (the use of agile software development to accelerate traditional BI for faster results and more adaptability) and big data to deliver the fastest and most useful insights so that businesses may convert, serve, and retain more customers. Essentially, for a business to survive, BI must continuously evolve and adapt to improve agility and keep up with data trends in this new customer-driven age of enterprise. This new model for BI is also driving the future of data warehousing, as we will see moving forward.


An Artificial Intelligence Definition for Beginners

“Artificial intelligence is a computerized system that exhibits behavior that is commonly thought of as requiring intelligence.” Or more technically speaking, AI is a “system capable of rationally solving complex problems or taking appropriate actions to achieve its goals in whatever real world circumstances it encounters.” In a way, artificial intelligence is about understanding – then recreating – the human mind. And AI is not just about designing computers that mimic how we think, learn and process information, but also how we perceive and feel about the world around us. Understanding the world of AI only begins with a simple artificial intelligence definition. There’s a whole universe of terminology we need to explore in order to understand the domain before we can invest in it.


Key KPIs Across Agile Methodologies

The accelerated timeframes of Agile sprints dictate that KPIs guide processes towards remaining on course with project goals and objectives. KPIs guide Agile teams in essential software features and primary functionalities. Sprint planning meetings must include key indicators of performance goals and achievements which tie into business needs. KPIs standardize code development and simultaneous automated testing to ensure that shippable releases remain in compliance with planned objectives. To better adhere to KPIs, cross-functional Agile teams, in which developers, QA, and IT contribute to all three disciplines, provide expertise that best ensures quality functionality from each perspective.



Quote for the day:

"Your mind is your prison when you focus on your fear." -- Tim Fargo

Daily Tech Digest - November 13, 2016

Agile Sailors - A Journey from a Monolithic Approach to Microservices

“Any organization that designs a system (defined broadly) will produce a design whose structure is a copy of the organization's communication structure” Conway argues. What did we learn from reviewing our current state by then? How did we set both structures in motion? What did we plan for and what did we actually achieve? One of the first lessons we drew from Conway´s Law was the following: changing to innovative products and short time-to-market cannot be done by relying on technological changes only. Instead, organizational changes and technology have to go hand in hand. Both dimensions need to be inspected and adapted accordingly. Although this sounds simple in concept, transforming our set-up as well as our mindset took us long and is still top on our menu.


What is OData? REST Easy With This Quick Guide

OData is a REST-based protocol for querying and updating data. It is built on technologies like HTTP, ATOM/XML, and JSON. It is more flexible than other REST-based web services and provides a uniform way to describe the data and the data model for easy interoperability between data sources, applications, services, and clients. Similar to ODBC and JDBC, OData gives you a single way of accessing various data sources. Consumers of OData master one API and use it to consume multiple data sources. As a producer, OData relieves you from spending your resources to defining and maintaining data access and discovery API. OData is an OASIS standard and is beginning the standardization process with ISO. It defines the best practice for building and consuming RESTful APIs.


Next Generation Firewall Bypass Tool: FireAway

Fireaway is a tool for auditing, bypassing, and exfiltrating data against layer 7/AppID inspection rules on next generation firewalls. These tactics are based on the principle of having to allow connections to establish through the NGFW in order to see layer 7 data to filter, as well as spoofing applications to hide communication channels inside the firewall logs as normal user traffic, such as Internet surfing. Typically the FireAway server would be started on the egress side of the firewall (such as a server on the Internet), and listen on a port believed to be closed to see if any application based rules allow traffic out on this port ... All data received by the server on this port will be saved to the file ReceivedData.txt in the directory the server was launched from.


A Software Product Vs Project

In short, a software Project is all about to execute a Statement of Work of an internal or external customer, where what customer required is right irrespective of what is ideal or what the end user would expect. Though some projects are scoped in such a way that certain aspects of non-functional requirements are left to the choice of the project teams. Product development isn’t about implementing what the customer wanted to. In product development, the product manager owns and comes up with the product requirements. A large product or product suite, typically comprise of many projects and will evolve over time. Unlike a project the product will be improved continuously without an end date based on feedback from end users and the product team prioritizes what needs to be built next based on its perceived value for its target users or customers.


Understanding the CIO’s Role in Security

The CIO should take charge for two reasons. First, he or she is in the best position to understand the complexities and specifics of the IT infrastructure and services that run the business. This level of understanding allows the CIO to consider all implications, even those stemming from or affecting operations, technology and events outside the enterprise. Secondly, CIOs are often held responsible for high-profile breaches. This extra pressure is excellent motivation for a CIO to make enterprise security a personal top priority. Specifically, the CIO’s role in security should extend to three different areas to maintain a strong security posture.


Why Cultural Change Is Necessary For Big Data Adoption

Big data is transforming businesses across industry sectors — from industrial systems to financial services, from media to health care delivery, from drug discovery to government services, from national security to professional sports. The opportunity to deploy data and analytics has accelerated the speed at which companies can enter new markets, with new solutions, and quickly challenge or displace traditional competitors and market leaders. Consider some of the firms which are at the forefront of the Digital Economy – Amazon, Google, eBay, Facebook, Uber, and Airbnb. These are firms that are rooted in big data and analytics, and have leveraged new data-driven business models to disrupt and transform traditional industries such as retailing, media, and travel.


A Warning for Fintech

At stake is the bank's continued relationship with many of its clients. Cyber attacks can prompt the most tech savvy customers to walk way: about 29 percent of U.S. millennials will close all accounts with a bank after a fraud incident, according to an October-November 2015 survey by credit scoring agency FICO. But the financial damage could spread far beyond Tesco. It's easy to imagine how the rising financial cost of cybercrime could damage the big selling point for fintech firms and challenger banks: being able to acquire customers and operate at a lower cost than established rivals. ... Protecting against cybercrime is about more than just spending of money on the right technology -- and it's also about having the right plan in place when a successful attack does get through.


Don’t let email attachments become your weakest link

Employees represent a business’s first line of defence against email threats, so they have a big responsibility to help protect data and keep the company secure. Most of the time, individuals are simply too busy or too ignorant of the consequences to consider for more than a second or two whether they should open a questionable email or attachment. The hackers are making it even harder for security teams because they know that at the beginning or the end of the day, when people want to get stuff done or get out the door, they are more likely to be fooled by an email attack. For this reason, there are often spikes of malicious activity early in the day or late in the afternoon.


The Impact Big Data Is Having How We Learn

One of the biggest technological advancements that has improved the quality of the learning tools we use is the aggregation and analysis of data. According to a report by the U.S. Department of Education, “Big data captured from users’ online behaviors enables algorithms to infer the user's’ knowledge, intentions, and interests and to create models for predicting future behavior and interest.” Big data is empowering education companies to understand things they could not have previously. Companies like Edx are using that information to determine what kinds of classes can be taught online and which are better suited to a classroom environment. When it comes to learning, there’s no doubt students have more options than ever before, learning at their convenience from home, the coffee shop, or the classroom.


5 Steps To Create A Culture Of Leadership

Creating a culture of leadership is a key component in your companies’ ability to grow year over year. It is not something that can be implemented; rather a culture of leadership evolves organically by taking the necessary steps and investing the time and resources that are required to create leaders not only at the top level, but throughout your organization. For a culture of leadership to exist, companies must first define it. This definition needs to be based on core leadership capacity principles and “must have” characteristics. These can be uncovered through internal reflection and an assessment of the company leaders which we discussed in our last article. However, culture should not be developed strictly through a top down approach.



Quote for the day:


"There is a difference between listening and waiting for your turn to speak." -- @SimonSinek


Daily Tech Digest - November 12, 2016

Cognitive computing systems a natural fit for IoT devices

Analyst firm Gartner forecast 6.4 billion connected devices will be used worldwide in 2016, jumping to 20.8 billion by 2020. But many of those devices will be relatively dumb, including things like fitness trackers, connected speakers and cameras. The real value from internet of things (IoT) devices could come from backing up a data connection with cognitive computing systems. This turns a connected device from something that strictly generates data into something much more interactive. Thomas Jefferson University Hospitals is using a similar approach to help improve the patient experience. The health system recently unveiled a speaker and microphone system that can be embedded in patient rooms. Patients can speak questions about hospital services or commands that control the room's heating and cooling, lighting and entertainment systems.


Active Cyber Defence - tackling cyber attacks on the UK

There’s a common complaint from industry to governments about cyber security. It’s generally that governments tell them they’re not doing enough and must do more, often without really understanding the real-world impacts or commercial implications of their demands. ... We’ll be eating our own dog food to prove the efficacy (or otherwise) of the measures we’re asking for, and to prove they scale sensibly before asking anyone else to implement anything. The ACD programme is intended to tackle, in a relatively automated way, a significant proportion of the cyber attacks that hit the UK. Automation means the measures scale much better. It's not a panacea but should help us mitigate the impact of a significant proportion of the attacks we see. It won't affect the really targeted attacks (at least initially) but we're hoping that we can reduce the noise enough to make the defenders' jobs easier when tackling those very targeted attacks.


Global industry groups voice opposition to China cyber security law

In their letter, the groups warned that Beijing’s efforts to control more of China’s Internet and technology would “effectively erect trade barriers along national boundaries” while failing to achieve its security objectives. The cyber security law would also burden industry and undermine “the foundation of China’s relations with its commercial partners,” the groups wrote in a letter addressed to the Chinese Communist Party Central Leading Group for Cyberspace Affairs. The letter’s signatories include the Information Technology Industry Council, the Internet Association, the U.S. Chamber of Commerce, the Australian Industry Group and BusinessEurope, among others. The law’s adoption comes amid a broad crackdown by President Xi Jinping on civil society, including rights lawyers and the media, which critics say is meant to quash dissent.


How Facebook Is Transforming Disaster Response

This new incarnation of Safety Check begins with an algorithm that monitors an emergency newswire—a third-party program that aggregates information directly from police departments, weather services, and the like. Then another Safety Check algorithm begins looking for people in the area who are discussing the event on Facebook. If enough people are talking about the event, the system automatically sends those people messages inviting them to check in as safe—and asks them if they want to check the safety of other people as well. In other words, the system is driven by Facebook algorithms first, and then it’s driven by the choices and behavior—and white-knuckle worries—of people on the ground.


Bringing the Power of Platforms to Health Care

Despite healthcare’s remarkable track record holding out against the tides of change, there are finally holes in the dam. The healthcare internet is emerging node-by-node, provider-by-provider, and patient-by-patient. So, there’s really no longer a question of whether healthcare will join the rest of the economy and concede to the inevitable. The real question is what it will look and feel like for patients and providers once care is connected and the “network effect” begin to take hold. It turns out we have a pretty good sense of what’s to come because we know what AirBnB has done to hotels (and homes), Waze to GPS systems and fold-up maps, and Uber to taxis. To us, these disrupters illustrate well the three dimensions of the network effect that is poised to transform healthcare: administrative automation, networked knowledge, and resource orchestration.


Travis CI Tutorial: Java Projects

This post describes how to achieve all the desired features using a whole new stack that might not be familiar to enterprise Java developers. GitHub was a perfect match. Then I went on to search for a Jenkins cloud provider to run my builds… to no avail. This wasn’t such a surprise, as I already searched for that last year for a course on Continuous Integration without any success. I definitely could have installed my own instance on any IaaS platform, but it always pays to be idiomatic. There are plenty of Java projects hosted on GitHub. They mostly use Travis CI, so I went down this road.


How to automate the enterprise: Your guide to getting started

In order for businesses to identify which roles are automatable, they will likely need to first document their processes in detail. "If you analyse all of the activities that everyone is doing in the organisation you can get a sense for which of those might be more automatable than others," said Chui. Neil Kinson, chief of staff at enterprise process automation specialist Redwood Software, recommends creating what he calls a 'robotization centre of excellence' that collates the processes taking place across the business. "It really is teaching people how to both document their process and turn that documentation into what effectively becomes a robot design," he said, using the term 'robot' to refer to the software carrying out the automation.


Why CIOs must step up to lead digital transformation efforts

"CIOs are probably the most equipped to look at the whole iceberg—they need to be front-and-center for the digital transformation," Kark said. "If they're not, it becomes an issue for business leaders, because they are only looking at the front-end stuff, not the whole picture." Though many CEOs recognize this, CIOs are often relegated to just managing technology as the extent of their role, Kark said. "Some of it is that CIOs are not raising their hands to say, 'We are ready to do this,'" Kark said. "Maybe they don't have the credibility or influence, or haven't proactively said they can help." "If CIOs don't step up, other business leaders will, who are only looking at the tip of the iceberg and aren't setting up for success," Kark said. "CIOs better understand the enormity of [digital transformation] efforts, and can articulate that to their business peers."


6 Ways To Add Cybersecurity Protections To Outsourcing Deals

The increasingly complex and geographically dispersed IT environment also complicates matters. When company data lived within one or more central data centers, it was much easier for companies or their suppliers to secure the perimeter with, for example, firewalls, physical security and controlled logical access. Today, data is scattered among data centers, clouds, and mobile devices, for a start. “The points of access and potential points of security failure multiply with this ever expanding ecosystem,” says Eisner. “In addition, many of these systems are provided or managed by third party suppliers.” For those reasons, CIOs must take a risk management approach to selecting, contracting with, and monitoring their company’s IT service providers.


Are regulations the answer to better Internet of Things security?

Regulations, whether or not anyone likes it, can be a very effective hammer for greater good. From improved health monitoring to safer highways to smart homes, IoT has already begun to touch the lives of millions of Americans and will become truly transformational in the years to come. Gartner forecasts that 6.4 billion connected things will be in use worldwide this year, up 30 percent from 2015, and will reach 20.8 billion by 2020. Unfortunately, all those new connected devices also represent the next frontier for hackers. Gartner predicts that more than 25 percent of identified attacks in enterprises will involve IoT devices by the end of the decade. Yet too little attention has been paid thus far in protecting them. 



Quote for the day:


"Leadership is a potent combination of strategy and character. But if you must be without one, be without the strategy." -- Norman Schwarzkopf


Daily Tech Digest - November 11, 2016

Hedge Funds Beware: Most Machine Learning Talk Is Really ‘Hokum’

Giants like Bridgewater Associates and smaller firms such as Highbridge Capital Management and Simplex Asset Management in Japan are developing machine learning or investing in it. The next-generation algorithms, which build on the statistical tools quants have used for years, plow through financial, Internet and satellite data to find unusual patterns. A certain default premium combined with a particular yield-curve slope, for example, might produce a high probability that a stock price will rise or fall. Finding such “signals” to wager on is the holy grail. Many say AI will shake up the industry. Fifty-eight percent of managers in a recent KPMG survey said the technology will have a medium-to-high impact on the way hedge funds operate in the future.


Can we prepare for the jobs that don’t exist yet?

Ultimately technical know-how always need to be backed with something else – just as accountants still tend to do better at work if they’re easier to get on with. “Soft skills set humans apart in an age of automation and robotics,” suggests Steve Hill, External Engagement Director at The Open University. “Adaptability is itself a key soft skill that will become increasingly important as individuals have to adapt to jobs that haven’t even been created yet. Businesses need to facilitate a process of knowledge sharing – between different departments, diverse employees, and even between businesses – to boost this adaptability.” Watkins of Tyche Leadership adds that for businesses “future proofing themselves will be more about hiring people with resilience.”


Managing multiple clouds requires careful choice, architecture planning

One of the ways that companies can manage multiple clouds is before the cloud is selected, by choosing additional services wisely. Bartoletti recommends following the apps to the cloud, not the other way around. "Let your app needs drive your choice of clouds, not today's compute or storage prices - they will keep dropping," he said. Higher value services like database, analytics, mobile platforms, and integration tools should guide the choice, he added. Additionally, some companies try not to use proprietary cloud services like AWS Lambda or Google BigQuery because they're concerned about being locked into that choice, according to Mike Kavis, vice president and principal architect at Cloud Technology Partners.


Are Consumers Accepting Data Breaches As The New Normal

Across the board, consumers demand more privacy and protection but are unwilling to use privacy enhancing systems such as Virtual Private Networks or in some cases even basic security software. Of course, even if they take measures to protect their information, if the business’s own security is compromised, no measures the consumer takes on their end will keep their information safe. For this reason, many consumers have simply accepted that a data breach will happen at some point. Unfortunately, this acceptance makes it easier for hackers. If consumers stop reporting, companies will not know of any security issues and some may even stop caring about cybersecurity. This will eventually embolden more hackers to attempt data breaches as they are less likely to suffer repercussions for their actions. This is a downward spiral that can get dangerous quickly.


The ‘real situation’ on the Internet of Things 2017-2027

“IoT centres around things collaborating for the benefit of humans without human intervention at the time. It does not include the Internet of People which is a renaming of the world of connected personal electronics operated by humans: it has completely different characteristics and it is cynical to conflate it with IoT.” Nevertheless, says Harrop, “we show how IoT nodes can be on people and quantify the appropriate part of wearables market because is relevant. The report explains further with a host of examples and options, even giving forecasts for agricultural robots following several respondents seeing agriculture as an important potential IoT market.” Harrop proudly boasts: “Because we run our own IoT events, we get the inside track first.”


Robots present a cyber risk

The difference between actual and potential risks with robot security incidents “is a function of the complexity of the algorithms used by robots, and the physical and social context of their operation, and their numbers,” says Tom Atwood, executive director of the National Robotics Education Foundation, which provides educational information about robotics to students, educators and professionals. ... “These contexts are growing in number as physical and virtual robots proliferate in all spheres of human endeavor,” Atwood says. Many organizations that operate autonomous machines such as industrial robots mistakenly think they will not be targets because the machines don’t process personal information or financial information. The same goes for companies that produce the machines.


Mastercard using selfies to prove cardholder identity

"Passwords are obviously a challenge to deal with, prone to compromise and difficult to remember," said Dennis Gamiello, Mastercard's vice president of identity solutions, who said the company also considered using fingerprints. "Everything we do needs to be about choice and great consumer experience and can scale. ... Not every phone has a fingerprint reader. It may not work for everyone. Most smartphones have front-facing cameras. This biometric double-check is used for what are called "card not present transactions," such as online purchases. An alert would be sent to the user's registered smartphone, asking for authentication, which comes in the form of a selfie. The cardholder has a certain amount of time in which to respond to the query.


Can Low-Power Devices Be Secure?

The attack surface increases with connected cars. “It’s really important that cars, overall, the system-wide approach is taken for their security, and that people think about security from the overall vehicle electronics system, and not just their individual chip or ECU,” said Turner. “So, that’s presenting a whole new challenge to the automotive industry, which is used to getting bits from all sorts of people in the supply chain and just putting them together without having to think necessarily about system-wide security.” He noted that both internal and external connections need to be secured. Microcontroller suppliers were on a panel at ARM TechCon, addressing the topic of IoT and security, moderated by Nandan Nayampally, vice president of marketing for ARM’s CPU Group.


Next Career Step for Best and Brightest CDOs? How About CEO?

“Organizations that have made the strategic decision to introduce the CDO role are looking to get as much new value as possible from this position,” the study continues. “Thirty percent of the surveyed CDOs said they report directly to the CEO. CDOs are adding to the competitiveness of their companies by contributing to strategic planning and decision making, and by leading digital business initiatives.” As a result, Gartner predicts that, by 2020, 15 percent of successful CDOs will move into CEO, COO, CMO or other C-level positions. Why all this optimism? Because of the growing number of organizations that are really taking seriously the value of their data, and that want somebody to take charge of it. According to Gartner, the office of the CDO is being established as an operational department with the appropriate staffing, budget and responsibilities.


Singapore has committed to eGovernment but what about the rest of Asia?

The Government Technology Agency, or GovTech, was recently created to head up the launch of these services and provide engineers for the government’s various Smart Nation projects. It is unlike the Info-communications Media Development Authority (IMDA), which is usually at the forefront of Singapore’s tech talk and builds connections with the private sector. GovTech on the other hand is tasked with reinventing the public sector. GovTech’s remit will cover cybersecurity, digital infrastructure for government, data science, data analytics, and app development. One of its most ambitious tasks is creating a one-stop vault where citizens can access and manage all of their personal data. This will tie into collaborations with the Ministry for Finance, where data can be automatically pulled from the vault to fill in forms for things like tax returns, loans, or public housing applications.



Quote for the day:


"A big part of leadership is just being comfortable with the fact that some decisions really are only yours." -- Helene D. Gayle