Daily Tech Digest - January 02, 2017

Cognitive on Cloud

Referred to as “Cognitive on cloud”, this model delivers cognitive services running in the cloud that are consumable via representational state transfer (REST) APIs. These services are available as part of platform-as-a-service (PaaS) offerings such as Bluemix and can be easily bound to an application while coding. Using this approach, cognitive analytics such as voice (tone analyzer, speech-to-text) and video (face detection, visual recognition) capabilities enables quick analysis of petabytes of unstructured data. Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. In addition to this basic analysis, an organization must consider which cloud is cognitive enabled at the Platform-as-a-Service (PaaS) layer.


High versus low-level data science

Access to highly granular (low-level) data was not easy to get, and dashboard summaries, carefully selected and crafted, were sufficient to detect and address the issue with a one-week turnaround, doing a number of tests described in the next section. More specifically, we used the Google Analytic dashboard. We did not access granular metrics such as IP address, detailed log-file transactions, or summary statistics broken down by user agent / referral combinations (not available from the dashboard). But we did use session duration, number of pages, and conversions, per day per referral, probing the summary data sometimes 2-3 times per day to check the results of a number of tests and fine-tuning, in short to check and quantify impact on performance. Performance here is measured as the number of real (not bogus) conversions per click, or conversion rate.


IT pro's revitalization guide 2017

IT pro's 2017 revitalization guide Before 2017 comes at us hard, take a moment to restock your your intellectual reserves with our most insightful tech-management articles and videos. No matter how long you've been in IT, it's always a good idea to pause periodically and take stock of your professional and personal progress. Why not take a few moments to read through the best of Computerworld's management and career coverage? Scroll down to browse the complete list or click a link to skip directly to your chosen topic. ... Many IT professionals say they would go all-out to land the best jobs, with the best benefits at the best companies. All it takes is up-to-the-minute skills and a whole lot of drive. ... You’re killing it at work, but does anyone notice? A large percentage of IT professionals say the answer is no.


4 information security threats that will dominate 2017

"The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of trusted organizations," Durbin says. "In 2017, we will see increased sophistication in the threat landscape with threats being tailored to their target's weak spots or threats mutating to take account of defenses that have been put in place. Cyberspace is the land of opportunity for hacktivists, terrorists and criminals motivated to wreak havoc, commit fraud, steal information or take down corporations and governments. The solution is to prepare for the unknown with an informed threat outlook. Better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high-impact security events." The top four threats identified by the ISF are not mutually exclusive. They can combine to create even greater threat profiles.


Artificial intelligence takes on machine reading

Artificial intelligence (AI) made incredible strides in 2016, and the growth appears set to accelerate as we enter the New Year. A team of Microsoft researchers has released a dataset of 100,000 questions and answers that other AI researchers can use – for free – in their quest to create systems that can read and answer questions as well as a human. The MS MARCO dataset is based on anonymized real-world data from Bing and Cortana queries and is part of an attempt to spur the breakthroughs in machine reading that are already happening in image and speech recognition. The move is also aimed at facilitating advances toward “artificial general intelligence,” or machines that can think like humans – and can read and understand a document as well as a person.


The First Quantum Revolution: Foundational information for the enterprise CTO

Quantum physics helped us understand the periodic table, chemical interactions, and electronic wave functions that underpin the electronic semiconductor physics. In fact, there are many devices available today which are fundamentally reliant on our understanding the effects of quantum mechanics. These include the transistor, lasers, GPS, semi-conductor devices and MRI imagers. These devices are often referred to as belonging to the 'first quantum revolution’. What’s amazing is that within one silicon chip there are about 3 billion transistors, enabled by the progress of this first quantum revolution. And they all have to work reliably so that your computer, your mobile phone or whatever you have actually works. Now that’s quite amazing. Just think about that now. If you look around you now, we all carry around our personal electronics.


Hands On: DELL Twists The XPS 13 Into a 2-In-1

Dell claims the battery life of the XPS 13 2-in-1 ranges from nine to 15 hours, depending on how you use it. The battery life goes up if you're doing basic productivity work and declines to around nine hours if you are watching Netflix movies. The XPS 13 2-in-1 is a step down in performance compared to the XPS 13 laptop, but the decline is not visible when running basic applications or graphics. The device has a 7th Generation Intel Core i5-7Y54 or Core i7-7Y75 processor, which aren't as speedy as the mainstream Kaby Lake-based Core i3, i5, and i7 processors offered in the XPS 13 laptop. An Intel integrated GPU can support 4K graphics play-back on external displays. Dell went with the Y-series Kaby Lake chips so the XPS 13 2-in-1 can provide long battery life, compared to tablets today.


Privacy is still alive and kicking in the digital age

With the current digital infrastructure, we are heading in the wrong direction: Individuals are becoming more and more transparent, open to different types of control, manipulation and discrimination, while the powerful — government, industry and organizations — are more and more closed off. Freedom, individual independence and democracy are fundamental reasons why the individual right to privacy is something we should all care about. Privacy is a universal human right penned in international conventions, declarations and charters that were formalized at a time in history when private life was the default. There were clear lines and limits between private homes and public streets and buildings, between a private person and the public authorities and spaces. It was the letter in the sealed envelope.


Hackers will grow increasingly bold in 2017

Nothing is safe. Not your email, your personal information, your photos, your files. If it’s stored online, it’s theoretically accessible to anyone with the skills and wherewithal to grab it. According to the Identity Theft Resource Center, nearly 900 million records might have been accessed in almost 7,000 known data breaches since 2005. The actual number of breaches is undoubtedly higher because not all security lapses are publicized. A few weeks ago, Yahoo reported what is believed to be the single largest security breach ever — 1 billion user accounts potentially accessed in August 2013. Yahoo said it only discovered the incident recently, which does little to ease concerns. The attack apparently was unrelated to a separate breach in 2014 involving 500 million accounts, which Yahoo revealed in September. The company blamed that one on an unnamed foreign government.


Mitigating internal risk: Three steps to educate employees

When employees first start it’s important to give them a list of the top 10 rules they should follow regarding IT practices. If you know the rules that are violated the most, it’s suggested that those should make the top of your list. If you don’t then a good way to find out is to use monitoring techniques that will help you to collect this data. There’s a high chance you’ll be surprised by the type of rules people violate. Some examples of no-no’s can include attaching company files to personal e-mails, putting data on non-encrypted USBs, uploading files to cloud drives etc. Yearly training and reminding sessions should also be implemented as a part of company strategy. One of the most effective tactics is to inform users that they are violating policies while they’re attempting to take the action.



Quote for the day:


"A clear rejection is always better than a fake promise. Move on, next "-- @stephenodonnell


Daily Tech Digest - January 01, 2017

7 IT Recruiting Predictions For 2017

In 2016, recruiters grappled with an evolving job market, an incredibly competitive hiring landscape, a shortage of IT talent and sky-high salaries for in-demand roles. Those trends are likely to continue into 2017 as recruiters continue to adapt to the this high-demand, low supply hiring landscape, says Dave Morgan ... "We're very optimistic about what 2017 will hold. We don't see the IT market slowing down at all -- we saw a slight tick downward in the fall, but that demand has picked back up along with the urgency from clients around that demand," Morgan says. The three hottest areas of demand are around security, big data and cloud technologies, Morgan says, as incidents like December 2016's Yahoo breach dominate headlines, organizations struggle to manage and make sense of a tsunami of data and leverage the cloud for more efficient, cost-effective computing power.


IoT, mobility, big data, analytics and imaging intelligence to impact healthcare in 2017

The next generation hospital management system is a long term transformation plan for a three years’ horizon. ... But we are trying to see how we can stage it into two phases, so the phase one can be done by 2017 end and second phase by 2018. So we are trying to make sure we stay focused because beyond three years, you kind of lose oversight on it, then the project becomes really unviable. That’s the first priority we are holding to ourselves. On the cyber security side with the recent ransomware kind of news coming in, where patient records have been attacked by hackers and rasonware, etc., and since we are also moving towards web managing mode with payment gateways for websites and patient related portal which will have patients medical records, hence we thought that we should be upfront from cyber security stand point rather than the post-mortem effect. So that is becoming core in our focus area.


AngularJS vs. React: Two JavaScript Technologies & How to Use Them

React shines when you have lots of dynamic content changing within the view. Most client-side solutions on the web today struggle with rendering large lists of items within a single view. This “struggle” may be on the order of milliseconds, but in this increasingly digital world, a half a second delay is all it takes to kill your user experience. It’s why sites that have a lot of dynamic, constantly changing, data-intensive content like Instagram or Facebook choose to power their applications with React. As a library, you can also use React as the view component of AngularJS or other frameworks, because it does not tie you to a specific technology stack. That said, there’s a quickly growing community and a number of existing libraries and add-ons that can help you build an app from scratch.


Big Data, Big Self-Service

Data self-service became much more prevalent. It is not entirely trivial to organize. Best practices demand that effective access management security, and where necessary, encryption, is in place. There may also be a need for metadata capture software and data cleansing software. However, the pay-off is significant. The main dynamic of this is that the user no longer needs to go cap-in-hand to some IT developer to get access to data. In most organizations, there are limits to what can be held in a data warehouse and there may even be onerous procedures for getting at that data. To add new data sources to the data warehouse would often be prohibitive. The difference with a data lake can be startling. The data lake is, or should be, a single staging area for new data within the organization. It is extensible.


Information architecture: The key to governance, integration and automation

To develop a successful information architecture and meaningful insights, we need to enforce collaboration across business units, IT, the CDO office and other parts of the organization. And perhaps more importantly, we need to change the culture to get people thinking of how new technologies help eliminate all the barriers and create an environment in which everything is automated and transparent. Thinking about information taxonomy and classification isn’t necessary. Tools are just the tools, and we will continue to live in the past without proper collaboration, information sharing, knowledge base building and adoption of a new way of thinking about information. Technology is enablement; people need to understand, change the processes and do so using technology’s help.


Want to make better decisions? Break down the wall between data and IT

There is a lot of hype around the deficit of data scientists for hire, but I believe that you do not need an army of data scientists to make meaningful discoveries. With the tools and systems available today, it is possible for even one or two talented, motivated data scientists to create game-changing innovation. The key is to hire carefully, looking for strong training in quantitative disciplines (pick your favorite, it really does not matter), allied with the mindset of a restless tinkerer.  As a leader, I try to cultivate growth, autonomy, and teamwork throughout the company. This allows the company and data team to attract talent that wants to work with us and who has the same goals in mind. As a company, we aren’t just looking for people who have a degree in analytics or experience in the field. In fact, we have over 30 different graduate degrees on our team.


Using data science for predictive maintenance

Early identification of these potential issues helps organizations deploy maintenance team more cost effectively and maximize parts/equipment up-time. All the critical factors that help to predict failure, may be deeply buried in structured data like equipment year, make, model, warranty details etc and unstructured data covering millions of log entries, sensor data, error messages, odometer reading, speed, engine temperature, engine torque, acceleration and repair & maintenance reports. Predictive maintenance, a technique to predict when an in-service machine will fail so that maintenance can be planned in advance, encompasses failure prediction, failure diagnosis, failure type classification, and recommendation of maintenance actions after failure.


Ooutsourcing Trends To Watch in 2017

This year, we saw outsourcing integration challenges multiply, production workloads and enterprise systems hit the cloud, and security hit the top of the agenda. So what’s ahead for 2017? Uncertainty for one thing. Industry watchers expect a number of shifts in the IT and business process services space — not least of which will be the initiation of more flexible outsourcing terms as the world watches and waits to see what happens once president elect Donald Trump takes office and Brexit takes hold. We also expect to witness maturation in cloud computing, robotic process automation (RPA), and cognitive capabilities while entities like the call center and business models based solely on labor arbitrage fade into history.


How to Use AOP in C# with NConcern .NET

Most AOP frameworks require compromises due to technical limitations (changes needed in the source code, changes in the compilation or deployment process). Few of them are simple to handle and the coupling with the framework is often too strong. This is one of the reasons why too few people are interested in aspect-oriented programming. However, the application of the concepts of aspect-oriented programming is very simple provided they are well understood and have the right tools. This is why I would like to share with you a basic AOP scenario using NConcern .NET, a dedicated open source framework (under MIT licence)


Java Performance Mythbusters

The JVM can be more aggressive in its optimizations through its knowledge of exactly which classes are loaded at any point in time. Even the problem of application warmup can be alleviated with technologies like Azul’s Zing ReadyNow!, which stores a profile of an application during execution. At startup, the profile can be used to substantially reduce the time required to analyze and compile frequently used sections of code. The problem is that some people still believe Java works the way it did twenty years ago when looking at Java performance. One of my colleagues, when I was at Sun, had an excellent way to illustrate this. When talking to people with Java performance problems his approach was something like this



Quote for the day:


“The secret to a rich life is to have more beginnings than endings.” -- Dave Weinbaum


Daily Tech Digest - December 31, 2016

Who controls the marketing tech stack in 2017: The CIO or CMO?

Perhaps the most significant trend is that CIOs are facing ever-tougher competition today for their internal customers. In an earlier era, one simply had to go through the IT department to get the technology one needed that would actually work with the existing infrastructure, technology standards, and enterprise architecture. No longer. The cloud and especially software-as-a-service (SaaS), has changed this equation forever. Every IT department is now faced with the most formidable possible day-to-day competitor: The combined services inventory of the entire SaaS industry, along with all the available mobile and enterprise app stores. These new sources of marketing IT collectively represent to the CMO ... a genuine explosion of new options, going from a mere 150 business-ready marketing apps in 2011 to over an astonishing 3,500 in 2016.


Blockchain technologies entered the trough of disillusionment in 2016

More importantly, digital assets are designed for today’s era of digital information, and the underlying blockchain technology has the power to completely overhaul the current financial system, making it more efficient, transparent and accessible. When taking a look at the industry over the last 12 months, the first quarter of this year saw total investment in blockchain startups topping a staggering $1 billion. But that investment is starting to pull back. In the first nine months of 2016, blockchain startups raised $429 million across 92 equity financings. Compared to the same period in 2015, the deal activity fell this year by 16 percent, and funding was down by 7 percent. And we are already seeing some of this reticence play out in the market. For example, just last week, Circle announced they were pivoting away from the buying and selling of bitcoin through their wallet app.


10 Things InfoSec Pros Can Celebrate About 2016

According to an HP study earlier this year, the Android operating system is the second-most heavily targeted operating system with the second-most vulnerabilities, after Windows. Fortunately, in July, Google announced new measures to increase memory-level protections and reduce the overall attack surface of Android’s Linux kernel. ... It's no secret that breaches cost companies a pretty penny, but so often the costs are residual -- lost business, breach notifications, fines for late breach notifications -- but not punishments for the bad security itself. This year, however, some companies felt an extra sting for failing to protect their customers in the first place. ... Congratulate the San Francisco Municipal Transit Agency (SFMTA) for sticking up to ransomware operators, despite most likely losing money in the process. Instead of paying their $73,000 ransom demands, SFMTA gave passengers free rides at affected stations for days while they dealt with the situation.


IT mindset: CIOs, tech departments work to overcome the 'IKEA effect'

That's easier said than done, of course. Getting themselves and their IT departments to adopt those ideas requires a shift in IT mindset, which, in turn, calls for a fair bit of psychology. Interviews with CIOs and organizational experts, however, suggest that change is indeed possible -- with a regimen that includes rethinking cherished beliefs and working to overcome barriers that impede a new work culture. Atilla Tinic, CIO at Level 3 Communications, has an educational background in IT, with a focus on software development, economics and psychology. He says, somewhat facetiously, that the last degree sometimes proves the most valuable. "It might be the psychology that helps me the most at times," he said. "Change management is one of the hardest things [and] I think the IT transition might be one of the most challenging."


Citizen Data Scientist, Jumbo Shrimp, and Other Descriptions That Make No Sense

Data scientist often frames a question into its business value and data context. It makes question more readable. Those questions could go in several different levels so rather than asking it all in one, the question itself could be break down into smaller business questions. There are methods to further reduce complexity by dimension reduction, variable decomposition or principle component analysis, etc. There are many analytic algorithm and modeling options. Choosing a proper algorithm could be a challenge. The alternatives are to run large number of algorithms to search. With that, large number of results will need to be analyzed. Interpreting results is a complex task. By running a large number of algorithms, the results tend to partial converge or partial conflicting. The conflict resolution and the weights of the variables require further modeling or ensemble.


Expect Deeper and Cheaper Machine Learning

“Everybody is doing deep learning today,” says William Dally, who leads the Concurrent VLSI Architecture group at Stanford and is also chief scientist for Nvidia. And for that, he says, perhaps not surprisingly given his position, “GPUs are close to being as good as you can get.” Dally explains that there are three separate realms to consider. The first is what he calls “training in the data center.” He’s referring to the first step for any deep-learning system: adjusting perhaps many millions of connections between neurons so that the network can carry out its assigned task. In building hardware for that, a company called Nervana Systems, which was recently acquired by Intel, has been leading the charge. According to Scott Leishman, a computer scientist at Nervana, the Nervana Engine, an ASIC deep-learning accelerator, will go into production in early to mid-2017.


How AI is Revolutionizing Business Models

Most of the considerations made so far were either general or specific to big players, but we did not focus on different startup business models. An early stage company has to face a variety of challenges to succeed, and usually, they might be financial challenges, commercial problems, or operational issues. AI sector is very specific with respect to each of them: from a financial point of view, the main problem regards the absence of several specialized investors that could really increase the value of a company with more than mere money. The commercial issues concern instead the difficulties in identifying target customers and trying head around the open source model. The products are highly new and not always understood, and there might be more profitable ways to release them.


How Will Big Data Evolve in the Year Ahead?

"Near-term opportunities for cognitive systems are in industries such as banking, securities and investments, and manufacturing," IDC program director Jessica Goepfert said in an October statement about a report on global cognitive computing and AI spending. "In these segments, we find a wealth of unstructured data, a desire to harness insights from this information, and an openness to innovative technologies." In its report, IDC predicted that healthcare and manufacturing will be the biggest drivers of cognitive computing and AI revenues between now and 2020, while the education sector will also invest heavily in such technologies. Earlier this month, Tony Baer, principal analyst in information management at Ovum, predicted that machine learning in particular "will be the biggest disruptor for big data analytics in 2017." That trend will also make it increasingly important for organizations to treat data science as a "team sport," he added.


What a Game-Changing Smartphone Would Need to Do Differently

The smartphone has become a commodity to us. You don’t need to own the latest and most expensive model of all, but you are very likely to use a smartphone. There is even a small group that owns and uses a variety of smartphones. But don’t you feel that product innovation has stalled for a while? What was really new in recent years? Bigger display, smaller frame, better camera, stereo speakers, waterproof casings? All really nice but did they really change the game? No. There has not been a disruptive innovation in the mobility area since Steve Jobs was around. Not that he hoarded all the ideas and was the only thinker of our time, but he was driving disruption and therefore he was also pushing the competing manufacturers to be innovative.


How Chatbots Talk Up IoT Measures in Analytics

Bot adoption is a confluence of two key technological and marketplace trends over the last few years. First, bots reflect the popularity of instant message platforms, a derivative of social media. Instant Messaging (IM) platforms include Facebook Messenger, Slack, WhatsApp, and Telegram. People have been steadily using these platforms. Back in 2015 Business Insider declared that IM platforms have more active users than any other internet application including social networks and email applications. Many bots are designed to complement services with these applications, in the same vein as being an extension for browser or an API for software. And many of the users access these applications on mobile devices, giving bot makers a dedicated avenue to connect with customers.



Quote for the day:



"Don't ever be afraid to admit you were wrong. It's like saying you're wiser today than you were yesterday." -- Robert Newell


Daily Tech Digest - December 30, 2016

3 reasons why #FinTech may decline in 2017

In my humble opinion FinTech is addressing a customer experience driven demand strongly supported by technical evolution such as mobile, cloud, big data, etc… Has the disintermediation of banks started? While the rest of the world is changing rapidly, banks are still struggling to survive the regulatory tsunami which has not ended yet. And FinTech became a real hype strongly attracting millennials to become part of it. Hipsters created start-ups to change the banking landscape. Venture Capitalists supported this evolution and heavily invested in the first waves of disruption. Isn't #FinTech disillusioned and will this not lead to a decline in 2017? And will enlightenment come from new kids on the block? Here are 3 reasons why "hashtag"FinTech may decline in 2017


Everything You Need to Know About Gene Therapy’s Most Promising Year

It sounds complicated, and it is. Gene therapy was first tested in a person in 1990, but scary side effects turned the gene-fix idea into a scientific backwater. And the field hasn’t conquered all its problems. We started the year with the tale of Glybera, heralded as the first gene treatment ever approved that sought to correct an inherited gene error. Yet the drug came with an eye-popping price tag of $1 million and, dogged by questions over how well it works, has turned into a medical and commercial flop. But scientists haven’t given up. And neither have biotech entrepreneurs. They’re closer than ever to proving that gene therapy is for real. Here’s what happened in 2016.


What's your CIO legacy? Deloitte has some ideas for you

Last year for its CIO Legacy Project, Deloitte researchers wanted to pinpoint the methods, tools and competencies CIOs used to create value for their organizations. "To a little bit of our surprise, there wasn't a lot of difference across industries and geographies," Kark said. Instead, they uncovered three roles that CIOs take on to do this -- the trusted operator is focused on operational excellence; the change instigator is focused on business transformation; the business co-creator is focused on revenue and growth. This year, researchers wanted to know what characteristics are associated with each of the three "pattern types," be it personality, leadership skills, working style or IT capabilities. They hypothesized, for example, that trusted operators would be more risk-averse and less outgoing than change instigators and business co-creators.


Test Systems — The Soft Underbelly of System Security

If you improve the security of your test systems, you can also help your Development and QA teams by providing a safe, well-monitored environment in which you can test and deploy updated applications, test applications to recently released security patches, and improve the overall understanding of the way your projects provide access to the outside world. In other words, improved security improves the QA ability of your systems by providing another valuable perspective on the development and execution of your systems. Increasing the isolation of a system should always lead to increased security, knowledge, and testability of that system — goals that will help to unite the QA/SRE, Operations, and Security teams. Given the importance of security, then, it is critical that you follow defined policies and procedures to ensure that your test systems are as secure as possible and don’t expose existing vulnerabilities or create new ones.


Automation, Analytics and APIs: How NFV is Driving Service Assurance Innovation

Investing in new-generation analytical capabilities that are optimized for today’s hybrid NFV environments will help CSPs to better realize the full value of their NFV investments. An example of such advancement is utilizing natural-language processing algorithms for eliminating data normalization and clean-up requirements in alarm data, and using machine-learning techniques to support advanced correlation and RCA, without the need to augment alarm data with network topology and reference information, and so on. This typically becomes an inhibitor to an analytics project’s success, as the data often isn’t readily available or requires a significant integration effort. Our recent efforts in this area have surpassed even our own expectations.


Why Employees Could Be the Biggest Threat to Healthcare Data Security

Businesses across industries are also incorporating bring your own devices (BYOD) into their corporate IT cultures. By doing so, employees are now able to work on the device or devices that they are comfortable using, while saving costs that would accompany providing work-sponsored devices. However, because of the ease of onboarding mobile device, including connected wearables, it has now become commonplace at some organizations for unauthorized devices to find a way to connect to the network. Sriram Bharadwaj, director of information services at the University of California (UC) Irvine Health in Orange, Calif., has said, "In the old days, you accessed electronic health records from a PC at your desk.


5 ways healthcare providers can transform chaos into order

The easy way out — investing billions of dollars to expand facilities, extend operating hours and add staff — seems out of reach for most healthcare providers and looks more like a bandage than a cure. In the past few years, we have worked with a number of large healthcare organizations to address this problem. Drawing upon our decades-long experience helping Fortune 500 companies make operational improvements, and by employing lean principles and predictive analytics, we set out to find the root cause of this operational paradox: Vital resources are often both overbooked and underutilized on the same day. Here are five practical approaches to improving patient access, decrease wait times and reduce healthcare delivery costs without embarking on multi-year, budget-stretching mega projects.


I, Robot: How AI is redefining the use of data in healthcare

Facing up to such a huge challenge, researchers are turning to the technological advancements that will allow them to bolster their analytical abilities, both in terms of handling volume and increasing accuracy. Acknowledging this opportunity, technology firms are more than happy to respond to the call for support. McKinsey's analysis of this space has recently suggested that the use of data handling strategies for pharmaceutical research could create up to $100bn in cost savings per year, and that is just in the US. The global potential for efficiency savings is huge. Today the data problem for pharmaceutical firms is not just the volume but also its organisation within their databases. Following years of merger and acquisition activity, different research departments often work in silos, cut off from sharing information effectively between them.


5 signs we're finally getting our act together on security

Security experts have been warning for some time about the millions of devices that are connected to the internet without even the most basic security features, so the Mirai attack shouldn’t have been a surprise. And with Mirai’s source code publicly available, it is safe to assume there are other IoT botnets waiting in the shadows to strike. With all these devices connecting to the internet, we are ripe for an IoT worm, said Lamar Bailey, senior director of security research and development at Tripwire. Fixing the problem will require a lot of coordination, creativity, and persistence, but perhaps people are actually seeing the risks. The silver lining is that the Mirai attack was a “fairly cheap lesson in what a compromised IoT [threat] would look like while there’s still time to do something about it,” said Geoff Webb, vice president of solution strategy at Micro Focus.


Will networks and security converge in 2017?

Service chaining provides a framework to address the basic security issues, but enterprises still face the challenge of creating instances of that service across hundreds of application, user types and sites. A high-degree of policy integration and automation is needed to make that enterprise WAN management feasible. SD-WAN and security parameters should ideally be defined and delivered through one interface. The necessary tools should then be able to push those policies out across the infrastructure. Many leading SD-WAN providers offer those capabilities, but even then the networking and security analytics remain separate. There is no way, for example, to minimize security alerts storms for security operations personnel by correlating security and networking information.



Quote for the day:


"The very exercise of leadership fosters capacity for it." -- Cyril Falls


Daily Tech Digest - December 29, 2016

4 Information Security Threats That Will Dominate 2017

"The pace and scale of information security threats continues to accelerate, endangering the integrity and reputation of trusted organizations," Durbin says. "In 2017, we will see increased sophistication in the threat landscape with threats being tailored to their target's weak spots or threats mutating to take account of defenses that have been put in place. Cyberspace is the land of opportunity for hacktivists, terrorists and criminals motivated to wreak havoc, commit fraud, steal information or take down corporations and governments. The solution is to prepare for the unknown with an informed threat outlook. Better preparation will provide organizations of all sizes with the flexibility to withstand unexpected, high-impact security events."


People Re-engineering

Some experts don’t like talking about “Crisis Theory” when talking about the “challenges” that the software industry is increasingly facing in today’s harsh business environment. If we look further into the yield of the industry for the last 5 years as expressed by the Standish Group CHAOS Report 2015, we should at least pause. I’ve seen debates from some expert watchers about the methodology used in gathering data and deriving results to produce this report. However, I still don’t think that there is much disagreement on the significance of the report to a wide sector of watchers and practitioners as a source of data on performance in the industry. I personally find that piece of work very representative of what I see on the ground during my daily practice.


Big Data, Crystal Balls and Looking Glasses: Reviewing 2016, predicting 2017

Despite media darling success stories, for most organizations this is probably a bit too much to wrap their heads around at this point. This is understandable, as the pace of change outperforms their ability to digest and keep up with it. As for developers, on either side of the fence (vendor or application developers), both the challenges they are faced with and the stakes are higher. Of course, none of this is all that new. IDC has called this the 3rd platform, but names aside, we've seen it all before: many riding the wave and few actually getting it, the .com boom and bust, initial resistance giving way to unquestioning convert, more or less successful unification of disparate frameworks in application server environments for enterprises, skill shortage and rock star developers, the long tail for people and organizations alike.


Threat Actors Bring Ransomware To Industrial Sector With New Version of KillDisk

The new version of KillDisk encrypts the local hard drives of the machines it infects as well as any network-mapped folders shared across the organization, using RSA 1028 and AES algorithms, CyberX’s vice president of marketing Phil Neray said in a blog this week. The security firm’s reverse engineering of the malware sample showed it containing a pop-up message demanding a ransom payment of 222 Bitcoins or roughly $206,000 in return for the decryption key. Ransomware attacks on companies in the industrial sector could cause significantly bigger problems than similar attacks on companies in other sectors. For example, an attack that succeeded in locking up the operational data upon which physical processes rely could do serious and potentially even catastrophic damage to people and property.


2017 will be big year for AI thanks to tech giants

The technology will be the "backbone of many of the most innovative apps and services of tomorrow," but it remains a mystery for many people who will eventually see AI influence their daily lives, according to LeCun. "Increasingly, human intellectual activities will be performed in conjunction with intelligent machines," he wrote. "Our intelligence is what makes us human, and AI is an extension of that quality." LeCun also predicted that health care services and transportation will be among the first industries that AI transforms. "The most meaningful thing Facebook can do in AI in 2017 is to make their chatbots useful, as so far they are weak and lack slick utility," Moorhead says. "Consumers are using them a few times, see they don't do much well and stop using them."


5 unexpected sources of bias in artificial intelligence

While some systems learn by looking at a set of examples in bulk, other sorts of systems learn through interaction. Bias arises based on the biases of the users driving the interaction. A clear example of this bias is Microsoft’s Tay, a Twitter-based chatbot designed to learn from its interactions with users. Unfortunately, Tay was influenced by a user community that taught Tay to be racist and misogynistic. In essence, the community repeatedly tweeted offensive statements at Tay and the system used those statements as grist for later responses. Tay lived a mere 24 hours, shut down by Microsoft after it had become a fairly aggressive racist. While the racist rants of Tay were limited to the Twitter-sphere, it’s indicative of potential real-world implications.


The Rise of the Internet of Things (IoT)

Unless you have been living under the proverbial rock, you probably heard about a number of Internet of Things (IoT) attacks this fall, beginning with KrebsOnSecurity, then OVH, then the DDoS attack on Dyn DNS. All of this started with a bot called Mirai, and involved IoT devices. Why is this important? By 2020, it is estimated that the number of connected devices is expected to grow exponentially to 50 billion. A survey by HP indicates that about 70% of these devices have vulnerabilities, making them the perfect targets for botnets like Mirai. Below is a collection of 10 blogs written by industry experts on this topic, that will help you fully understand the implications of this botnet and what it means for the future of connected devices.


What To Do If Your Data Is Taken Hostage

Hopefully the information security team has already planned out a procedure to follow in the event of a ransomware attack. They should begin by notifying the authorities and applicable regulatory bodies. The plan identifies the organization’s recovery time objective (RTO), and recovery point objective (RPO) for data breaches. In the event that a backup exists, then cyber-forensic evidence of the incident should be preserved and documented for/by law enforcement. In the event that there are no redundancy systems or if the secondary systems are compromised, then the information security team can find and implement a vendor solution or decryption tool. In many cases, files may be partially corrupted or incompletely decrypted. Even if a vendor solution is a simple executable, the victim may not be able to assure that their system is not still compromised by inactive ransomware, backdoors, or other malware.


Navigating the Ins and Outs of a Microservice Architecture

Today, enterprises are moving toward a clean SOA and embracing the concept of an MSA within a SOA. Possibly the biggest draws are the componentization and single function offered by these microservices that make it possible to deploy the component rapidly as well as scale it as needed. It isn't a novel concept though. For instance, in 2011, a service platform in the healthcare space started a new strategy where whenever it wrote a new service, it would spin up a new application server to support the service deployment. So, it's a practice that came from the DevOps side that created an environment with less dependencies between services and ensured a minimum impact to the rest of the systems in the event of some sort of maintenance.


How To Minimize Insider Threats In Cyber Security

Dealing with inadvertent and malicious insiders is similarly hard, as it poses similar challenges. It requires a unique set of tools and practices to be implemented, and can only be done when company fully realizes and acknowledges the danger of insider threats in cyber security and how to combat them. All of this is due to the fact that insiders have legitimate access to sensitive data, with which they work on a daily basis. Therefore, it is very hard to distinguish any malicious actions on their part from the usual everyday routine. Whether your system administrator does regular backup or copies data to an external storage in order to steal it and sell it – there is almost no way for you to know. Moreover, it is also almost impossible to distinguish between deliberate malicious actions and inadvertent mistakes.



Quote for the day:


"Tact is the ability to describe others as they see themselves." -- Abraham Lincoln


Daily Tech Digest - December 28, 2016

Simplify your platform with IT systems management tools

What an IT manager should be looking for is a statistically valid prediction of what workloads will be like at a point in time rather than a simple straight-line analysis of what has happened in the past. One example is FreeStor from FalconStor; it applies advanced statistical methods to gauge how storage workloads are trending and enables managers to pre-empt problems. Again, don't forget the software. Workloads need to be packaged, provisioned and managed. That management needs to include workload portability across different areas of your IT platform. ... Then there are the IT systems management tools that try to do as much as possible. For people stung by the vast framework systems of yesteryear, you may be glad to know that today's big systems tend to be more granular and open, enabling quality systems to be plugged in wherever necessary.


Maintaining Data Security with Cloud Computing Options

Data encryption was also a key aspect of the cloud computing guidance. CSPs should know that it is still considered a HIPAA business associate if it only stores encrypted ePHI and does not have a decryption key. An organization is still a BA under HIPAA regulations even if it cannot actually view the ePHI it is maintaining for a covered entity or fellow BA. Data encryption can help reduce the risk of unauthorized access, but it is not enough by itself to maintain ePHI security, according to HHS. “Encryption does not maintain the integrity and availability of the ePHI, such as ensuring that the information is not corrupted by malware, or ensuring through contingency planning that the data remains available to authorized persons even during emergency or disaster situations.”


Ensuring Bitcoin Fungibility in 2017 (And Beyond)

The only way to know that your bitcoins are clean is to go to a centralized service and ask for a background check. Suddenly the value of your coins is being decided by a centralized party. Every platform accepting bitcoin could implement different policies for deciding which coins are clean or dirty. And exchanges in different legal jurisdictions (US, China, India, etc) are likely to have different policies. The bitcoins worth the most money would then be the bitcoins accepted everywhere. This means it's not enough to just ask one exchange for a background check, you have to ask every major platform whether or not they think you have clean coins. And a platform doesn't think that you have clean coins, their decision reduces the value of your holdings regardless of whether you actually use that platform – your coins cannot be traded with any of the platform's users.


Moving to the cloud? Three things to think about before you make the jump

Matt Peers, CIO at Linklaters, says the bringing together of systems and services is still a concern for IT leaders considering a move to the cloud. "I think there's a temptation to draw on the services of many different providers but that can create a huge integration challenge," he says. Peers says effective CIOs will create a balance, drawing on enough cloud providers to take advantage of the competitive tension, while at the same time avoiding the risk of having too many partners to manage. "You don't want to be forever chopping and changing between services," he says. This need for cloud control could lead to a new trend, where expert providers help mop-up the management concerns associated to on-demand provision. Moves in this direction are being made.


More people expected to adopt EMV technology in 2017, but how secure is it?

One big problem remains: While the majority of merchants have implemented EMV technology, the report found, most cards do not offer the more secure PIN card option. Chip technology is also called EMV, which stands for Europay, MasterCard and Visa, the companies that developed it in the 1990s. It has been the standard across much of the rest of the developed world for a decade, particularly in Europe and Asia. Storing data on a chip in theory makes the credit card more secure because it isn’t easy to produce counterfeits — a key problem with cards that store data on a magnetic stripe. This reduces point-of-sale fraud, which involves buying something with a fake credit card at a physical retail counter, but it doesn’t reduce fraud when purchases are made online.


Enabling Strategic HR

These are disruptive times for the Human Resources (HR) organization. HR finds itself at an inflection point due to various external factors, one of them being the current gap that usually exists between the digital experience outside of the workplace and how the HR customer (the employee, manager, contractor, retiree, etc.) interacts with their HR organization. Driven by their usually positive digital experience outside of the office, the HR customer is beginning to ask the question: “Why can’t my interactions with HR be at least as good?” We see an opportunity in the marketplace to explore how an experience-focused, information-driven approach to delivering HR services can achieve a great digital consumer experience, what we call the “digital workplace”. There are five key attributes of what could be considered a “great” digital consumer experience


Cybersecurity: Threat Intelligence and an integrated approach to security

The Chinese mentality has been that, “I need to manage everything as a whole”. It turns out we have over 700 managed service customers, managing over 1200 networks. So we have to pull the stuff together for our customers. And because of this, the assisting methodology we’re bringing forward to our devices is we have to have these things start playing together, either through communication for better dynamic security response, or in terms of better central alerting and management. The problem with most other companies is they’re fixing on their products but very few pure cybersecurity companies actually have their products speak to each other, that siloed mode, I can’t get this device to talk to that device, even though they’re from the same company.


What CIOs Want CEOs to Know About Data Security

The most important step toward data security begins at a fundamental level. One that ensures health data is transmitted to and from vendors, providers, health systems and patients in a safe and secure manner. Consider a hospital sending a patient’s lab results to a physician, or a vendor communicating with a patient or provider about information from a personal fitness device or app. These platforms are ripe for data breaches and, therefore, penalties, lawsuits and even high profile media exposure. Another major question that CEOs and CIOs must address is which data transmission solution is best for their specific organization. Currently a number of vendors, consultants, software programs, etc. are available that promise to help organizations address their data security issues. The best option for each organization will be based on a number of factors, including size, budget, IT staff, expertise and overall goals.


CIOs will thwart cybersecurity threats with behavioral analytics in 2017

It’s no secret that boards are loosening the purse strings for cybersecurity but CIOs will continue to struggle to balance their cyber investments against managing risks to their businesses. Put another way: The choice between what to buy, implement and tune first -- the shiny new behavioral analytics platform or the latest and greatest business email compromise stopper -- poses prioritization challenges many CIOs aren't accustomed to in this age of cyber warfare. Worrall says that even if their boards allocate more funds for cybersecurity, CIOs need to beware of budget abuse. Those who take the “sky is falling” approach become chicken little, he says. One advantage Worrall has working for a networking technology company is that his tech savvy board grasps the intricacies of cyber defense.


Why Cybersecurity Leapt From the Basement to the Board Room

Notably, under the proposed regulations, board or senior compliance officers would need to certify that their organization’s security controls are meeting requirements. This could potentially expose such individuals up to criminal liability if the claim is found fraudulent. ... While overall cybersecurity spending is on the rise, certain organizations aren’t putting a cap on how far. This year, Bank of America has implemented a “whatever it takes” approach to thwarting attacks, giving unlimited budget to its cybersecurity business unit. While there will surely be scrutiny to the effectiveness and ROI of how such (non) budgets are spent, it’s obvious that the C-suite has gotten the message. Lax security practices don’t just mean embarrassing headlines and lost customer confidence.



Quote for the day:


"All progress is precarious, and the solution of one problem brings us face to face with another problem." -- MLK


Daily Tech Digest - December 27, 2016

Industries Thrive On Cognitive Cloud

Referred to as “Cognitive on cloud”, this model delivers cognitive services running in the cloud that are consumable via representational state transfer (REST) APIs. These services are available as part of platform-as-a-service (PaaS) offerings such as Bluemix and can be easily bound to an application while coding. Using this approach, cognitive analytics such as voice (tone analyzer, speech-to-text) and video (face detection, visual recognition) capabilities enables quick analysis of petabytes of unstructured data. Developing cognitive applications to run on mobile devices has provided new insights which help organizations create totally new revenue streams. When selecting a cloud service provider however cognitive on cloud ROI requires more than just a total cost of ownership comparison. In addition to this basic analysis, an organization must consider which cloud is cognitive enabled at the Platform-as-a-Service (PaaS) layer.


Could IT change control have prevented an IT deployment failure?

Build all configuration cleanup into IT change plans. Take the necessary time to flesh out a plan to address all related configurations for a specific maintenance task. IT teams typically should remove switch port configurations for decommissioned NICs, update firewall policies and groups when changing a server IP address, and remove domain name system records that are no longer in use. Managing the issue on a daily basis is the optimal approach to prevent IT configuration build up over time. Combat risk of larger change scope through a robust IT change control process. Teams dealing with live production systems fear the service impact of any change. A formal IT change control policy will lessen these unknowns. Thoroughly plan changes, formulate test and backout plans, have peer reviews, follow a set approval process, and schedule and communicate maintenance windows for all changes to critical systems.


After a big 2016, next year may be A.I. tipping point

"We are on the cusp of a change as big as when e-commerce hit," said Chris McCann, president and CEO of 1-800-Flowers.com, in an interview this fall. "It's giving us the opportunity to have such deep relationships with our customers that it'll be like the company hasn't existed before." This past May, Google showed how focused it is on A.I. during its annual Google I/O developers conference, unveiling A.I.-powered products like Google Assistant, its Google Home device, the Allo chat app and the Duo video chat app. And this past October, IBM president and CEO Ginni Rometty said during a keynote at the company's World of Watson conference that in the next five years, every major decision -- personal or business -- will be made with the help of IBM's Watson A.I. system. A statement like that takes a lot of confidence in advances coming in the technology.


How blockchain can create the world’s biggest supercomputer

One of the fields where centralized and cloud-based computing falls short is the Internet of Things, Sønstebø says. “As IoT grows the need for distributed computing becomes an absolute necessity,” he says. Latency in round trips, network congestion, signal collisions and geographical distances are some of challenges faced when processing data produced at edge devices in the cloud. “Devices need to be able to trade computational resources with each other in real time so that the computational load can be distributed,” he says. Some of the emerging lines of software will not be supported by centralized architectures at all, iEx.ec’s Fedak says, such as decentralized applications (DApps), which among others will power fog computing, distributed AI and parallel stream processing. “This class of application is extremely challenging because they’re both data and compute-intensive, and they don’t cope well with centralized infrastructure,” Fedak says.


The Full Spectrum: How a Visual Analytics Platform Empowers the Business

BI and analytics software can help uncover this story, but there are now hundreds of companies offering technologies designed to dig into data. This proliferation of tools is both a blessing and a curse. While competition breeds excellence, there are a few standards or best practices embraced across the board. As a result, the onus is on individual businesses to embrace and uphold policies that will enable the effective use of data in a responsible, governable way. One increasingly attractive solution for doing data right is to leverage a visual analytics platform. Unlike standalone data visualization tools (which can provide useful but sometimes misleading views of the enterprise), a visual analytics platform weaves together all the elements of a full technology stack.


Ransomworm: The Next Level Of Cybersecurity

To make matters worse, Nachreiner expects cybercriminals will mix ransomware with a network worm. Years ago, network worms like CodeRed, SQL Slammer, and more recently, Conficker were pretty common. Hackers exploited network vulnerabilities and tricks to make malware automatically spread itself over networks. “Now, imagine ransomware attached to a network worm. After infecting one victim, it would tirelessly copy itself to every computer on your local network it could reach,” he says. “Whether or not you want to imagine such a scenario, I guarantee that cyber criminals are already thinking about it.” Nir Polak, Co-Founder & CEO of Exabeam, a provider of user and entity behavior analytics, agrees that ransomware will move from a one-time issue to a network infiltration problem like Nachreiner describes. “Ransomware is already big business for hackers, but ransomworms guarantee repeat business.


When the Data Thief is a Company

Companies are particularly vulnerable to this type of attack when they often offer their data for free or at low cost to the public, but professionals a fee to access and use it on their own site or in other materials. What’s to be done? Companies that offer such online data stores for a subscription need to be ever vigilant about unusual traffic patterns that suggest a machine – not a human – is behind the wheel. The differences in use patterns between a crawler and an individual human researcher are easy to spot – if you’re looking for them. Behind the scenes, companies also need to pick any low hanging fruit: making sure that free or temporary accounts can’t be abused to siphon off reams of data and watching for patterns of abuse among registered and paying members. Application security flaws such as weak authentication and SQL injection should, of course, be patched.


Using big data for security only provides insight, not protection

Big data cheerleaders will say you can use this hindsight to fix the problems that let the hacker into your system in the first place. After all, since you know what went wrong, you can patch your system so that it doesn’t happen again, right? While that may be true – you may be able to prevent that specific problem from happening again – cybersecurity simply doesn’t work that way. The threat landscape is dynamic, with new technologies, and thus, new vulnerabilities, emerging every day. Additionally, hackers are like any other criminal: They are savvy, adaptable, and know how to play on human nature. They’re always going to find your weaknesses – and your biggest weakness is your own people, your trusted employees. Most hackers don’t break into systems through the back door. They get their hands on legitimate login credentials and, essentially, walk right in the front door.


Cloud data recovery is critical, but won't always come easy

Public cloud vendors focus more on the front end of the data issues, such as system availability and uptime, and less on recovery. They figure that making their systems available 99.999% of the time should enable users to work with needed information. However, glitches, such as a read/write error, arise, causing corporations to need to recover data. And typically, public cloud vendors offer rudimentary recovery functions. In addition, these vendors draw lines between their own and their customers' backup responsibilities, something not seen with on-premises backup systems. For instance, Microsoft Azure tries to restore customer data lost due to Azure outages, but won't attempt to restore data if users delete files or if files become infected by a virus. In response, more sophisticated ways to backup cloud applications are emerging. Vendors like Commvault Systems and Veeam Software have well-developed, on-premises systems that they are extending to the cloud.


How Zalando Delivers APIs with Radical Agility

As you know, REST is more an architectural style and does not really specify API design details. We need to have some standards in the API design practices to establish a consistent API look and feel. Ideally, all the APIs should look like they were created by the same person. That’s a very ambitious target, but our guidelines help. We recently open-sourced them and have already received external contributions. The API guidelines standardize easier things like naming conventions and resource definitions, but also includes more complex things like non breaking changes and how we want to do versioning. ... In the end, the more critical aspect is that all the different services that are part of the platform fit in an overall architecture where you have really clear, separated functions that can easily be orchestrated to build the business functionality that we have in mind.



Quote for the day:


"I believe that the only courage anybody ever needs is the courage to follow your own dreams." -- Oprah Winfrey


Daily Tech Digest - December 26, 2016

Corporate Boards Aren't Prepared For Cyberattacks

Despite the scale and potential harm from such attacks, there's wide recognition that corporate leaders, especially boards of directors, aren't taking the necessary actions to defend their companies against such attacks. It's not just a problem of finding the right cyber-defense tools and services, but also one of management awareness and security acumen at the highest level, namely corporate boards. "Our country and its businesses and government agencies of all sizes are under attack from a variety of aggressive adversaries and we are generally unprepared to manage and fend off these threats," said Gartner analyst Avivah Litan, a longtime cybersecurity consultant to many organizations.


Keeping a lid on SaaS & infrastructure costs

As companies continue to adopt cloud services and create even more complex, heterogeneous IT environments, their asset management tools must evolve and expand to optimise on-premises hardware and software assets, and cloud infrastructure services. Costs for cloud infrastructure services and software running in the cloud need to be managed whether they are SaaS applications or Bring Your Own License (BYOL), whereby companies host existing enterprise applications in a cloud environment. The cloud presents license compliance risk in BYOL instances, as well as risk of substantial over-spending on subscriptions for SaaS applications and cloud infrastructure services. In fact, costs can easily spiral out-of-control if not closely managed. However, organisations can keep a lid on these costs with the right Software Asset Management (SAM) processes and tools.


CEP Patterns for Stream Analytics

Real-time streaming data sources and Internet of things has brought Complex Event processing to the spotlight. The ability to collect data from devices using sensors, improvement in data carrier services and the growth of secure transfer to a centralized location has given a kick-start to analyze different data patterns from the various device at a combination. Let us start by defining what an event is. An event is said to occur when something happens which needs to be known for inferring or taking some action. An event processing is a way to track the information of the events by processing data streams and determining a circumstantial conclusion from them. This is associated with events from a single source. Ex: When the temperature of the room is more than 45 c, is what I consider an event for me to lower the temperature of my Air Conditioner.


CIOs: How to be a business leader in three steps

Technology and data are changing how work gets done. The embrace of digital technologies by companies and their customers has created a climate ripe for CIOs to stretch their business leadership muscles -- or risk seeing their roles atrophy. Part of making the leap to "business co-creator," as Deloitte terms it, requires CIOs to educate the business on the technologies and IT governance standards that are the foundation of digital transformation. Here is Kark's three-step strategy for CIOs on how to be a business leader. His advice is bolstered by two survey participants -- Vittorio Cretella, CIO at food giant Mars Inc., and Johnson Lai, CIO at NuVasive Inc., a maker of medical devices -- who function as business leaders at their companies.


16 Tech Jobs That Have A Gender Pay Gap

Computer programmer showed the highest gender pay gap, at a massive 28.3%. In job duties, computer programmers differ from software engineers (whose gap is 6%) in that engineers are more involved in designing software, while programmers receive instructions from engineers and have a more executional role. Game artists, who create visual art for video games, were second on the list, with a 15.8% gap. And information security specialists, who help prevent and repair cybersecurity breaches, ranked third. If you’re familiar with wage-gap statistics, you might be wondering why Glassdoor’s numbers are lower than the widely cited 20% pay gap, reported by the Institute for Women’s Policy Research, a Washington, D.C. think tank. Both IWPR's and Glassdoor's numbers are valid—they’re different because they’re set in separate contexts. This explanation gets a little technical, but bear with me.


Your new PC needs these 15 free, excellent programs

More than a mere blank slate, a new PC is a fresh opportunity—a collection of components that, with the right software installed, could accomplish anything from balancing your household budget to helping to cure cancer. Yes, stocking your PC is an intensely personal task. Even still, some programs are so helpful, so handy, so useful across the board that we heartily recommend them to everybody. These are the programs you want to install on a new PC first. (Longtime readers may notice that the list has slimmed down significantly this year. There’s a good reason for that: The bevy of hassle-killing extras in Windows 10 has allowed us to finally retire perennial favorites like CutePDF and WizMouse.)


The top 10 mobile risks of 2016

Mobile devices had a booming 2016, with usage of iOS and Android handhelds growing steadily throughout the year. By contrast, desktop operating systems other than Windows 10 and OS X generally showed a decline in growth. In fact, last month Marketing Land reported that global mobile internet usage was higher than that of desktop systems as of October, and predicted that nearly 80% of internet usage will be mobile by 2018. As with any element of technology, more widespread usage leads to greater and more widespread threats, and mobility is no exception. Here's a rundown of ten mobile risks we experienced in 2016, as well as some solutions to prevent or protect your devices from them (where applicable).


Weird science! 10 strangest tech stories of 2016

Science and technology news usually takes a backseat in mainstream media coverage. Contemporary attention spans being what they are, technical topics are often deemed too obscure, or their implications too complex, for the average reader. That's a shame, if for no other reason than this: Pay attention and you can find deliciously weird stuff in the sci-tech section, with occasional forays into the truly bonkers. Here we take a look at 1o of the stranger stories of 2016, selecting for items that generally flew under the radar and/or those with odd implications for the future. Click on through for updates on weaponized display technology, erotic robotics, and a biotech initiative that literally defies death.


Software Is Eating The Food World

Snack vending machines are everywhere. Here's how they work. A vending machine company makes a deal with a company that wants to provide snacks to employees. The vending company sends a person around every week or every few weeks to re-stock the machine with items bought at wholesale, collects the money (which is split with the business owner) and makes sure the machine is working properly. Any food placed into an old-school vending machine must be durable. It has to survive for weeks at unpredictable temperatures, and also survive the drop when selected. That's why vending machine food tends to be non-fresh, unhealthy junk food. With most vending machines, there are two or three items that are most popular and other items that might be selected as a second or third choice only after the favorite item runs out. The vending company has no idea.


Technical developments in Cryptography: 2016 in Review

The biggest practical development in crypto for 2016 is Transport Layer Security version 1.3. TLS is the most important and widely used cryptographic protocol and is the backbone of secure Internet communication; you're using it right now to read this blog! After years of work by hundreds of researchers and engineers, the new TLS design is now considered final from a cryptography standpoint. The protocol is now supported and available in Firefox, Chrome, and Opera. While it might seem like a minor version upgrade, TLS 1.3 is a major redesign from TLS 1.2 (which was finished over 8 years ago now). In fact, one of the most contentious issues was if the name should be something else to indicate how much of an improvement TLS 1.3 really is.



Quote for the day:


"You'll never be a bigger person by trying to make someone else feel smaller." -- @LeadToday