Daily Tech Digest - January 19, 2017

Meet Me In The Parking Lot: Walking Meetings Hit Their Stride

“Walking meetings are preferable for one-on-ones because it actually gives you a break from staring at a computer screen,” says Lan, a software engineer at Sift Science, which develops machine learning technology to detect fraud. “I walk with either a manager or a peer, usually when we talk about high-level things.” A walking meeting is just what it sounds like: a meeting that takes place during a walk rather than in a conference room or office. People can hold walking meetings on sidewalks and park trails or inside shopping malls and convention centers if the setting isn’t too noisy. “All of our employees to some extent use walking meetings to break out of the sedentary lifestyle,” says Robert Manigold, a partner at web and app development agency Code Koalas in Kansas City, Mo.


New study details the effectiveness of Security Operation Centres

Hewlett Packard Enterprise’s State of Security Operations Report 2017 looks at the increased pressure organisations are under in the face of rapid innovation in the cyber threat and how they can align security initiatives with business goals. ... Findings from this year’s report show that the majority of SOCs are falling below target maturity levels, leaving organisations vulnerable in the event of an attack. The methodology for assessments were based on HPE’s Security Operations Maturity Model (SOMM), which focuses on multiple aspects of a successful and mature security intelligence and monitoring capability including people, process, technology, and business functions. The SOMM uses a five-point scale – a score of “0” is given for a complete lack of capability while a “5” is given for a capability that is consistent, repeatable, documented, measured, tracked, and continually improved upon.


Infographic: Car Hacking Is Not A Thing Of Future

You may not realize it, but your car probably already has some self-driving technologies—even basic ones. For example, many of the newest cars have lane assist or park assist, which can help you avoid unintended lane violations or better ease into parking spots. But those car assistance technologies depend on the internet and computers, and those are at risk of hacking. In fact, that’s one of the biggest concerns with the continued development of self-driving cars: how can thieves access them, and what will they do with the data? Vound Software compiled a detailed infographic to get you all the details.


Update On The Megatrend of Artificial Intelligence

Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into homes and businesses and especially with the growing power of smartphones and other mobile devices. Artificial intelligence software is assisting people in most every discipline. The many functions of AI are considered by many to be threatening many human jobs across multiple industries, but others consider it a great producer of jobs since it will help create entirely new industries and free more humans to innovate and create. You can see our reference to Truly Useful AI You Can Use Right Today. Follow this link to track the highest ranked, enterprise ready Artificial Intelligence Companies.


Smile! Hackers Can Remotely Access Your Samsung SmartCam Security Cameras

It's not necessary to break into your computer or smartphone to spy on you. Today all devices in our home are becoming more connected to networks than ever to make our lives easy. But what's worrisome is that these connected devices can be turned against us, anytime, due to lack of stringent security measures and insecure encryption mechanisms implemented in these Internet of Things (IoTs) devices. The most recent victim of this issue is the Samsung's range of SmartCam home security cameras. Yes, it's hell easy to hijack the popular Samsung SmartCam security cameras, as they contain a critical remote code execution (RCE) vulnerability that could let hackers gain root access and take full control of these devices.


Attackers Start Wiping Data From CouchDB And Hadoop Databases

According to Merrigan's latest count, 126 Hadoop instances have been wiped so far. The number of victims is likely to increase because there are thousands of Hadoop deployments accessible from the internet -- although it's hard to say how many are vulnerable. The attacks against MongoDB and Elasticsearch followed a similar pattern. The number of MongoDB victims jumped from hundreds to thousands in a matter of hours and to tens of thousands within a week. The latest count puts the number of wiped MongoDB databases at more than 34,000 and that of deleted Elasticsearch clusters at more than 4,600. A group called Kraken0, responsible for most of the ransomware attacks against databases, is trying to sell its attack toolkit and a list of vulnerable MongoDB and Elasticsearch installations for the equivalent of US$500 in bitcoins.


How AI Can End Bias

AI has the potential to help us avoid bias in hiring, operations, customer service, and the broader business and social communities—and doing so makes good business sense. For one thing, even the most unintentional discrimination can cost a company significantly, in both money and brand equity. The mere fact of having to defend against an accusation of bias can linger long after the issue itself is settled. Beyond managing risk related to legal and regulatory issues, though, there’s a broader argument for tackling bias: in a relentlessly competitive and global economy, no organization can afford to shut itself off from broader input, more varied experiences, a wider range of talent, and larger potential markets. That said, the algorithms that drive AI don’t reveal pure, objective truth just because they’re mathematical.


Gaining Confidence In The Cloud

Security in the cloud refers to the security of systems built on top of it. Whilst the private cloud providers will offer simplified systems for administrators to both implement and audit standard security measures, these by no means replace the traditional measures, nor does they guarantee the security of your systems. Just as in a traditional datacentre or a private cloud, the security of your system is mainly your responsibility. ... The point at which the responsibility passes from your organisation to your supplier is known as the ‘trust boundary’ and it occurs at different points for the different types of cloud e.g. IaaS, PaaS and SaaS. You will need to verify the security status and resilience of the Cloud Service Providers (CSP) you chose and you should also review and understand their Data Protection Act obligations. From 2018,


4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams

According to a recent study, the global demand for cybersecurity professionals will create more than one million unfilled cybersecurity positions by 2019, with one of the most desired skills being secure software development. No wonder, that entrepreneurs and companies are having increasingly hard time finding the security talent they need to build reliable services and keep the data of their users safe. One way to bridge the skills gap and create more secure products is to train and hire more engineers specialized in cybersecurity. However, it is equally important to improve the cryptography and security skills of all developers working in your company, beyond those sitting in dedicated cybersecurity teams. Here are some thoughts on the reasons.


Close The Gap Between IT & Security To Reduce The Impact Of Cyber Threats

There are many advantages to having separate IT and security teams, with the most important being that it allows experts in both groups to hone specific skill sets that make them more effective at their jobs. But that doesn't mean that each must operate within a silo. Combining security and IT operations can be as simple as encouraging more communications and providing tools that give them visibility into areas supervised by the other group. In security, having a deeper understanding of how systems within the network are designed to perform would help them to better spot and stop threats. Modern advanced persistent threats that use tools like Hammertoss, ... Attacks that leverage native capabilities in the operating system or whitelisted websites/applications (such as tech support) would not be so invisible to those on the security team if they knew what day-to-day operations of those systems looked like from an IT perspective.


Mini PC invasion: These radically tiny computers fit in the palm of your hand

Some of today’s desktops can make even the sleekest of laptops seem downright bulky. Computers have been shrinking for years, and the revolution has only accelerated in recent times. As chipmakers focus on creating processors that sip power without sacrificing performance, thermal concerns have largely been alleviated in modern CPUs. Because of that, today’s pint-sized PCs offer enough performance to play HD video and satisfy Office jockeys, the opposite of the janky, compromised experience of yesteryear’s microcomputers. From PCs-on-a-stick to discreet boxes no larger than a deck of cards, let’s take a look at the wide range of computers available that can fit in the palm of your hand—starting with the one that brought teeny-tiny PCs to public attention.



Quote for the day:


“Never underestimate the power of dreams and the human spirit. The potential for greatness lives within each of us.” -- Wilma Rudolph


Daily Tech Digest - January 18, 2017

Robots are evolving so quickly that the big concern may be how much we don't know about AI

Maybe it will be the the time when change happens so quickly, and is so profound, that the technophiles will be wondering why we didn’t listen to Elon Musk back then. Or Bill Gates. Or Steve Wozniak and the 1000 other science and technology leaders who are so worried about the rise of AI they wrote a letter to the United Nations about it. The UN is listening, because the argument against AI goes far deeper than robots putting us all out of work. Just before Christmas, at the International Convention on Conventional Weapons in Geneva, the 123 participating nations voted to look at the possibility of banning autonomous robots that can select targets without human control. Yes, there are countries that want robots to not only fight the wars, but also have the power to choose who dies and when.


Analysis and Mitigation of NoSQL Injections

Like almost every new technology, NoSQL databases lacked security when they first emerged3–5. They suffered from a lack of encryption, proper authentication, role management, and fine-grained authorization6. Furthermore, they allowed dangerous network exposure and denial-of-service attacks. Today, the situation is better, and popular databases have introduced built-in protection mechanisms. NoSQL databases use different query languages, which makes traditional SQL injection techniques irrelevant. But does this mean that NoSQL systems are immune to injections? Our study shows that although the security of the query language and drivers has largely improved, there are still techniques for injecting malicious queries. Some works already provide reports of NoSQL injection techniques. 


Wearable technology in investment banking: watch your money on your watch

As of now, a trading watch-based app is working as an extension of mobile app and to take any further action a trader is required to use their mobile or iPad. In future, wearable devices should allow traders or advisors to take action based on the notification received and initiate next steps using call, SMS, email and other features designed for trading (such as buy/sell touch buttons). Key focus should not be on offering everything on a watch but instead a set of limited action-based features that are simple and urgent. Two versions of a smartwatch trading app can be created: one for advisors to manage client accounts, and the other for individual traders and investors who manage their own accounts.


16 Stunning Statistics that Forecast the Future of the Internet of Things

Everyone’s talking about the Internet of Things, even the “things,” which can now request and deliver customer support, tell if you’re being as productive as you could be at work, let your doctor know if you’re following orders (or not), reduce inefficiencies in energy consumption, improve business processes, predict issues and proactively improve or resolve them based on data received. The Internet of Things (IoT) is just getting started. These forecasts below show why organizations need to get started too (if they haven’t already) on leveraging and responding to the Internet of Things:


Beware This New Gmail Scam That Is Tricking Even Tech-Savvy Users

Hackers who have breached someone's email account look through the emails in it for correspondence containing attachments. They then send emails from the compromised account -- impersonating the account's owner -- with each email leveraging similarities to prior correspondence, so as to make the new messages seem legitimate and familiar. For example, the phishing emails may use a subject line that was used in the past. The hackers embed an image of an attachment used in the past into each phishing email, but configure the image to open not the attachment but, rather, a phishing page that looks like a Google login. Because the user is opening a Gmail attachment, the presentation of a phony Gmail login page does not seem alarming -- especially when the person opening the attachment feels that he or she has been viewing a "safe and familiar" correspondence.


IT Teams Can Influence Culture Across Campus

Do campus users view IT as the department that enables them to work smarter, better and faster, or do they view IT processes as a hurdle to overcome? Certain solutions — collaboration systems, virtual desktop infrastructure, mobile devices, the cloud — support the anywhere, anytime approach that many staff and students have come to expect. Yet as much as IT strives to make this approach possible, it also seeks to manage risk and keep users — and institutional resources — safe from cyberthreats. Balancing these two concerns is a perennial and central IT function, but how IT leaders communicate related initiatives to users can go a long way in shaping culture. When IT can’t accommodate users’ requests, or can’t accommodate them quickly, do staff explain the rationale or the reasons behind a delay? Does IT have a positive track record of collaborating with outside departments to identify ways that IT services can enhance productivity while maintaining security?


Key Data and Analytics Trends Everyone Should Watch in 2017

It’s estimated that between 35 and 50 percent of jobs that exist today are at risk of being lost to automation. Repetitive, blue collar-type jobs might be the first casualties to robotic automation, but with sophisticated AI even professionals — including paralegals, diagnosticians, and customer service representatives — could be at risk. As with most advances in technology, there are pros and cons to this rise in automation. On the one hand, companies will be able to automate repetitive jobs, reduce associated costs, and increase productivity. On the other hand, the elimination of low-skilled or low-education jobs will hurt some of the most vulnerable populations already struggling to find jobs that provide a living wage. The jobs that will remain will require high levels of education and creativity, and there will be fewer of them to go around.


Here's how millennials are impacting the future of communication

Several trends that have emerged over the past 18 months or so point to the decline of email as the primary mode of communication in the workplace. These range from an overall shift in user behavior to the widespread adoption of chat apps, which boast a growing list of functions and capabilities. The emergence of less formal, more engaging modes of workplace communication is most obvious in the adoption apps like Slack and the growing trend in using social networking apps such as Facebook Workplace. Chat apps are proving successful in the workplace for several reasons: Chat apps are convenient. Chat apps support quick and easy-to-access communication, and enable businesses and users to communicate with those who may not have an email address. For instance, many doctors in Brazil use WhatsApp to converse with patients, schedule appointments, and share test results.


What Does "Being Digital" Actually Mean?

Being Digital is the re-imagining of business processes to be by default a fully online, fully automated process from end user interaction to back office processing, with no need for human intervention. This really should be the first question any organisation should ask. The path to being digital is not free…investment is needed and therefore the benefits of being digital needs to be understood by those putting in the investment. Return on Investment is an extremely difficult thing to calculate and it can only be measured on a company by company basis. I could give you a bullet point list of the reasons why – however, you’re about to get your fill of lists plus you can boil it down to one thing: If you don’t become digital, your business will die. And if you don’t take being digital seriously, your competitors will and they will do it better…and your business will die. Ever heard of Blockbusters?


Passwords: A Long Goodbye

Don’t hold your breath. Brett McDowell, executive director of the FIDO (Fast IDentity Online) Alliance, is as passionate an advocate of eliminating passwords as anyone. He says that day is coming, given the creation of a, “new generation of authentication technology” largely based on biometrics, and a “massive collaboration among hundreds of companies” to define standards for that technology. ... There are a number of reasons for that, even though the security problems with passwords are well known and well documented. As Phil Dunkelberger, CEO of Nok Nok Labs, put it, “the username and password paradigm is fundamentally broken. It was never designed for, and is inherently incapable of addressing, the use cases of modern society. “



Quote for the day:


"Education is the most powerful weapon which you can use to change the world." -- Nelson Mandela


Daily Tech Digest - January 17, 2017

Turn Your Organization into an Idea Factory: Part I

If there is a perception that the employee suggestion box is a black hole and a waste of time, employees will quickly stop submitting new ideas. I say perception because sometimes ideas are being looked at and evaluated, but communication and transparency around this process is missing or takes too long. The interesting thing about feedback is that it does not need to be positive. It just has to exist. ... Even when a suggestion is turned down, the feedback is seen as positive if there is a proper explanation provided. Another important element of trust is the participation of leadership within the program. There is considerably more success with programs when leaders are active in commenting and responding to ideas, and reinforcing the usage of the program and celebrating success in communications.


Self-Service Business Intelligence is Big, but is it for Everyone?

While business users represent one pocket of parties interested in Self-Service Business Intelligence, another important user segment is the IT department itself. A survey of IT pros from real-time IT management vendor ManageEngine – which this past summer unveiled a self-service solution to help enterprise IT staff gain insights from the data generated by its network monitoring, applications monitoring, and customer support tools – shows that these experts want Self-Service Analytics tools as much as their business counterparts. Forty-two percent of respondents want to create reports on their own, a win for Self-Service Analytics over traditional reporting – and on-demand, with ad hoc reporting being key for more than one-third so that they can get answers to specific questions and analyze specific data.


McKinsey sees blockchain technology reaching full potential in 5 years

The McKinsey report’s time estimate for full blockchain adoption is about half that of similar estimates. The World Economic Forum released a report in October 2015 about the tipping point of disruptive technologies, and included predictions about blockchain in it. Governments, the report claimes, would reach their tipping point for using blockchain technology by 2023, and people would reach their tipping point for using “bitcoin and the blockchain” in 2027. ... However, over the next one to two years startups and standards for the space will rise, as well as “niche applications that will define new markets that do not exist today.” In another three to five years, they predict that the majority of large players will use blockchain technology. Global business consulting firm Accenture has a similar timeline, with a two year shorter timeframe.


Machine Learning – An idea whose time has come

The increasing availability of Big Data from ever-expanding sources, including IoT sensors, digitized documents and images, has made machine learning more relevant than ever before. The data is constantly being used to ‘train’ machines and enable them to make accurate predictions and recommendations. As data continues to proliferate, the ability of our computers to process and analyze that data will also increase. Not only that, computers will also increasingly learn from that data. ... The adoption of Machine Learning in organizations is bound to face some challenges. For instance, computation of data, sourcing talent in large numbers, and creating the requisite infrastructure are going to be major tasks that will need attention and resources. Besides, uncertainty, ethical issues, outcome metrics, logistics, budgeting computational resources, training and testing of data sets all pose challenges.


Data Science of Variable Selection: A Review

One of the biggest problems in predictive modeling is the conflation between classic hypothesis testing with careful model specification vis-a-vis pure data mining. The classically trained can get quite dogmatic about the need for "rigor" in model design and development. The fact is that when confronted with massive numbers of candidate predictors and multiple possible targets or dependent variables, the classic framework neither works, holds nor provides useful guidance – how does anyone develop a finite set of hypotheses with millions of predictors? Numerous recent papers delineate this dilemma from Chattopadhyay and Lipson's brilliant paper Data Smashing: Uncovering Lurking Order in Data who state, "The key bottleneck is that most data comparison algorithms today rely on a human expert to specify what ‘features’ of the data are relevant for comparison.


Online Or Offline, Ransomware Will Find You

Professional ransomware authors typically use online Command & Control centers for their campaigns as they provide multiple benefits, including the ability to track affiliate campaigns, use unique keys created for victims, and alter campaign specifics on the fly. The old "if it ain't broke, don't fix it" method has served them well for the longest time, but everything has to change eventually, and even malware makers have to adapt with the times. The reason for this shift in attack strategy is that not all computers are online, which represents a blip in the ability of bad actors to make as much money as humanly possible. If ransomware can't “phone home” when it's time to begin infecting the target, then no encryption can take place and their efforts are wasted. To get around this, it's becoming more common to see offline features built into more traditional packages.


Automate systems and server documentation tasks to boost IT efficiency

You don't need an outside tool, but writing and modifying scripts takes time and effort that can be better spent on other IT projects. Scripts are usually best for smaller organizations with limited IT deployments. When an IT environment includes too many diverse systems to document with a single or even a suite of related scripts, or you must include non-Windows systems in the server documentation process, invest in a third-party tool such as ManageEngine's Device Information tool or CENTREL Solutions' Network Documentation tool. These tools are designed for inventory/configuration discovery, recording and reporting. Implement an outside tool to provide better reporting and free IT staff from time-consuming script maintenance.


Data Theft Trends to Watch in 2017

Mishandling of data by (trusted) third parties will be a prime source of data leaks again in 2017, as it was in 2016. Third party breaches are among the most vexing because business partners and contractors – or even customers – often have access to our most sensitive IT assets and data, but are the hardest to police. We’ve noted the trend of third party breaches before. But expect it to get stronger in 2017 rather than weaker. The reason? More reliance on hybrid products and services that mingle on premises devices and clients with a wide range of cloud based services. Longer and more complex supply chains compound risk. Consider the recent news about wholesale transmission of mobile phone users’ text data and contacts by firmware from the Chinese firm ADUPS to company servers in China.


Five Google Assistant integrations we want to see

Smart conversations need smart partners. The Google Assistant can improve in the near-term very quickly with a larger team of buddies that specialize in different tasks. For example, currently I can ask Google for the score of the latest Golden State Warriors game or when they play next. Down the line, perhaps I’d be able to invoke an agent from ESPN or another sports provider who would be able to answer more detailed questions about a player’s performance, read out relevant news stories, or even participate in a trivia game. When developers get on board, the actions could look very much like this, according to Google: These type of interactions at a deeper level shouldn’t all be handled by Google’s algorithms. News providers and third-party apps and services can offer a larger bank of specialized knowledge for their areas of expertise.


Digital Transformation Forces Businesses To Rethink Cybersecurity

"The big change that's accelerating this trend is that shift to modern architectures," Downey adds. "Sixty-nine percent of executives were saying this digital transformation is creating fundamental changes to their security strategies." Bill Berutti, president of Security and Compliance at BMC, says that cybersecurity is now a critical initiative across the board. Companies, governments and society as a whole are facing increased cybersecurity threats including phishing, ransomware and known vulnerabilities. "Businesses need to tear down security and operations walls — or keep getting hacked," he said in a statement Wednesday. Allison Cramer says many BMC customers are responding by bringing together security professionals, operations professionals and developers into teams focused on particular mission-critical assets.



Quote for the day:


"If you care enough for a result, you will most certainly attain it." -- William James


Daily Tech Digest - January 16, 2017

Windows 10 Build 15007 boosts Edge browser

For PCs, the 15007 build's revised Edge application makes it easier to bring data like favorites, browsing history, and saved passwords from another browser when switching to Edge, said Dona Sparker, software engineer in Microsoft's Windows and Devices Group. The revised Edge can also share tabs with compatible Windows apps. XAML scrollbar improvements for Universal Windows Platform, for both the PC and mobile versions of the OS, ensure the scrollbar's availability when needed while taking up less space. The panning indicator now appears when the user mouses over a scrolling region, and the full scrollbar appears when a user wants to directly interact with it. This improvement will be visible in apps using the Windows 10 Creators SDK.


Expect trouble as Shadow Brokers retire, give away hacking tools

“The economics of the dark markets is mainly based on un-exclusive, common, and low priced tools for lower end cyber criminals that look for low hanging fruit. The more sophisticated hackers prefer to roll their own toolset and thrive on their own research to make exclusive and untraceable exploits. They are patient, as to the point they can stay for years in hiding, timing their actions well before making their ‘coup de grace',” he said. “But it is not improbable that the freebie left by Shadow Brokers will be picked up and used by the lower end of opportunistic cyber criminals in campaigns to extort victims for easy money,” he added. More than half of the windows tools are already known and detected by most anti-malware tools, so it is only a matter of time before security analysts close the gap and provide protection against all the threats in the toolset.


Tech's assault on (obliteration of?) consumer privacy

Some of the societal benefits and consumer privacy risks of these new technologies are similar to ones we already know about, Ramirez said. Geolocation data, for example, can help ease horrendous traffic jams on morning commutes, but it should not be collected or used without a person's consent. Risks from unauthorized geolocation information include stalking; exposure of political, health and religious affiliations; and burglary. But there are new challenges, Ramirez said, among them the number of actors "collecting, compiling, interpreting and using data in a world that operates on big data, IoT and AI." The expanding list ranges from consumer-facing companies, device manufacturers and publisher websites to behind-the-scenes software vendors that connect IoT products to the internet to advertisers and analytics providers. "This vast array of entities makes it difficult to provide consumers with informed choices," she said.


Op-Ed: Blockchain - Innocent Until Proven Guilty

This system of multi-member consensus clearing ensures that each member, on an automated basis, applies the same diagnostic approach to the verification of information against the same record, irrespective of the internal processes of each member. Accordingly, each member of the chain is always cognisant of the acquiesced process adopted in determining whether a block should be added to a chain. This system affords transparency to transactions processed through a Blockchain, bearing in mind that due to the flexibility of Blockchain, the system can be restricted depending on the particular needs and purpose of the Blockchain network. The built-in transparency feature of the Blockchain network arguably negates the need for the regulator to administer and enforce further transparency requirements. The regulator should rather focus on the members of the Blockchain network and not the technology itself.


Ericsson CTO on 5G Standards, the WiFi Angle, and Connected Cars

There is going to be a more distinct separation between the services and the cloud. You asked about car makers and the 5G Automotive Association. We launched that association based upon the idea of a mobile virtual network operator (MVNO). An automotive maker would rather think: OK, why go to one service provider? Why not create our own platform and then buy the network piece from all of them? They might want to buy service from three or four networks. Why not have the best coverage and pay per bit? We are going to see more model development over the next few years. If we look at 5G now, I see three phases of the business: First, there is basic connectivity. That is coming now. We are building base stations. Second, we will see transformation of core networks triggered by this access. I believe in 2019 and 2020 we will see a big focus on making a high-performance core. Now we have a radio with almost no latency.


AI Technology Takes Center Stage At Retail Convention

At the National Retail Federation event in New York technology vendors are be showcasing some of the most cutting edge technologies for retailers, including chatbots, artificial intelligence, augmented and virtual reality, and more. Are retailers ready? It depends. There's really a range of experiences across companies. Analytics can offer retailers value across many aspects of their businesses, from supply chain optimization to workforce management to understanding consumer behavior. Yet many retailers are still struggling to get their siloed data integrated. It's one thing to offer a retail app to your customers if you've been a brick-and-mortar retailer. It is a more daunting challenge to integrate customer data from mobile apps, the web, physical stores, catalogs, social media, and any other channels to create a comprehensive picture of consumer behavior that can inform your own business decisions.


Here’s What’s Next for CenturyLink’s Data Center Business

There are some big differences between the two big data center deals that came at the tail end of 2016, however. The assets Equinix cherry-picked in its deal with Verizon will be integrated into an already massive global portfolio, while CenturyLink’s colocation business will become the foundation of a whole new company’s business. The name of the company has not been announced. What we do know is that it is a joint venture between Medina’s tech-focused private equity firm Medina Capital and the 30-year-old European buyout investor BC Partners. Its plan is to use the technologies of four of Medina’s previously acquired cybersecurity companies to provide a range of infrastructure products with emphasis on security, all running on top of the data center platform acquired from CenturyLink.


Coding school graduates: Are they worth hiring?

Coding bootcamps are an attractive educational option for certain populations, according to Kevin Kinser, department head of education policy studies at Penn State University. "They are one of the examples of new ways of thinking about providing access to education that is focused on providing marketable job skills," Kinser said. However, bootcamps are not accredited institutes of higher education. Therefore, a problem—such as a student not believing that the program lived up to its promises—would likely lead to a complaint to the Better Business Bureau, unlike at an institute of higher education, which has multiple layers of oversight. "You have to be assured based on your own understanding of the industry that what you're getting is going to have a return on investment," Kinser said. Longevity is an important factor to consider: If a coding school is not reputable, it's likely that they will not be around for long, Kinser said.


When Real-Time Threat Detection Is Essential

While organizations always want to find threats as quickly as possible, that ideal is far from being met. On average, dwell times last months and give cyber criminals all the time they need to peruse a network and extract valuable information that can impact a company, its customers and its employees. There are times when an organization will be especially vulnerable if they don’t have real-time detection capabilities, and in preparation for these events it’s a good idea to reevaluate tools and strategies. Mike Paquette, director of products, security market at Elastic, identifies some of the most common events that can leave an organization vulnerable, and offers advice to successfully navigating them.


IBM’s Watson Joins the War on Cybercrime

Network defenders are facing a constantly increasing number of alerts and anomalies every day. They have a huge workload screening and prioritizing these threats. Watson is trained to automate the typical duties of security analysts. Relying on machine learning and natural language processing, Watson for Cyber Security decides if a certain anomaly is a malicious threat or not. The system will use its vast amount of data to decide whether a specific security offense is related to a known malware or cybercrime campaign. Moreover, it will determine the potential vulnerabilities as well as the scope of the threat. Watson will also serve up a background about a user’s previous activities. For example, in the case of repeatedly failed log-in attempts, the system can make guesses about whether the event is simply related to an absentminded user or if it's a break-in attempt.



Quote for the day:


"Analyze your mistakes. You've already paid the tuition, you might as well get the lesson." -- Tim Fargo


Daily Tech Digest - January 15, 2017

New Study Paints a Frightening Picture of the Cyber Security Landscape

“The perfect storm is brewing that will pummel our nation’s public and private critical infrastructures with wave upon wave of devastating cyber attacks,” the report notes. “The Mirai malware offers malicious cyber actors an asymmetric quantum leap in capability; not because of sophistication or any innovative DDoS code, rather it offers a powerful development platform that can be optimized and customized according to the desired outcome of a layered attack by an unsophisticated adversary.” Script kiddies and cyber criminal gangs are already drastically expanding their control over vulnerable Internet of Things (IoT) devices, which can be contracted in DDoS-for-Hire services by a virtually unlimited number of actors for use in an infinite variation of layered attack methods, the study says.


Big data and the challenges in the car industry

Beside big data why are we interested in autonomous driving? Well $500 billion could be saved in traffic accidents and the cost to society. And $507 billion could be saved in productivity gains. Think about if you could get that 90 mins back each day? Better traffic patterns and logistics lead to big savings. The overall auto model is changing. We don’t just want driving anymore, we want fleet, no need to own the car. And then there’s the possibilities for the media and the content that can be delivered into the vehicle. But with a 10 x increase in data from a vehicle by 2025, how do we manage that data, what can we do with it? Something has to change. ... We can speed up the innovation in automotive space, and that’s good for everybody. An autonomous vehicle is much safer than a speeding young teen driver, or an elderly person with slow reflexes. 5G will be crucial to get the speed of data up and back. A data centers to use deep learning to constantly update fleets.


9 Bizarre and Surprising Insights from Data Science

We’ve entered the golden age of predictive discoveries. A frenzy of number crunching churns out a bonanza of colorful, valuable, and sometimes surprising insights Predictive analytics' aim isn’t limited to assessing human hunches by testing relationships that seem to make sense. It goes further, exploring a boundless playing field of possible truths beyond the realms of intuition. And so it drops onto your desk connections that seem to defy logic. As strange, mystifying, or unexpected as they may seem, these discoveries help predict. Welcome to the Ripley’s Believe It or Not! of data science—the Freakonomics of big data. Below are nine colorful discoveries, each pertaining to a single predictor variable—from the likes of Walmart, Uber, Harvard, Shell, Microsoft, and Wikipedia.


Nokia's vision for digital health

Nokia has already struck up a partnership with the University of Helsinki and the Helsinki University Hospital to develop remote monitoring products for neurology outpatients, saying the deal reflects "the company's intent to enter the regulated healthcare space". Is the company intending to focus more on the enterprise healthcare vertical as well as the consumer market? Nokia's digital health business aims to "bridge consumer device experience into healthcare patient solutions", Hutchings said. "One of the shared visions between Nokia and Withings is that there is no definite split or frontier between the consumer world and healthcare." ... "We'll see more and more from this common project [of Nokia and Withings] that involve what look like consumer products, but which really integrate and embed into healthcare and remote patient monitoring environments. We'll be seeing more and more of these pilots, and in the future, large-scale deployments of such solutions."


A Framework for FinTech

Today, after sustained stakeholder engagement, we are proud to publish a whitepaper, A Framework for FinTech, that takes our work one step further to provide that perspective. This whitepaper expresses the forward-leaning posture of this Administration to innovation and entrepreneurship, generally, and fintech in particular. This document sets forth Administration policy objectives that reflect widely-shared values and practical expectations for the financial services sector and the U.S. government entities that interact with the sector. It then provides ten overarching principles that constitute a framework policymakers and regulators can use to think about, engage with, and assess the fintech ecosystem in order to meet these policy objectives.


The Undeniable Power of Data Mining, Visualization and Infographics for Business

One of the most common misconceptions about data visualization is that you need to create amazing works of interactive art, like the cool map from Metrocosm here. Data visualization, massive graphic design budgets, and an in-depth knowledge of coding do not necessarily go hand-in-hand. According to most data experts, data visualization can be any map, chart, graph, etc. that you can make into a simple JPEG image, a video, or even a 3D model like the one above. The only criteria is that the visualization communicates data. It’s also important to point out that data visualizations are usually only visual representations of one data set; a pie chart to show different portions of a specific group, or a line chart showing growth of social media followers. An infographic, on the other hand, is a collection of multiple data sets designed to depict an overall trend, topic, or idea.


Why IoT needs AI

AI typically works in tandem with the Internet of Things (IOT) which includes devices like wearables and connected home gadgets. Simple put, IoT collects the information but AI is the engine that will power analytics and decision-making from that information. IoT connects disparate devices such as wearables and can scale to connect a nearly unlimited number of devices, continuously streaming data. AI processes, makes inferences about this data and ultimately enables recommendations in real-time. Let’s make some examples from the insurance industry A couple of years ago, when I was at Humana around 2012, one of the projects we worked on was understanding seniors (65+) living in their homes to better reduce the incidence of falls and predict the likely use of emergency services in real-time so we can act beforehand, improve their health status and save costs.


Q&A on The Antifragility Edge: Antifragility in Practice

Generally, embracing reality involves entrepreneurs who experiment with options to confront disorder. They are always exploring and seeking opportunities to enable them to thrive; when they encounter disorder and sufficiently and reasonably struggle (that is, experience sufficient and reasonable degrees of stress), they consider their options and experiment, making small and reversible errors that cause acute stress, distributed over time, with ample recovery time, to enable them to learn and grow. ... Antifragility is beyond agility. Agility and antifragility are distinct paradigms, each with a unique mindset, worldview, values, principles, practices, and techniques. The essence of antifragility is a delicate dance --- at the antifragility edge ---  between embracing reality and ensuring aliveness, where disorder or stress is at the intersection.


Digital will disrupt insurance the way it disrupted the travel industry

The current model of insurance is B2B2C. Insurance companies sell through the agencies. Some life insurers sell through the bancassurance model. So it is a B2B2C model. Now with digital disruption, they will have to deal directly with the customers. This means they will need to be more customer-centric. Digitization will shake this model and make it D2C (Direct to Consumer). This is very different from other industries that are digitalizing because they have only one dimension to deal with. They only have to interact more digitally with their customers. ... So as an industry we need to get better in explaining our products. In principle, insurance is a very simple product. We need to explain that our product is relevant and reliable and we need to be transparent about it. If people can buy shoes online, why wouldn’t they buy insurance online?


Agile & Architecture

Two things change: first, filling the Solution Backlog — while still the responsibility of the Product Owner — becomes a consent-based collaboration between Product Owner and Enterprise Architecture (collaborating create&review roles, see below). And also: Enterprise Architecture can add items to the Architecture Backlog. Now, as in the Enterprise Chess approach for more classical projects, Enterprise Architecture’s role is checks & balances from the organisation-as-a-whole perspective. Hence, the Product Owner (in classic Prince2 terms, the Project Executive) is in charge of his project. But if there is no consent, then an escalation occurs to the level above the Product Owner, if need be up to the board of the organisation (after all: enterprise architecture’s checks & balances are from the perspective of the organisation-as-a-whole, for which the board is responsible).



Quote for the day:


"I believe it is important for people to create a healthy mental environment in which to accomplish daily tasks." -- Darren L. Johnson


Daily Tech Digest - January 14, 2017

Are these the gadgets most likely to change our lives in 2017?

The self-driving car has made significant progress in the last couple of years. That’s not surprising given that it has the potential to solve congestion, accident prevention and reducing carbon emissions. The pioneers come from the new economy: Google, Uber and Tesla all have partially or fully independent vehicles. However, most of the major car makers have plans to introduce autonomous vehicles by the early 2020s, and were showing off both concepts and future self-driving models at CES. Collaborations with leading technology companies - chip makers NVIDIA and Intel, Samsung and Apple, for instance – were high on the agenda, as was the need for reassurance on the safety of driverless cars. In this context, providing the computing ‘horsepower’ and depth of information needed so a car can assess its environment and make decisions were a major focus for exhibitors in Las Vegas.


WhatsApp’s Small Security Flaw Is the Price of Convenience

According to a new report by the Guardian, WhatsApp has a flaw that could, in theory, allow the company to read messages that users assume are safe from prying eyes. Tobias Boelter, a security researcher at the University of California, Berkeley, tells the newspaper that WhatsApp can force a device to generate a new encryption key when a user is offline. Then, if someone is sending a message to that device while it’s offline, the sender will be made to re-encrypt the messages and resend them. Those messages could, says Boelter, be read by WhatsApp. And, presumably, by anyone who demanded the company turn them over, too. WhatsApp knows this is the case, and it is unapologetic about it. It has a compelling argument: convenience.


An Interview with Dr. David Bray and Michael Krigsman on Ethics and AI.

The ethical aspects of AI center on development, use, and application. AI offers its maker advanced capabilities that can be applied to fields as diverse as robotics, medicine, autonomous vehicles, weapons, and much more. As with any technology, the developer’s goals and objectives dictate how AI technology is used and in what fields it is applied. Given the power of AI to mimic human decisions and intelligence, the question of application is crucial to consider. For example, imagine AI technologies in the hands of a government planning to identify and target specific populations or groups for attack or discrimination. Most people would say this is an unethical use of AI. What about companies using AI to target consumers with levels of personalization unattainable today. At what point do we cross the line between appropriate and inappropriate use?


Your selfies might be leaving you vulnerable to hackers

According to research from a team at Japan’s National Institute of Informatics (NII), cyber thieves can lift your fingerprints from a photo in order to access your biometrically protected data (like the info secured on your iPhone by the Touch ID system). But while it's technically possible, biometrics experts say there's no need to panic. The NII team's report focuses on the personal security threats posed for social media users who share lots of publicly accessible pictures. Using a set of photos taken by a camera placed about three meters away from a subject, the team was able to recreate the fingerprints accurately.  The Japan Times reports that NII researcher Isao Echizen told Sankei Shimbun, a Japanese language newspaper, that peace signs could be exploited without much effort. “Just by casually making a peace sign in front of a camera, fingerprints can become widely available,” he told the paper.


Twitter CMO finally explains the purpose of Twitter

As Berland and her colleagues set out to clarify just what Twitter is and why it exists, they landed on the most obvious definition of all. "Twitter is the place to see what's happening," she said. "We've been asking the same question from you for years and years. We've been searching and searching, and the answer was staring in front of us all along." That central question — "what's happening?" — appears right in Twitter's main compose field. "The first thing we did is we actually took ourselves out of the social networking category in the app stores and we put ourselves where we belong, which is news," Berland said. "As we were telling the story about us being in the center of what's happening in the world, reflecting on what's happening in the world, there was in fact a lot happening in the world right here on Twitter," she said.


You should read this super-interesting AMA with AI researcher Joanna Bryson

There are two things that humans do that are opposites: anthropomorphizing and dehumanizing. I’m very worried about the fact that we can treat people like they are not people, but cute robots like they are people…We are used to applying ethics to stuff that we identify with, but people are getting WAY good at exploiting this and making us identify with things we don’t really have anything in common with at all. Even if we assumed we had a robot that was otherwise exactly like a human (I doubt we could build this, but let’s pretend like Asimov did), since we built it, we could make sure that it’s “mind” was backed up constantly by wifi, so it wouldn’t be a unique copy. We could ensure it didn’t suffer when it was put down socially. We have complete authorship. So my line isn’t “torture robots!” My line is “we are obliged to build robots we are not obliged to.”


“OK Facebook”—Why stop at assistants? Facebook has grander ambitions for modern AI

On the road to this human-like intelligence, Facebook will use machine learning (ML), a branch of artificial intelligence (AI), to understand all the content users feed into the company’s infrastructure. Facebook wants to use AI to teach its platform to understand the meaning of posts, stories, comments, images, and videos. Then with ML, Facebook stores that information as metadata to improve ad targeting and increase the relevance of user newsfeed content. The metadata also acts as raw material for creating an advanced conversational agent. These efforts are not some far-off goal: AI is the next platform for Facebook right now. The company is quietly approaching this initiative with the same urgency as its previous Web-to-mobile pivot. 


One Startup’s Vision to Reinvent the Web for Better Privacy

Blockstack’s vision is made possible by an identity system built to be independent of any one company, including the startup itself. It uses the digital ledger, or blockchain, underpinning the digital currency Bitcoin to track usernames and associated encryption keys that allow a person to control his or her data and identity. A collective of thousands of computers around the globe maintains the blockchain, and no one entity controls it. Blockstack’s system uses the blockchain to record domain names, too, meaning there’s no need for an equivalent to ICANN, the body that oversees Web domains today. Software built on top of the name and ID systems gives people control over the data they let online services use. Microsoft is already collaborating with Blockstack to explore uses for its platform.


Developing Transactional Microservices Using Aggregates, Event Sourcing and CQRS

On the surface, using events to maintain consistency between aggregates seems quite straightforward. When a service creates or updates an aggregate in the database it simply publishes an event. But there is a problem: updating the database and publishing an event must be done atomically. Otherwise, if, for example, a service crashed after updating the database but before publishing an event then the system would remain in an inconsistent state. The traditional solution is a distributed transaction involving the database and the message broker. But, for the reasons described earlier in part 1, 2PC is not a viable option. ... A message consumer that subscribes to message broker eventually updates the database. This approach guarantees that the database is updated and the event is published. The drawback is that it implements a much more complex consistency model.


Is this the year IoT standards will finally make sense?

There’s too much at stake in a potentially huge market for major companies to give up the chance to dominate home IoT, Greengart said. “I’m highly skeptical that 'co-opetition' in this regard will prevail over competition. And given than nobody knows what layer of the stack is going to be the most valuable one, everyone is fighting for their own,” he said. The common thread that will make smart homes work may turn out to be a system from one vendor, like Apple’s HomeKit, Greengart said. Apple is as well-positioned as any company to make that happen. But even though many manufacturers at last week’s CES show introduced products that use HomeKit, they didn’t play up that capability much, he said. Alexa, Amazon’s cloud-based AI platform that made a splash at CES, at least provides a single user interface, though Greengart said it’s not really a full IoT platform like HomeKit -- yet.



Quote for the day:


"It is what we make out of what we have, not what we are given, that separates one person from another." -- Nelson Mandela


Daily Tech Digest - January 13, 2017

Silicon Valley reckons it can give AI a conscience

“There’s an urgency to ensure that AI benefits society and minimizes harm,” said Hoffman, who is now a Partner at venture capital firm Greylock Partners. “AI decision-making can influence many aspects of our world – education, transportation, health care, criminal justice, and the economy – yet data and code behind those decisions can be largely invisible.” The idea of developing a series of standards to define ethics and morals is something which has needed to be addressed, and has been raised at industry conferences. Back in October at IP Expo, Nick Bostrom who leads Oxford University’s Future of Humanity Institute, noted there needed to be a set of rules to define the development of AI. It was all very doom and gloom, but Bostrom asked a very basic question; how we control computers when their own intelligence supersedes our own? For this, developers will have to essentially develop consciousness and a moral code into the algorithm; is this possible?


Carnival Ocean Medallion: 5 takeaways from one of 2017's premier IoT projects

Carnival, with headquarters in both Miami, Florida, and London, England, is calling the 1.8 ounce device the Ocean Medallion. It is a quarter-sized metal disc that can be carried in a passenger's pocket, pinned to clothing, or worn on the wrist or neck. It will be loaded with the user's personal identifying information and act as a payment method, logging all of their purchases and preferences. It will also note what they opt to do while on board, and what they opt against, as well as which invitations they accept, and which they ignore in order to personalize future invitations and offers. The medallion will allow for keyless entry into a passenger's cruise cabin, and serve as a personal tracking device with wayfinding so that passengers can locate friends and family members around the massive cruise ship.


Why businesses must make cyber security skills a priority in 2017

Given the long latency period before many security failures are discovered, it’s entirely possible the first fines under the new regulatory regime will be for breaches that are happening now. Businesses can therefore hardly afford to wait for the new generation of code breakers to complete their training. Added to that, no single college, nor even the whole the whole Cyber Security Challenge initiative, can really hope to address the scale of the skills shortage. To look just at one aspect of the GDPR, again, the International Association of Privacy Professionals’ recent study suggests businesses worldwide need to hire at least 75,000 data protection officers (DPOs) required by the regulations in the next two years. The 500-strong cohort of pupils that makes its way to the college in 2018 is a welcome contribution to the fight. It can only go so far, however, particularly after GCHQ and other government agencies have taken the cream of the crop.


The Best Techniques to Avoid Phishing Scams

Due to improper readiness and awareness about the phishing attacks, many companies fall prey to phishing attacks. However, the question is how can we prevent phishing attacks and scams? There are several human and technological factors that companies should consider to avoid falling victim to phishing attacks ... Banks and e-commerce companies generally send personalize emails to their customers, while phishers do not. Phishers often include some sensational messages, (e.g., “Urgent – your account details may have been stolen”) to get an immediate reaction from the recipient. Due to security reasons, reputable organizations avoid asking personal information from their customers in an email. Even if such the email seems legitimate, don’t respond. Contact the company by phone or by visiting their website. Pick up the phone and speak to a real person, or type the URL in yourself by hand rather than clicking a link in a suspicious email.


Blockchain: Time To Get Your Feet Wet

Blockchain’s inherent benefits include no middlemen. By having currencies such as Bitcoin, where there is no Central Bank (middleman), payments can be moved instantly just like a domestic currency. An excellent pilot would be between two central banks. Here, you can discover the real benefits of blockchain at an increasing volume across two currency sets seamlessly linked and with currency owners embedded. The EBA has announced a consultantion to provide real time settlement for instant euro payments We are seeing a number of POCs now underway between banks and corporates, who own subsidiaries in other countries, utilising blockchain in multi-currency movements. A pilot involving multiple and bi-lateral netting, for example, could demonstrate blockchain’s security and efficiency.


Day To Day Data: How To Build Knowledge From Daily Life

One of the newest and most revolutionary factors when it comes to turning personal experience into data is the Internet of Things (IoT) – but most know this sector through big name products like Fitbits and Nest thermostats. At its core, IoT technologies are the little data collectors that live inside everyday objects, tapping into our surroundings and actions to improve our daily lives. In many cases, they’re also feeding that information back to companies, cities, or other institutions that are learning from our data. There are numerous IoT devices for the health and fitness sector and they tap into everything from steps taken and calories burned to variations in glucose level throughout the day. These tools are helping us live healthier lives and normalizing activities like step counting that used to automatically signal that someone was trying to lose weight.


Davos: Technology poses new risks to jobs, economies and society

“AI is going to focus now as much on white-collar as on blue-collar jobs. You are looking at machine learning algorithms being deployed in financial services, in healthcare and in other places. The machines are getting increasingly powerful.” Although, historically, technology has increased labour productivity and created new and better jobs, as machines become more intelligent, there is significant uncertainty over future job creation. The US manufacturing industry is producing as much as it ever did, but with fewer workers. According to economists, 80% of the decline in the share of income going to the workforce between 1990 and 2007 resulted from improved technology. This trend is expected to spread to the service sector, as rapid advances in robotics, sensors and machine learning enable employers to replace hired labour.


From Berkeley Labs to democratising AI with APIs

With the latest 2.0 version Spark, Databricks CEO and co-founder Ali Ghodsi is hoping to bring Artificial Intelligence to the masses. “People have been working on it [Machine Learning] for 20, 30, 40 years, but it's really breaking through now. We're seeing it everywhere,” he says. “The same algorithms that existed in the 70s or 60s now become powerful because you have a lot of data.” ... “Most and the time and effort of building machine learning systems goes to configuring them, collecting these massive amounts of data that these algorithms need, doing feature engineering, extracting the features that you need, tuning that, and then running it through machine learning, then doing the verification, using tools to make sure that you’re managing all these resources that you have.”


5 apps to keep your Android device running smoothly

The Android world has changed a lot since 2012, but that was the last time we wrote about the best Android cleaning apps. Five years is an eternity in the tech world: Some of the apps we originally covered have been abandoned, while others have given way to better products. ... One of the biggest problems for smartphones—both Android and iOS—is background services chewing through battery capacity and device performance. The more apps you install and leave running in the background the worse your device will perform. We've all experienced it, and while Android is getting better at freezing apps that aren't performing necessary functions, problems still exist. Greenify wants to solve that problem by putting apps into hibernation mode when your device isn't in use. It won't just put your apps to sleep, though: Greenify gives you a full list of what's running and what may be causing issues and then gives you the choice to add it to its hibernation list.


NIST Issues Draft Update to the Cybersecurity Framework

“We wrote this update to refine and enhance the original document and to make it easier to use,” said Matt Barrett, NIST’s program manager for the Cybersecurity Framework. “This update is fully compatible with the original framework, and the framework remains voluntary and flexible to adaptation.” NIST further notes that, “in the renamed and revised ‘Identity Management and Access Control’ category, the draft clarifies and expands the definitions of the terms ‘authentication’ and ‘authorization.’ [NIST}also added and defined the related concept of “identity proofing.” In the draft update, NIST also includes the concept of using metrics — measuring the business impact of using the framework of standards. “In the update we introduce the notion of cybersecurity measurement to get the conversation started,” Barrett said.



Quote for the day:


"Unselfish thinking makes you part of something greater than yourself" -- John Maxwell


Daily Tech Digest - January 12, 2017

The DDoS Threat for Enterprises: Why Managed Security Matters

Many prominent voices in the cybersecurity arena warn that DDoS attacks, already on the rise, are likely to proliferate as botnets spread. After the source code for Mirai was released earlier this fall, other attackers modified and began deploying it for themselves. Moreover, numerous botnets are available for rent on the Darknet. In addition, easy access to such DDoS “recipes” virtually assures new exploits sprouting across the Internet of Things (IoT) landscape, seeded as it is with marginally-secured gadgets meant to simplify life. Ironically, many of the most vulnerable devices, such as Internet cameras, are marketed to make our homes and offices safer. Unfortunately, enterprises are top targets for DDoS attackers. At the same time, enterprise IT is increasingly budget-strapped, working at capacity maintaining basic operations.


3 reasons why 2017 will see massive cloud migration

When all outsourced hosting is taken into account—which includes SaaS, IaaS, and PaaS—many analysts estimate that 20 to 30 percent of workloads are currently on the cloud. But a better metric is to look at what enterprise applications have migrated to an IaaS or a PaaS platform, which is how most enterprises measure their presence in the cloud. Although SaaS is certainly an option for replacing on-premises applications, its usage tends to be for new, often off-the-shelf software, not existing software as in the case of IaaS and PaaS. Using that IaaS- and PaaS-only scenario, Global 2000 enterprises have migrated about 5 to 7 percent of their on-premises applications. That’s up from my estimate of 1 percent in 2013, a figure that aligns well with the revenue growth of the major public cloud providers.


Follow These Best Practices to Secure Your IoT Deployments

Unlike even the most widely distributed conventional networks, IoT networks present adopters with the unique challenge of managing ecosystems containing millions or even billions of devices. “Scale is the biggest challenge we’ll face in securing the IoT, and it’s going to require the security community to think differently,” Blackmer says. “This means more identity- and policy-based security, virtualization and the adaptability that brings, and using the network itself to detect and remediate malicious traffic and attacks.” Perhaps the trickiest thing about remotely managing high-scale IoT environments is planning how each device gets online and how IT teams will be able to quickly and accurately identify all of the networked devices. “Remote management is only useful if you have appropriately brought the device online in a highly scalable and secure way, with the appropriate identities associated with it,” Grieco says.


IBM bets on the blockchain to keep your medical data safe

The research initiative is a two-year agreement between the FDA and IBM which aims to create and promote a "secure, efficient and scalable exchange of health data using blockchain technology." As our healthcare systems rely more and more on electronic records, the idea of transformative, smart healthcare systems has caught the eyes of tech vendors and research teams alike. Using software to create more efficient records systems, using Big Data and sequencing to improve our understanding of genetics and the use of smart devices to monitor the conditions of patients automatically are just some of the ways technology is impacting our health, but with innovation lies risk. Data breaches are a daily occurrence in today's world. If is a matter of when, not if, enterprise players become the victim of a successful cyberattack, and it is almost expected that, eventually, your data will in some form end up for sale online.


Microservices and containers present a new deployment model in 2017

One problem with microservices in traditional cloud deployments is the latency associated with accessing them. Every microservice is an inquiry-response combination, and if the microservice is accessed frequently in the course of doing work, the delays that accumulate can seriously impact user response time and productivity. This is an even greater problem if the microservices are brokered through an API management tool since the tool introduces an extra hop between the microservice user and the microservice. Another problem that can hurt microservice adoption is resource waste. Microservices are typically small, far smaller than traditional application components. When deployed on virtual machines (VMs), the operating system and middleware needed to run those microservices can make up over 90% of the machine image, and even then the machine images themselves are often much smaller than usual.


Death to the hybrid WAN

Hybrid WANs combine a mix of data services to interconnect geographically dispersed locations. A network that combines MPLS and carrier Ethernet services is a hybrid WAN, so too is a WAN that combines 4G and MPLS. When you have some sites connected via MPLS and others via IP VPNs, this too was a hybrid WAN. When you have sites connected to an MPLS backbone with a secondary Internet connection, you also have a hybrid WAN. SD-WANs speak about the overlay; hybrid WANs speak about the underlay. The two are not exclusionary. You can build a hybrid WAN without an SD-WAN, and you could build an SD-WAN that’s a hybrid WAN. ... You might be wondering, then, as to the difference between a hybrid WAN and a WAN. I would say, in fact, that practically there is no difference.


How IoT and machine learning can make our roads safer

Controlling traffic and keeping roads clear can help immensely in reducing accidents and incidents that occur because of poor road and weather conditions. Driving safety, in particular, is dependent on being able to monitor road surfaces and identify road hazards. IoT road sensors can provide real-time data from roads to help divert the flow of traffic away from areas of hazard. French IoT startup HIKOB is exploring the possibilities in several French cities. “Road sensors are going to be one of the most crucial developments that will take place in the world of transportation with the introduction of the Internet of Things technology,” says Ludovic Broquereau, VP of marketing and business development at HIKOB. “Road sensors can be easily embedded under the roads so that they can effectively measure the changes in temperature, traffic volume and humidity, among other weather and traffic constraints.”


12 New Year's resolutions for your data

Now you have data coming out of your ears and spilling all over the place. Your mainframe is a delicate flower on which nothing can be installed without a six-month study. The rest of your data is all on the SAN. That works out because you have a “great relationship with the EMC/Dell federation” (where you basically pay them whatever they want and they give you the “EMC treatment”). However, the SAN does you no good for finding actual information due to the effects of VM and application sprawl on your data organization. Now the millennials want to deploy MongoDB because it’s “webscale." The Hadoop vendor is knocking and wants to build a data lake, which is supposed to magically produce insights by using cheaper storage ... and produce yet another storage technology to worry about.


Ransom is the main motivation behind cyber attacks

“One thing is clear: Money is the top motivator in the threat landscape today,” said Carl Herberger, Vice President of Security Solutions at Radware. “Attackers employ an ever-increasing number of tactics to steal valuable information, from ransom attacks that can lock up a company’s data, to DDoS attacks that act as a smoke screen for information theft, to direct brute force or injection attacks that grant direct access to internal data. ... Cyber ransom is the fastest-growing motive and technique in cyber-attacks, as most phishing attempts now deliver ransomware. Today, threat actors focus their ransom attacks to target phones, laptops, company computers, and other devices that are a daily necessity. In the future, they may target lifesaving healthcare devices like defibrillators.


8 Big Tech Battles That Will Be Fought In 2017

As consumers and businesses continue to adopt smart devices at a growing rate, and in light of IoT malware that caused major Internet disruptions this past fall, there will likely be a battle between regulators and industry groups on the one hand, and consumers and some manufacturers on the other. Consumers want cheap devices, and there are firms that specialize in offering cheap technology; the government, industry groups, and cybersecurity professionals, on the other hand, want IoT devices to be made with some minimal security capabilities in order to prevent their being easily compromised and commandeered for DDoS attacks. But, adding features such as security improvements costs money, something that consumers do not like to spend on features about which they do not care.



Quote for the day:


"Technology makes it possible for people to gain control over everything, except over technology" -- John Tudor