Daily Tech Digest - January 28, 2017

IoT and business model transformation: We're not there yet

One thing is clear: IoT integration should be at the top of your agenda — and, in fact, at the top of your entire C-suite’s agenda. Because prying open the IoT treasure chest isn't a matter of technical prowess — it's a matter of organizational prowess. Sure, the technical challenges are formidable in their own right. With the promise of near-endless data comes the requirement to store and analyze that near-endless data. And when our data lakes become so vast, how can we make sure that our data is secure and the quality is up to par. Tough nuts to crack, but with the help of advances in storage technology, machine learning and cybersecurity, we’re definitely making good progress. That’s why most of my conversations with the C-suite take on a different focus: “Hypothesize these challenges solved, how do you get it to actually work? And what does it mean for my organization?”


Hydraulic muscle makes for tougher, stronger disaster-site robots

The Tokyo Tech/Bridgestone artificial muscle is a very simple device based on the human muscle, only instead of using contracting muscle tissue it uses a rubber tube bound by woven high-tensile fibers, which contracts in length as its pressurized with hydraulic fluid. The combination of rubber and fabric gives it a structure like that of the human artery, so it responds dynamically as pressure is applied and released, allowing it to move smoothly and precisely. ... According to the team, producing the muscle required the development of a new oil-resistant rubber that also has excellent deformation characteristics. The sheath needed a new technique for weaving high-tension chemical fibers, and the tube ends required special tightening to resist high pressure without leaking. The result was an actuator five to ten times the strength-to-weight of electric motors or solid hydraulic cylinders.


The Great Digital Identity Debate

For optimal management of digital identity, Madhu said, the process “begins at the business endpoint, which represents the edge that the consumer interacts with. That could be a private or public business.” A consumer could be challenged for credentials at one business and, across transactions, might not have to be challenged at subsequent interactions with other firms, as they intrinsically trust the credentials already presented and “accept you and can personalize content knowing who you are.” That has been established by XAML. But there are no hard and fast guidelines in the U.S. governing the attributes that a business should check for risk beyond typically confirming one’s name, date of birth or Social Security number. Other avenues of technology tied to digital identity, said Webster, include biometrics. But, said Madhu, biometrics exist primarily to avoid using passwords, where there is nothing wrong with passwords per se in establishing identity.


Big Data Leadership: CIO, CAO, Or Maybe The Big Dog

The common theme in the analytics community is along the lines of "We have to get buy-in from the CEO and the board." Buy-in means giving an OK or allocating funds. What a big data strategy really needs is for the big boss to say, "We're going to do this. If it changes people's jobs, the products we offer, or the way business gets done, we still have to do it." It's about delivering a mandate and providing leadership. Someone on the analytics or IT team can come up with great ideas for the use of data and how it can change the company, but they have no authority over the business units and too often they have only a marginal understanding of a line manager's job in the field. The CEO may have even less of an understanding of what really happens in the field, but what they do have are the authority and the responsibility. A big data initiative -- in fact the broader adoption of analytics -- is a multi-departmental effort.


Black market medical record prices drop to under $10, criminals switch to ransomware

The black market value of stolen medical records dropped dramatically this year, and criminals shifted their efforts from stealing data to spreading ransom ware, according to a report released this morning. Hackers are now offering stolen records at between $1.50 and $10 each, said Anthony James, CMO at San Mateo, Calif.-based security firm TrapX, the company that produced the report. That's a big drop from 2012, when the World Privacy Forum put the street value of medical records at around $50 each. That's because the average profit per record was about $20,000. The information in medical records can be used for medical billing fraud as well as identity theft and other big-money scams. But the market has become saturated, said James. With about 112 million records stolen in 2015 alone, the medical info of nearly half all Americans is already out there.


Zuckerberg defends immigrants threatened by Trump

While the country will have to come to grips with how to deal with the coming unemployment crisis fueled by globalization and automation, and Zuckerberg doesn’t claim to have an answer here, he’s brave to stick up for inclusive values that underpin the modern American spirit. Even if that means sparring with the other most powerful man in the world. Meanwhile, Zuckerberg today announced he’s dropping his Hawaiian land lawsuits that were part of him securing land on the island to build a home, calling the suits “a mistake” and planning a different route forward. The CEO has learned a lot about listening to the public since the early days of Facebook’s privacy missteps. In other Facebook-Trump news, COO Sheryl Sandberg yesterday posted her stern disagreement with Trump signing an executive order that will pull funding from foreign aid organizations that provide counseling about family planning options including abortion.


Here's how robots are going to change employment

"We are seeing the emergence of a Skills Revolution — where helping people upskill and adapt to a fast-changing world of work will be the defining challenge of our time. Those with the right skills will increasingly call the shots, create opportunities and choose how, where and when they work," said Jonas Prising, Chairman & CEO at ManpowerGroup. "Those without will look to the future and not be able to see how their circumstances will improve. This polarization of the population that is playing out in front of our eyes is no good for society or for business. ... "Now is the time for leaders to be responsive and responsible: we cannot slow the rate of technological advance or globalisation, but we can invest in employees’ skills to increase the resilience of our people and organisations. Individuals also need to nurture their learnability: their desire and ability to learn new skills to stay relevant and remain employable."


Banking on Bots: The Move towards Digital Labor in Financial Services

It’s no exaggeration to say that nearly every major process in the world of financial services will present candidates for bots, from the front, middle and back-office to enterprise services such as finance, compliance, and risk management, across all business units including investment banking, wealth and asset management, retail and commercial banking and insurance. At one bank, for example, bots are being used in trade settlement. According to an article in American Banker, the bank has programmed bots with rules that let them perform research on the orders, resolve discrepancies and clear the trades. While it takes a human five to ten minutes to reconcile a failed trade, the bot can do the same task in a quarter of a second.


Vanishing point: the rise of the invisible computer

Technologies such as gesture tracking and gaze tracking, currently being pioneered for virtual-reality video games, may also prove useful. Augmented reality (AR), a close cousin of virtual reality that involves laying computer-generated information over the top of the real world, will begin to blend the virtual and the real. Google may have sent its Glass AR headset back to the drawing board, but something very like it will probably find a use one day. And the firm is working on electronic contact lenses that could perform similar functions while being much less intrusive. Moore’s law cannot go on for ever. But as it fades, it will fade in importance. It mattered a lot when your computer was confined to a box on your desk, and when computers were too slow to perform many desirable tasks. It gave a gigantic global industry a master metronome, and a future without it will see computing progress become harder, more fitful and more irregular.


From insular US firms to spammy marketers: Who will GDPR hit the hardest?

“The upcoming GDPR will be especially demanding for SMEs that aim to collect large amounts of personal data for disruptive applications. For instance, GDPR requires that a data protection impact assessment should be carried out prior to processing personal data. GDPR provides some leeway to SMEs in terms of assigning a data protection officer, or in their record keeping activities. However, this holds true only if the processing is not likely to result in a risk to the rights and freedoms of the data subjects, or the processing is not the core activity of the business.
 “GDPR demands that consumers should be able to review when their personal data is collected and how it is used, and be able to give or withdraw consent. ...”



Quote for the day:


"Pride is concerned with WHO is right. Humility is concerned with WHAT is right." -- Ezra T. Benson


Daily Tech Digest - January 27, 2017

‘Security and fraud risks drive merchant payment decisions’

Despite the increased merchant focus on security, in almost all companies there’s one aspect of a business which represents a potential vulnerability that goes unnoticed from the security perspective. It’s a part of the fraud management team. One reason that this weakness is usually undiscussed is precisely that it is a part of the fraud team’s structure and method, and in general the fraud department is not a usual subject of infosecurity concern. Since their purpose is to protect the company and prevent loss, their goals seem to fit in naturally with the wider security concerns of the company. The potential vulnerability is a function of a method typically used by fraud departments rather than anything integral to the nature of the fraud prevention effort itself.


IoT hits pay dirt where needs and capabilities align

"Manufacturing is seeing huge returns from IoT," said Isaac Brown, analyst with Boston-based Lux Research. "Both from improving operations [within factories] and from producing and selling IoT-enabled products." Jabil, a contract manufacturer, takes an innovative approach to smart manufacturing, going beyond using networked vibration or heat sensors to track equipment health. For example, by taking precise weight measurements of the components produced by an injection molding machine, and using Microsoft's Azure IoT software to analyze that output, it gets clues into whether that machine is running optimally, and can move toward preventative rather than reactive maintenance. "We've seen 10-20% improvements in metrics we track, such as scrap reduction," said Gary Cantrell, Jabil's director of enterprise production and quality.


6 areas of AI and machine learning to watch closely

Given that AI will impact the entire economy, actors in these conversations represent the entire distribution of intents, levels of understanding and degrees of experience with building or using AI systems. As such, it’s crucial for a discussion on AI — including the questions, conclusions and recommendations derived therefrom — to be grounded in data and reality, not conjecture. It’s far too easy (and sometimes exciting!) to wildly extrapolate the implications of results from published research or tech press announcements, speculative commentary and thought experiments. Here are six areas of AI that are particularly noteworthy in their ability to impact the future of digital products and services. I describe what they are, why they are important, how they are being used today and include a list (by no means exhaustive) of companies and researchers working on these technologies.


Robots and the Future of Work

Whoever makes the best robots owns the future of work. There will be so many kinds of robots, there are already quite a few. Will it be China, Japan or can we too make useful, adorable and importantly, robots able to learn? It's more important than everything else, it's how AI, IoT, Big Data and 3D-printing reach the next level of sophistication. Robots like Ethan, from the show Extant. Robots will enable us to understand the human condition in new ways, and help us take greater custodianship over the material world, we have so unconditionally exploited. Robots will be our children, but also our slaves and we'll learn to love our robots until robots themselves can become something else.


Choosing optimized technology for the Internet of Things

To optimize for IoT, companies need to transition from traditional architecture to a more optimized architecture. Elements of the current technology stacks may need to be redesigned so they can support billions of interdependent processing events per year from millions of products, devices, and applications. Since networked devices are always on, companies must be able to react to customer and system requests in real-time; agile software development and delivery will therefore become a critical competency. Seamless connectivity will also become a must-have, as well as collaboration across IT and business units, which have traditionally been siloed. Moreover, companies must be able to securely and efficiently collect, analyze, and store the data emerging from these refined IT architectures.


Why Smart Machines Will Boost Emotional Intelligence

We will not flourish along with smart machines by ourselves. It is going to be an otherness game. It is not going to be a competitive game. It’s going to be a collaboration game. New Smart is a new way of thinking, to define yourself not by what [you] know or how much [you] know, but by the quality of [your] thinking, listening, relating and collaborating. It has four other principles. I am not my ideas; I must de-couple my beliefs, but not my values from my ego. My mental models are not reality; they’re only my generalized stories of how the world works. I must be open-minded and treat my beliefs — not my values — as hypotheses to be constantly tested and subject to modification by better data. My mistakes and failures are opportunities to learn. Those are the five new smart principles, and the new way of thinking that will help us humans complement, augment, and thrive, in the smart machine revolution.


Israeli Cybersecurity Industry Grows as Global Threats Multiply

According to figures based on the non-profit’s data platform and tech industry database PitchBook, 365 Israeli cybersecurity companies raised a total of $581 million in 2016, about 15 percent of all capital raised by the industry globally. About a quarter of the 65 Israeli cyber start-ups founded last year have already succeeded in raising funds, the report said. The report was released ahead of next week’s Cybertech Tel Aviv 2017 conference. ... The new research suggests the country’s cyber industry is maintaining its status as a global leader, drawing on expertise and experience gleaned from the country’s elite military intelligence forces. “Israel is at the forefront of innovation in cybersecurity” as entrepreneurs who completed their mandatory military service “uniquely bring their cyberwarfare and cyberintelligence expertise to the commercial sector,” said Avivah Litan, a vice president and analyst at Gartner Research.


The shifting role of the IT professional In 2017

The ability to quickly learn new IT concepts and skills will soon become one of the most important attributes of an IT pro. With the workplace becoming more interconnected, the traditional structure and boundaries of IT roles are beginning to blur. Being an expert in one technology won’t be enough anymore. Employees who are a jack-of-all-trades, solution-focused, and can communicate the impact of technology to the organisation will see their demand grow. More specifically, the introduction of new machine-based technologies, alongside the continued adoption of a DevOps culture, will require IT pros to focus on developing new skill sets and certifications to operate and manage next-generation data centers. In 2017, two things will impact the role of the IT pro: the rise of the machines and an increase in the adoption of DevOps.


Growing UK's tech skills base will make or break prime minister's industrial strategy

“The industrial strategy says very clearly that we must become a more innovative economy and do more to commercialise our world-leading science base to drive growth across the UK, and that really runs through the entire document.”  According to the prime minister, this work will form a “critical part” of the government’s plans for a “post-Brexit Britain”, and ensure the country is in a strong economic position for many years to come, once its extrication from the European Union (EU) takes place. ... “If we’re going to have the kind of science, innovation and economy we need, we must make sure we are attracting people of all genders and from all backgrounds into science and innovation, and I see very little in this paper to give us confidence of that.”


Might the Blockchain Outlive Bitcoin?

On the regulatory front, the reviews remain mixed, but lawmakers seemed to err on the side of caution in 2015. For example, the state of New York enacted legislation to open up the crypto-currency market for Bitcoin banking licensure. Unfortunately, the bill attached draconian requirements, including a separate license for each exchange service offered and complicated registration requirements. ... Based on strong entrepreneurial movements fueled by aggressive venture capitalists, some speculate that the G7 nations will tend to eventually pave the regulatory way for digital crypto-currencies. If not, others speculate that developing nations in Africa, Latin America, and Asia will benefit, if the more developed nations exact too much restriction. Clearly, many of the world’s regulatory bodies still remain in deliberation with regard to managing crypto-currency.



Quote for the day:


"We're all passionate about something, the secret is to figure out what it is, then pursue it with all our hearts" -- Gordon Tredgold


Daily Tech Digest - January 26, 2017

Survey: IT workers worried about U.S. net neutrality repeal

IT workers debating net neutrality on the Spiceworks website "care deeply about the subject, with one side arguing government regulation of the internet is unnecessary and counterproductive, while others fear potential deregulation of net neutrality could put companies at the mercy of ISPs," Peter Tsai, an IT analyst at Spiceworks, wrote in a blog post.  Forty-five percent of respondents say they expect upload or download speeds to get slower if the rules are scrapped. "A website belonging to a small business might be given less priority than a website belonging to a more established company with deeper pockets," Tsai wrote.  More than eight in 10 respondents said they were concerned that a repeal of the net neutrality rules would allow broadband providers to slow certain types of content and to block access to some content.


Indian techies nervous about stay in Donald Trump’s America

The lack of clarity on how exactly the Trump administration will tweak visa norms is fuelling apprehension among Indian techies. While some have put off key financial decisions, others say their job prospects have dimmed since the change of guard at the White House. “I have put plans to buy a house on hold, because my visa is expiring next year. So, I don’t know how my green card application, which was supposed to begin in February, would get affected,” said a management graduate who earned his degree in the US and now lives in Texas. A New York-based information management specialist who has been in the US since 2012 said he has experienced an immediate fallout of the Trump presidency. “I was looking for a job and got one a few weeks ago. But they stalled the appointment because I have an H-1B visa,” he said. 


Riding The Blockchain Train, Together

“It’s all a do-mocracy,” Behlendorf said. “For every line of code, we’re dependent on the companies bringing their developers and the independent developers getting together with them and forging something in common. The downside of that is that you need to create a compelling case to get that fire lit, but on the upside, it means that no one is waiting for one developer or a team to do everything for them, but they’re all working together to build something.” ... “It started life internally at IBM as a research project, so they brought the code along with documentation and a bunch of other things,” he said. “But they knew they needed to get input and build a community around it and make it less of an IBM project and more of a multi-stakeholder project. So, in that time, Fabric has had contributions from many other developers and now is on course.”


Google is finally letting anyone make apps for its new virtual reality platform

This approach is understandable: It means that Google can ensure that only the very best experiences are available to showcase its new technology — something especially important given the full-on nature of virtual reality. As the company says on its page dedicated to quality requirements for Daydream apps, "designing apps for VR is substantially different than for other platforms, particularly because poorly designed applications or performance issues can make some users feel nauseated." In other words: A bad smartphone game might annoy you, but a bad virtual reality app could make you want to vomit. The flipside of this strategy is that the selection of apps is necessarily limited. By releasing guidelines and letting anyone submit Daydream apps for inclusion in the Google Play app store, the selection available is likely about to get significantly broader.


ISACA Privacy Principles and Program Management Guide

As connected devices proliferate and the volume of data about individual users continues to increase, individuals are understandably increasingly concerned about their personal and online privacy. In response, numerous governments throughout the world have drafted legislation governing how individual privacy is treated. Navigating this landscape can be a challenging exercise – particularly given an increasingly interdependent global economy. ... When considering approaches to address potential privacy threats, you must acknowledge that privacy has multiple dimensions, and those dimensions can be used to define taxonomies of privacy problems, intrusions or categories. Enterprises must consider and address these seven categories of privacy with security controls and with appropriate privacy practices.


How half a million people are being paid pennies to train AI

A common technique for teaching AI systems to perform these tricky tasks is by training them using a very large number of labeled examples. These machine learning systems are fed huge amounts of data, which has been annotated to highlight the features of interest. These examples might be photos labeled to indicate whether they contain a dog or written sentences that have footnotes to indicate whether the word "bass" relates to music or a fish. This process of teaching a machine by example is called supervised learning and the role of labeling these examples is commonly carried out by Turkers and other online workers. Training these systems typically requires vast amounts of data, with some systems needing to scour millions of examples to learn how to carry out a task effectively. Training datasets are huge and growing in size ...


E-commerce players seek sops on digital transactions in Budget

"The Indian e-commerce industry would be looking for some positive outcomes both in terms of tax relaxation and more freedom of operation," said Harshvardhan Lunia, Co-founder and CEO, Lendingkart Technologies. "Moreover, the sector will also look at receiving more clarity for FDI (foreign direct investment) in B2C (business-to-consumer) e-commerce through an automatic route," he added. Industry stakeholders are of the view that expectations from the government in the upcoming budget on direct tax issues follows the fact that several challenges have surfaced in the area of taxation in the e-commerce space. "The characterisation of income is a key issue faced by e-commerce industry both by residents and non-resident players," said Anil Talreja, Partner, Deloitte Haskins and Sells LLP.


30 tasty tips for Android Nougat

Google's latest major Android release may have officially launched last fall, but if you're like most folks, you'll probably be getting your first taste of Nougat -- also known as Android 7 -- in 2017. If you want timely Android updates, Google's own Nexus and Pixel phones are the only way to go -- all other devices depend on third-party manufacturers to prepare and provide rollouts. And as we see time and time again, that tends to result in slow and uncertain progress. Once you've got the software, though, there's plenty to be learned about Google's most recent mobile efforts. Here are some practical tips to help you get the most out of Android's newest features -- both the marquee additions and the less obvious little touches.


The C4 Software Architecture Model

The Agile Manifesto prescribes that teams should value working software over comprehensive documentation. This doesn’t mean that we should not create documentation; it just means we should create documentation that provides value and at the same time does not hinder the team’s progress. We can achieve this using C4 architecture model. It is a static model, that provides an easy way to communicate the design of the system to all involved, and also brings a natural narrative for exploring the architecture of a software solution. Starting from the highest level (what is the system and how does it provides value to the business), it drills into the details, until the very low level of functionality. ... The C4 model is a hierarchical way to think about the structures of a software system. Why such a model would be needed, since the existence of UML, or 4 + 1 architecture views and the others?


What Does "Being Digital" Actually Mean?

An organisation’s journey to a digital universe is fraught with challenges and hard work and probably no small amount of contention. During that journey, you will almost certainly be confronted by those that throw doubt at its benefit. In fact, you may start doubting it yourself. The hardest part is the mindset shift from non-digital to digital. Any strong organisation is one that has a strong core of people that have stayed with them for many years. One that understand the business, that are loyal to the business. It is those people that create the culture and mindset of the organisation. And it is they that will have the toughest time in changing. It is they that will need to be convinced that your customers are not your internal “business” but those people that use your services. They will need to get used to releases on a weekly, or even daily basis.



Quote for the day:


"When people say they'd like to be in your shoes, it's usually after the difficult journey is finished." -- Tim Fargo


Daily Tech Digest - January 25, 2017

What Happens When a Customer of IT Becomes an IT Leader

An IT leader must think about the business outcome of technology investments, keeping in mind that conflicts can surface in employees’ mindsets, corporate operating rhythms, team reporting structures and more. One approach I’ve developed is to speak in the language of business executives and highlight the business outcomes they want to achieve. For example, Intuit has no less than nine billing systems that IT must try to bridge across. Our objective is to retire them in favor of one global system. But when we talked about "retiring" systems familiar to them, it caused some business leaders to think about how it might be risky to do so. When we flipped it to talk about the new capabilities the initiative would deliver – from wholesale bundling to quick pricing adjustments – they were willing to take on much more risk in parallel with us to move to these new systems.


Why this CTO says you need a CDO to do digital transformation right

The CDO plays a central and pivotal role in the digital enterprise and therefore in the future success of any business. Why? Because digital companies, digital disrupters, base their new digital business models on software, connecting the digital and physical worlds. Therefore, if software is the connection between the digital and the physical, the CDO is the connection between IT and business. They are now two sides of the same coin. Based on software, digital companies can create enhanced or totally new business models that offer completely new digital customer experiences. We have seen this with the newborn digital enterprises that are typically free of any physical assets such as fleets, factories, machineries or goods. It is through this software platform-only based business model they can move so fast, often resulting in exponential growth.


The road ahead: the coming rise of Artificial Intelligence in GRC

The GRC landscape is under a lot of stress due to the large number of unexpected events. Once again, Brexit and Trump are the obvious examples, with very few predicting the outcomes to those historic votes. The domino effect is the uncertainty they have created. For instance, there’s the wildly fluctuating exchange rates between the Dollar, Pound and Euro, and the unknown extent of regulatory change, which will come about following the triggering of Article 50 and Trump’s declaration to de-regulate the US. Businesses are finding it more difficult to plan and are having to allow for wider risk margins.  What is predictable, is that there will be far more unpredictable events in the next few years. As such, GRC technology and approaches will evolve to handle persuasive uncertainty and not simply the standard events.


When Machines Know How You're Feeling: The Rise Of Affective Computing

This particular branch of computer science is known as affective computing, that is, the study and development of systems and devices that can recognize, interpret, process, and simulate human experiences, feelings or emotions. But it’s also related to deep learning, because complicated algorithms are required for the computer to perform facial recognition, detect emotional speech, recognize body gestures, and other data points. The computer compares the data input — in this case, a human with whom it is interacting — to its learning database to make a judgement about the person’s emotions. A University of Ohio team programed a computer to recognize 21 ‘compound’ emotions including happily surprised and sadly disgusted. And, in tests, the computer was more accurate at recognizing these subtle emotions than the human subjects were.


Deloitte CIO Survey Finds Gap Between Business Expectations and IT Capabilities

Business priorities are focused on customers and innovation, says the Deloitte report, while IT capabilities are still lagging in these areas, which is where CIOs can play a critical role. Yet the business expectations for CIOs still focus on maintenance, efficiency, cybersecurity, and business process improvement. These gaps between business and IT may stand in the way of CIO inspirations. Deloitte classifies CIO types into three categories: “Trusted operators” ensure operational excellence, “change instigators” enable large business transformations, and “business co-creators” focus on revenue and growth. The survey found that 55% of CIOs report their current type as trusted operator and 34% as business co-creator, but 66% of all CIOs surveyed say their ideal state is business co-creator.


Tap into the new SELinux, DR features in RHEL release 7.3

Security-Enhanced Linux (SELinux) is one of the biggest improvements in RHEL release 7.3, giving administrators better control over policies. It is now possible to override a system module with a custom module that has a higher priority, so the custom module takes precedence. ... With RHEL release 7.3, organizations can also deploy multisite disaster recovery (DR) services without having to use a third-party vendor; the DR components are built-in and will integrate with the operating system. Admins can configure pacemaker to enable the multisite functionality, and trigger pacemaker alerts to receive notifications of status changes. This built-in disaster recovery option will help RHEL 7.3 be more reliable than preview RHEL iterations.


Big data: It may be the new oil but have public failures damaged adoption?

A recent report released by MHR Analytics found that 88% of UK C-level executives agree that data analytics and BI will be crucial to the future of their business, citing factors such as driving growth 42%, helping drive cost reduction and efficiency savings 39% and the need to improve customer intelligence 36% as key factors as to why they are introducing data analytics into their organisation. Challenges exist, the same report found that almost one in five businesses don’t have a chief analytics officer or a chief data officer, while 21% of the C-suite execs say that a lack of big data expertise is a challenge at board level. These are clearly big problems that need to be solved, particularly so when you consider that 76% of organisations are planning a big data or data analytics project in the next 12 months.


Could You Go to Prison for Not Reporting a Data Breach?

Not coming clean in a timely fashion about a cyber-breach is a serious matter - and creates opportunities for all sorts of financial improprieties. If anyone profited from insider information by acting on knowledge of the breach while he, she, or others were covering it up, for example, it is easy to understand why that person could face jail time for insider trading. But the issue is much broader. How many people bought or sold Yahoo stock between the time Yahoo employees discovered the breaches and the time that the firm disclosed the breaches to the public? Did anyone with insider knowledge of either breach advise anyone on the outside? Did anyone profit from that insider information? Did any employees receive compensation based on company-stock performance that was effectively distorted by a breach being covered up?


Are You A Venture CIO?

Focus on two types of venture capital investments. One type, called “Enabling” investments, increases the demand or expands the market for the investor’s own products and services. An example is Intel’s venture capital investments in video and audio software development firms that built systems requiring more powerful Intel chips. “Emergent” investments instead explore new, future opportunities not currently part of the investor’s business strategy by leveraging related products or services. For example, General Motors invested $500 million in the online car- and- ride sharing company Lyft to investigate mobility services. Venture CIOs must support their business in deciding whether to be the sole investor or to co-invest, if the company should acquire minority or equal stakes, and at what stage of the startup’s life cycle to invest.


Building Reactive Applications with Akka Actors and Java 8

The actor model provides a relatively simple but powerful model for designing and implementing applications that can distribute and share work across all system resources—from threads and cores to clusters of servers and data centers. It provides an effective framework for building applications with high levels of concurrency and for increasing levels of resource efficiency. Importantly, the actor model also has well-defined ways for handling errors and failures gracefully, ensuring a level of resilience that isolates issues and prevents cascading failures and massive downtime. In the past, building highly concurrent systems typically involved a great deal of low-level wiring and very technical programming techniques that were difficult to master.



Quote for the day:


"Some people change their ways when they see the light; others when they feel the heat." -- Caroline Schoeder


Daily Tech Digest - January 24, 2017

On Building a “Data Culture” in a Real Organization

What will vary from organization to organization will be the manner in which data governance and data analytics services are managed. The CDO has to have the authority, responsibility, and resources to manage all the necessary development, services, staff, and support associated with key points in the data supply chain. One important issue is what ongoing services have to be provided to make data and analytics useful, given the mix of analytical skills of those who can use the data. This should be driven by a consideration of what problems we are trying to solve with the help of data. As I suggested in How Much "Data Science" Do You Really Need?, ... Interestingly, the question of technology is not being raised in this discussion. Instead, we’re focusing on management, policy, and organizational issues.

Exploring the Intersection of Machine Learning and Analytics

All this machine learning gives us other great ways to interact with our data as well. With the SiSense chatbot, you can carry on a chat conversation from a messaging system like Slack or Skype, in which you engage in a natural language conversation with Sisense to get insights. You might type something like “Summarize sales by region for the fourth quarter of 2016” and Sisense will present you with a written response that might also be accompanied by a graph to further elaborate on the data provided. From this point, you have information to ask other questions, such as drilling down on a region to look at the store or salesperson performance. You could even do this while you’re on the run with the Sisense mobile app.


Technology continues to disrupt the marketing industry

It is evident from the research that customer experience and technology are still having a major impact on marketers. Marketers recognise that tech disruptors, such as Amazon and Uber, have raised the bar on customer expectation – with almost half (49%) of marketers surveyed feeling the pressure to reinvent customer experience just to keep pace. Customer experience is clearly moving up the business agenda, as it clearly should, with one in five respondents asserting that customer experience is now the primary focus for their organisation, and a further 15% saying they have gone through a major process of transformation in the past year to ensure they stay relevant.

What’s next for blockchain and cryptocurrency

Think of what’s happening in India, where the government recently scrapped 86 percent of cash in circulation, and in Venezuela, where currency is so devalued people now need to carry stacks of cash just to buy food. As a result, many retail investors are turning their attention to digital currencies, as well. Cryptocurrencies are free from government control. Governments can’t easily call in bitcoins or halt their movement across international borders without taking drastic actions. Financial institutions, bound by charters that describe the types of investments they can embark upon, have had few means of putting their money into bitcoins or other cryptocurrencies. But in 2017, we’ll see a greater push towards a diversity of cryptocurrencies as investments, and ETFs, hedge funds, and derivatives will start to act as conduits for institutions to gain exposure and get into the cryptocurrency game.

A CIO's role in 2017: Keep the lights on while planning for the future

Even with all the effort to digitally transform, there is an inherent tension between the past, or status quo, and future technology including either all the potential or complication it brings, depending on your view. But that tension can be eliminated if CIOs and IT organizations are conscious that the customer is their fellow employees. "If you pay attention to the concerns and to the people — [making] a cognizant decision that you're going to focus on making sure that the IT that they have is valuable to the company — and you're going to help them move into more current technologies without having them worry about their jobs, then they're going to continue to work well as a team," said Warren Perlman, CIO of Ceridian.

The Evolution of the 'Virtual Law Firm'

The biggest technological change around virtual law practice has been in cloud computing. Thirty-seven percent of all respondents to the 2016 ABA TECHSURVEY said that they used cloud technology, up from 30 percent in 2015. Cloud computing has especially caught in the small firm realm: 61 percent of small firms polled for the ILTA/Inside Legal Technology Purchasing Survey predicted that their firm’s software could be cloud-based in the next one to three years. “Core to a virtual law firm is going to be leveraging the cloud, using practice management software that’s in the cloud that you and your team can access from everywhere, using document storage where there’s collaboration there. It’s really focused around the cloud,” Burton says. The ABA’s TECHREPORT survey found that certain types of collaborative online client services haven’t really taken off, however.

Data science is easy; making it work is hard

With data science, it’s always smart to look backward from the point of action, from the decision being made to understand whether your systems are yet capable of handling the interaction. By focusing first on the decisions, and how they are being made, it becomes possible to understand where data science can truly add value. There are few things I find more frustrating than data scientists identifying value that could be delivered, but then realizing that there is no way to actually deliver it. Another common mistake is not identifying where inefficiencies are beyond your control — the delivery time from your logistics supplier, for example. No analytics will improve that. So data science is easy. Making it actionable is the hard part.

A star tech and media banker shares his thoughts on dealmaking in 2017

"The convergence of traditional and digital media will yield content synergies, advertising scale across several platforms and sales force efficiencies," Bourkoff wrote. He added that this convergence does not mean that we'll see more over-the-top streaming and skinny programming bundles. Demand for OTT falls sharply when prices rise, Bourkoff said, and the programming costs needed to create skinny bundles of channels will force prices so high that demand will ween. Bourkoff said his firm's deal pipeline included 50 mandated live deals at the end of the year. " As we build out LionTree in 2017, I firmly believe it has never been more important to take a long-term investment view as it is now," he said.


Why Slack, Chatbots, And Freelance Workers Have Your IT Department Freaking Out

Compounding these growing threats are a couple of workforce trends that make them more likely—namely, the rise of workplace collaboration tools. CompTIA’s report points out that as more workers take advantage of BYOD ("bring your own device") policies and use their own smartphones and laptops for work purposes, the use of project-management platforms and apps has risen in order to keep everybody connected. A new study from Okta, an identity and device management provider, based on data from its own customers who generate an estimated million+ logins, found that more than 50% of apps accessed through its service are not provided by IT departments. This means workers are using Okta to secure their personal apps and data as well.

How information security professionals can help business understand cyber risk

Business owners also do not like spending money on anything that does not make them money, says Holman, adding that even cyber insurance is a grudge purchase. “I’m never fond of paying a high premium, but I accept it if there’s a niggling feeling that I could lose my livelihood and house if I fail to get the right insurance cover,” he says. “And mitigating cyber risk is exactly the same. If companies don’t do it, they could go out of business.” But businesses tend to be overconfident in existing defences and often doubt they could be seriously affected by a cyber attack, leaving infosec pros with the challenge of persuading them there is a real need to mitigate security risks.



Quote for the day:


"A single conversation with a wise man is better than ten years of study." -- Chinese Proverb


Daily Tech Digest - January 23, 2017

The rise of the machines: lessons from history on how to adapt

Although at different stages of development and adoption, as these technologies bed in, becoming more widespread and convergent, we will see a radical shift in the way that individuals, companies and societies produce, distribute, consume and re-use goods and services. These developments are prompting widespread anxiety about what role humans will have in the new world. As the pace of change accelerates, so the alarm levels ratchet up. A University of Oxford study estimated that close to half of US jobs could be lost to automation over the next two decades. In the opposite camp, economists like James Bessen argue that, on the contrary, automation and jobs often go hand in hand. It’s impossible at this point to predict what the overall impact on employment will be. Disruption will happen; of that we can be certain. But before we swallow all of the bad news, we should take a look at history.


How to create work-life balance in tech: 7 tips from the C-suite

The overworked tech CEO is now a cultural trope for a reason: Only 65% of tech workers said they were satisfied with their work-life balance, according to a recent survey from Comparably. This is a problem, as constant work and the resulting stress can lead to health problems such as impaired sleep, depression, diabetes, and heart disease—which not only hurt the employee, but also the company, in terms of turnover and rising health insurance costs. Despite the pressure to be always on, finding the proper work/life balance is essential, experts say. "It's possible to be a tech leader and to make time for taking care of yourself," said William C. Fisher, president of Quicksilver Software, Inc. "But, it takes a willingness to make that a top priority and schedule the time."


Dublin, New York officials cite smart-tech challenges and successes

"We're on the verge of seeing smart city tech grow exponentially," he added, speaking during a visit last week to the Smart Cities Innovation Accelerator, sponsored by Harvard University in Cambridge, Mass. Cudden joined about 50 CIOs and CTOs from other cities, mostly from the U.S., to share ideas on taking advantage of the latest smart city technology. "One thing I learned from the U.S. cities is to take an entrepreneurial mindset and to use startups to address problems in cities, with something like an entrepreneurship-in-residence program," Cudden said. "A lot of cities are dealing with the same problems, and one takeaway is there's very little difference in the challenges in European cities or U.S. cities."


Introducing the Open Process Automation Forum. Finally.

Here’s the big news: 2017 marks the kick off the Open Process Automation Forum, a working group within The Open Group, a vendor- and technology-neutral industry consortium. The new Open Process Automation Forum is focused on developing a standards-based, secure and interoperable process control architecture that can be leveraged across multiple industries including oil and gas, petrochemical, mining and metals, pulp and paper, food and beverage, pharmaceutical and utilities. The concept itself is not new, as it is already playing out in The Open Group’s IT4IT Forum that is building a vendor-neutral reference architecture for managing the business of IT. Similarly, The Open Group’s Future Airborne Capability Environment (FACE) is defining approaches for using open standards with avionics systems.


New game, new rules: 3 steps to secure your bank in the digital age

It’s no secret that the sheer volume of data being collected and stored is higher now than ever before. According to EMC, by the year 2020, about 1.7 MB of new information will be created every second for every human on the planet. The data boom isn’t any different for banks—as customers access their banking information across multiple channels and touch points, they’re able to capture new and unique information about customer habits, preferences and more. That information makes banks a goldmine for hackers. The number of endpoints and systems exposed to the outside world is increasing, which means data no longer remains locked inside a data center. Instead, it proliferates outside of the four walls of business, making it vulnerable to hackers and security threats.


Dive Deep Into Deep Learning

The most remarkable thing about deep learning is that we don’t program them to perform any of the acts described above. Rather, we feed the deep learning algorithm with tons of data such as images or speeches to train it, and the algorithm figures out for itself how to recognize the desired targets. The ability of Deep Learning methods to learn complex nonlinear relations by churning high amount of data, creating features by themselves makes it stand out from the other traditional Machine Learning techniques. To know how a standard Deep Learning algorithm works, we have to follow its predecessors, neural networks. Well, some practitioners also refer Deep learning as Deep Neural Networks, which is also a choice. In short, a neural network is a family of three layers — an input layer, hidden layer, and an output layer as discussed below.


Idempotent configuration management sets things right -- no matter what

As systems architects are not perfect, many systems end up woefully underutilized -- wasting hardware, power, licences and maintenance costs -- while others lack necessary resources -- leading to performance issues. Even with the elastic resources of cloud computing, systems administrators must still ensure that the operational environment is configured correctly to optimally host the workloads. This is where idempotency comes in. Based on a mathematical concept introduced by Benjamin Peirce in 1870, the term now applies in multiple areas of computing. This does lead to confusion, as idempotency within a database is different from that in a Java program, which is different again from idempotent configuration management, which concerns modern DevOps and IT administrators.


6 EMM predictions for 2017

MDM is quickly becoming old news. Instead, Gartner coined the term EMM, pointing to a shift in mobile management to complete suites that include multiple tools for device, app and software management. And as the line is starting to blur in what defines a mobile device, Silva says MDM solutions will have "an tough battle against more full-featured EMM suites." If anything, more businesses will embrace EMM platforms and continue to use familiar MDM tools that are included in the suite. EMM also helps businesses consolidate certain practices -- like compliance regulations for example -- and deploy updates and patches across a range of complex devices all at once. "Solutions that are seamlessly integrated across all existing enterprise systems and platforms will begin to increase in popularity due to their comprehensive visibility and ease of use," says Mitch Berry, vice president of EMM at MOBI.


Raspberry Pi rival: Asus launches Tinker Board

Much as is possible with the Pi 3, the Tinker Board can be used as a PC replacement or a media center, with Asus' board supporting a custom version of the Linux-based Debian operating system and the open-source media center software Kodi. However, it won't run Raspbian, the Raspberry Pi's official, Debian-based OS. Asus is also touting the machine as a board for makers, with the Tinker Board also packing a 40-pin header with 28 general-purpose input output (GPIO) pins. These GPIO pins allow the board to control a range of hardware, and in the Pi have allowed the board to be used in modding projects ranging from robots to book scanners. Another consideration for makers is battery drain, and the Tinker Board's max power consumption is five watts.


An Introduction to Differential Privacy

Differentially private algorithms are a promising technical solution that could ease this tension, allowing analysts to perform benign aggregate analysis while guaranteeing meaningful protection of each individual’s privacy. This developing field of technology is worth considering in any system that seeks to analyze sensitive data. Although the differential privacy guarantee was conceived of only ten years ago, it has been successful in academia and industry. Researchers are rapidly inventing and improving differentially private algorithms, some of which have been adopted in both Apple’s iOS and Google’s Chrome. This article discusses the historical factors leading to differential privacy in its current form, along with a definition of differential privacy and example differentially private algorithms.



Quote for the day:


"When your values are clear to you, making decisions becomes easier." -- Roy E. Disney


Daily Tech Digest - January 22, 2017

Why software is like water, and what it means for global leadership

Software is the international language. It allows us to do everything from receiving instantaneous news out of Syria to hailing a ride in the rain via our smartphones. Both of these examples and more are accomplished by software. The theme for this year’s World Economic Forum Annual Meeting is particularly timely and relevant. We need Responsive and Responsible Leadership as we all play witness to an earlier call by the Forum: the advent of the Fourth Industrial Revolution, as the lines are blurred between the physical, digital, and biological spheres. For countries to survive and thrive in this era, software needs to play a central role. Agriculture, basic manufacturing, education, food production, and water filtration all require software to work well at scale. For companies and economies, software is key to sensing change and reacting to it.


Researchers condemn unsubstantiated WhatsApp “Backdoor” story by Guardian

A group comprising of 30 security researchers have now co-signed an open letter to mount pressure on the Guardian so that it retracts the false story asserting that the paper is trying ‘very concretely’ to endanger public. The security researchers who have co-signed this open letter include salient bigwigs of the security industry including The Tor Project’s Isis Lovecruft, cryptographer Bruce Schneier, Mozilla’s Katherine McKinley, security research Thaddeus T’Grugq’, security researcher and author Jonathan Zdiarski and Open Crypto Audit project’s Kenneth White. Security researchers believe that the vulnerability pointed out by the Guardian is a minor one and poses an insignificant threat. It is related to the way WhatsApp handles essential retransmission for unread messages when the user changes SIM or phone card.


Digital Transformation Or Digital Free Fall: What Every CEO Must Know

Many leaders have fallen into the trap of believing digital transformation is like playing a game of technology catch-up. That if they can harness a bit of digital exhaust and turn big data into smart data, that somehow their business will transform itself. Nothing could be further from the truth, and the billions of dollars being spent chasing digital shadows won’t change a thing. Organizations whose business models are a few revolutions back on the digital curve cannot transform from lagger to leader by simply implementing blockchain or machine learning. Digital transformation is really more of a leadership, culture, strategy, and talent issue than a technology issue. Real digital transformation occurs when business models and methods are reimagined by courageous leaders willing to manage opportunity more than risk, focus on next practices more than best practices and who are committed to beating their competition to the future.


The Eye In The Sky Gets A Brain That Knows What It's Seeing

Crowdsourcing can also help with training and testing machine-learning algorithms, since human workers from around the world can be paid to quickly label features on satellite images or verify labels applied by machines, he says. And while both crowdsourcing and automation let DigitalGlobe and its customers extract more detail from satellite images than ever before, Har-Noy says the company takes steps to protect people’s privacy and safety. The resolution of commercial satellite images, regulated by the U.S. Commerce Department, means people aren’t recognizable at the level of detail the company releases, Har-Noy says. DigitalGlobe also doesn’t release images of active U.S. combat areas. "We take privacy very seriously with regard to the information we release, we make accessible, and also that other people derive," Har-Noy says.


Algorithm does real-time, city-wide ride sharing

The biggest part of that challenge is finding the optimal solution within that entire decision space; algorithms often get hung up on a local optimum or can't explore the entire space within a reasonable amount of time. Fortunately, the authors recognized that they don't need the global optimum. A reasonably good local optimum may not be the most efficient, but it's good enough to get people in cars quickly. A first round of trip assignments is done using what's called a greedy algorithm, which simply starts with the longest trips first and tries to minimize travel delays. From there, the algorithm attempts optimizations, but it's capable of producing an answer at any time if a decision has to be made. In addition, it's possible to make some optimizations like limiting the cars that are considered for servicing a trip.


IoT Seen as Weakest Link for Attacking the Cloud

'Not only are IoT devices an attractive target because of their inherent insecurity, but also for the role they play in some organizations, such as closed-circuit television cameras, which can provide real-time information about everything that is happening at a given location,' Fortinet said. But vulnerabilities are not the only issue. As IoT devices are being deployed, they must also be managed, and they are increasingly being managed by cloud solutions that require a communications channel between the IoT device and its master controller in the cloud. 'We expect to see attacks leverage this trust model in order to poison the cloud, and then use that beachhead to start to spread laterally,' Fortinet said. 'These end devices can then be exploited to misuse their trusted relationship to upload malware to, and distribute it from the cloud.


Securing a board appointment: CIO requirements and benefits

CIOs can become more attractive board candidates by developing a deep expertise in a particular area, such as digital transformation, experts said. "The best thing that people can do is to make a name for themselves and the work they're doing. To just have CIOs go out and try to market themselves to get on a board isn't how it happens. The best people are tapped on the shoulder for the work that they're doing," Gambale said. She noted that CIOs also might secure a board appointment by working with executive recruiters, as the firms they work in often also handle board of director searches. Meanwhile, Morris said serving on a nonprofit board first eventually could lead to serving on a company board of directors.


Should Banking Build an Internet of Things (IoT) Strategy?

Financial companies have prioritized customer and product monitoring in response to higher levels of online fraud, difficulty with identity verification and fears of hacked computer systems and networks. Banks are also using the IoT to monitor and collect data about their customers’ financial transactions, while lenders are exploring ways to finance and track assets and value collateral based on sensor data. More advanced IoT implementations include the ability to conduct basic banking using wearables (smart watches or fitness bands) and voice-first devices (Amazon’s Echo), the integration of invisible payments in transportation (Uber) and restaurants (Dine and Dash), and the leveraging of smart home appliances (Amazon Dash, Samsung Family Hub refrigerators). Additional tests are also beginning with the Amazon Go™ grocery and the inclusion of Amazon Echo capabilities in automobiles.


How to Resolve Competing Information Management Strategies

Political objectives can create an undercurrent of issues beneath the surface of recognizable business challenges. They can prove to be the largest detractor to gaining a truly cohesive vision and IM strategy. Like a fault line waiting to erupt, the negative whispers from this undercurrent can cause much damage and must be brought from the hallways to the table to be appropriately addressed by leadership. The best way to address political issues is to have leadership come together and lay the concerns on the table in order to find the high-stakes, high-emotion touch points. Work through the list of concerns to find logical, justifiable solutions. By bringing these issues to light and turning the focus to true business value and return on investment, you will find tensions ease and emotions dissipate. Such an exercise can be eye-opening and significantly improve communications in a highly volatile environment.


Report: AI adoption to create surge in revenue growth by 2020

According to the Infosys report, organisations which have fewer AI-related skills within their business are more likely to re-deploy workers impacted by AI adoption. However, those with more AI-related skills are more likely to re-train their employees. Leading industries which plan to re-train employees include: fast-moving consumer goods, aerospace and automotive, energy, oil and gas and pharmaceutical and life sciences. For instance, IBM’s Watson chatbot has been significantly deployed across banks, while hospitals have been leveraging its AI capabilities to diagnose rare diseases. Sandeep Dadlani, President & Head of Americas, Infosys said: “Artificial Intelligence adoption is on the rise and we are excited to see the investments in AI that businesses are gradually making to derive meaningful and creative change.



Quote for the day:


"What we actually learn, from any given set of circumstances, determines whether we become increasingly powerless or more powerful" -- Blaine Lee


Daily Tech Digest - January 21, 2017

New details emerge about Intel's super-small Euclid computer for robots

Intel announced and demonstrated the Euclid computer in a robot moving on stage during CEO Brian Krzanich's keynote at the Intel Developer Forum in August. The Euclid Developer Kit launch page is up on the website of Mouser Electronics. Intel didn't provide a specific launch date or pricing. Once the Euclid is placed in a robot, it can be operated remotely through a mobile device or PC. The Euclid has Wi-Fi and Bluetooth connectivity to communicate with the PC. The Euclid can also "serve as a full, autonomous brain with sensing capabilities, or as a smart sensor controlled by a more powerful computer," Mouser states on its website. The computer has GPS capabilities for navigation. ... The Atom CPU provides the horsepower to process and analyze the images collected by the 3D camera. The CPU will drive a robot's movement and help it complete tasks.


How banking apps and digital cash solutions are all the rage in India

The National Payments Corporation of India, the nodal agency for all retail payment systems in the country, is working with Visa and MasterCard to develop a common QR code to facilitate cashless transactions in shops. “It is a huge market. There are hundreds of mobile banking apps and hundreds of e-wallets. All of them serve the same purpose using different means,” said Sony Joy, chief executive officer of Chillr. “If there is any direct competitor of ours, it is cash.” Not surprisingly, at this juncture, uninitiated consumers are lost. Credit and debit cards have been the most used cashless payment systems in India for over a decade. Internet banking solutions such as NEFT (national electronic funds transfer) and RTGS (real time gross settlement) for corporate customers are in place. There are offline payment methods, eliminating internet security and malware threats.


How Android One could complete Google's grand Android plan

From the get-go, the whole point of Android One was to make inexpensive Android phones that didn't suck -- phones that were affordable but still decent to use, without all the asterisks that often accompany budget-level devices. Part of that means Google maintains tight control over the software and also guarantees the devices will get reliable and timely ongoing updates -- both security patches and full-fledged OS releases. Thus far, Android One has been limited to a small number of so-called "emerging markets" -- places like Pakistan and India, where it can be "hard for people" to "get their hands on a high-quality smartphone," as Google explains it. Bringing the program to America, though, would give it a whole new meaning. In short, it'd help Google move closer to its goal of "fixing" Android -- a goal that started in earnest with the Pixel but remains only half-complete.


How -And Why-You Should Use A VPN Any Time You Hop On The Internet

The good news is VPNs aren’t expensive. You can usually pay as little as $5 a month (billed annually or in blocks of several months) for VPN coverage. We won’t get into specific VPN service recommendations in this article; instead, here are some issues to consider when shopping around for a VPN provider. First, what kind of logging does your VPN provider do? In other words, what information do they keep about your VPN sessions and how long is it kept? Are they recording the IP addresses you use, the websites you visit, the amount of bandwidth used, or any other key details? All VPNs have to do some kind of logging, but there are VPNs that collect as little data as possible and others that aren’t so minimalist. On top of that, some services discard their logs in a matter of hours or days while other companies hold onto them for months at a time.


China Unveils Memory Plans

Although China’s domestic IC sector is moving at a fast pace, the Chinese government has been grappling with the same problem for years. It is behind in semiconductor technology. This is a complex subject, but one of the causes is export controls. Multinational companies sell products into China, but they must follow various export control policies. Originally hatched during the Cold War period in the 1950s, export controls were established to limit technologies that could have potential military use. As part of those controls, multinational fab equipment makers for years were prevented from shipping advanced tools into China (and other nations) that were capable of processing chips at 0.25 microns and below. On top of that, China also lacked IC know-how, so it fell behind in semiconductor technology.


Google Sets Out to Disrupt Curating With “Machine Learning”

A few other Experiments involve organizing the Google trove of art images into 3-D landscapes. “t-SNE Map,” for instance, gives you a view of a landscape of rolling hills, composed of points. Zoom in on the terrain, and you discover that the points are actually images of artworks. The topography is formed by how the computer has decided to sort and cluster artworks in relation to one another, based on its understanding of aesthetic similarities. “The algorithms only ‘looked’ at the artworks,” the description explains. “No meta data was used, the visual similarity was calculated with a computer image algorithm used in Google Search purely based on the images.”


Why Cyber-Security Strategies Are Falling Short

While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they're still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY's 19th annual Global Information Security Survey, "Path to Cyber-Resilience: Sense, Resist, React." EY surveyed 1,735 IT and IT security executives from organizations around the world to uncover the most compelling cyber-security issues facing business today, and what it discovered was a marketplace still struggling to keep up with a fast-evolving threat landscape. "Organizations have come a long way in preparing for a cyber-breach, but as fast as they improve, cyber-attackers come up with new tricks. Organizations therefore need to sharpen their senses and upgrade their resistance to attacks," said Paul van Kessel, EY's global advisory cyber-security leader.


Automated Traders Take Over Bitcoin as Easy Money Beckons

The nation’s central bank conducted on-site inspections at some of the biggest bitcoin exchanges this month, looking for evidence of violations including market manipulation and money laundering. Similar scrutiny of stock-index futures in 2015 led to trading restrictions that cut volumes by 99 percent. ... Rather than moving money out of the country, most automated traders in China are focused on cross-exchange arbitrage, said Arthur Hayes, a former market maker at Citigroup Inc. who now runs BitMEX, a bitcoin derivatives venue in Hong Kong. They can transact multiple times per second, reacting to price changes caused by individual investors and other speculators who often use technical patterns to guide their buying and selling decisions, Hayes said.


Half of work activities could be automated by 2055

Advances in natural language processing and machine learning produce a Cambrian crush of light AI technologies emerged in 2016. Chatbots have extended from messaging platforms to corporate IT departments while ecosystems are springing up around virtual assistants such as Amazon.com's Alexa. Roboadvisers, in which software assists with delivering financial advice, are increasingly becoming a standard offering in financial services. As a result, Chui says that it is tough to estimate AI’s potential as machines learn to process natural language more effectively. "It will unlock a lot of potential," Chui says. But most corporate IT departments are just beginning to figure out how to incorporate AI to better serve customers, according to Forrester Research. Despite strong interest in investing in AI technologies, many enterprises don’t understand how to apply AI to meet specific business objectives.


Do you have a cyber A-team?

Retained executive search firms are busy matching executive cyber A-players to support their forward-thinking clients. The largest companies and biggest brands can offer the seven-figure comp packages to the very best talent.... Smaller private companies find it difficult to compete for top talent in this elite pool. What these companies can’t offer in cash comp, they can make up in pre-IPO equity. ... Rapid technological advances are changing the game and your company’s crown jewels are too often accessible to the bad guys. Cybersecurity has fast become a top priority management challenge and finding best-in-class leaders to be part of your A-team to assess, manage and mitigate threats must be a key element of your company strategy. Previously siloed risk-management functions today must be reinvented, strengthened, and funded more aggressively.



Quote for the day:


"Life passes most people by while they're making grand plans for it." -- George Jung, Blow