Daily Tech Digest - March 07, 2017

From backup to data management

There are some industries like financial services and healthcare that are very global in nature. They have similar challenges such as being heavily regulated and the need to manage large-scale data. But I do see differences in the maturity scale. ...It’s important because as you’re creating data, you need to have good understanding of that data to manage it. In the US and other more developed economies, there are already massive amounts of data collected, but classifying all that data takes a large amount of effort, which means it’s never going to get done. Also, organisations in countries that are spearheading digitisation efforts will also have to take into account data protection laws not only at home, but also in countries where they operate. Organisations are custodians of customer and employee data that has to be managed from both compliance and cost standpoints.


Function as a service, or serverless computing: Cloud's next big act?

When using serverless computing, coders upload code snippets packaged as a function that carries out a specific task. The code only runs when triggered by an event. But while the coder is responsible for the code itself, the service provider manages the compute stack that runs it; the provider automatically provisions the compute and storage resources needed for that function. Users (generally enterprise IT departments) then are billed on a pay-per-use basis, determined by the number of requests served and the compute time needed to run the code, metered in increments of 100 milliseconds. On the other hand, if the code is never triggered, the user is never billed. Serverless computing differs from other cloud services, such as infrastructure as a service and platform as a service, in that under those cloud versions, users must spin up virtual machines for their applications and also deploy codebase as an entire application.


‘Artificial Intelligence’ Has Become Meaningless

Griping about AI’s deflated aspirations might seem unimportant. If sensor-driven, data-backed machine learning systems are poised to grow, perhaps people would do well to track the evolution of those technologies. But previous experience suggests that computation’s ascendency demands scrutiny. I’ve previously argued that the word “algorithm” has become a cultural fetish, the secular, technical equivalent of invoking God. To use the term indiscriminately exalts ordinary—and flawed—software services as false idols. AI is no different. As the bot author Allison Parrish puts it, “whenever someone says ‘AI’ what they're really talking about is ‘a computer program someone wrote.’”


SMBs Are Never Too Small To Be At Risk Of Cyber Security Attacks

Businesses today run on IT. This makes cyber security a business necessity as well as a technology requirement. A strong security program can not only protect a business’s assets, it can also give it a competitive advantage. Although SMBs face the same cyber security challenges as large businesses, they often have fewer resources and little in-house expertise to address these challenges. This makes it important that they get the best return on their security investments by prioritising the right things in their security programs. Cloud computing and hosted services can make advanced technology affordable, and SMBs often find it cost-effective to outsource many IT functions, including security. But at the end of the day, each business is still responsible for its own security. Owners and executives need to understand the basics of cyber security, know what their service providers are doing and what questions to ask of them.


Consumers Are Wary Of Smart Homes That Know Too Much

If several products can be orchestrated together, they can build up complex sets of actions like dimming the lights, drawing the blinds, and pausing the dishwasher when the TV comes on -- at least in theory. But for all this to succeed in the long term, consumers will have to want smart homes and be willing to pay for them, probably through subscriptions, Gartner analyst Amanda Sabia said. Some of the results revealed Monday aren’t promising. Three-quarters of respondents said they’d just as soon set their lights and thermostats by hand as have IoT do it, while only a quarter were attracted to the idea of devices anticipating their needs and making changes automatically, Gartner said. The results were similar for doing things manually versus through voice commands to IoT devices.


How to become a master cyber-sleuth

First, Bandos said, determine threat vectors and points of access. Gather data about your system, potential vulnerabilities, and previous hacks. "The first weapon any cyber threat hunter needs is data. A centralized Security Information & Event Management (SIEM) system is preferred, but simple access to proxy logs and antivirus logs is also highly beneficial. If there are hundreds or even billions of events, the hunting process whittles away the noise like a digital wood carver chipping away to reveal his masterpiece." The data aggregation and culling process should reveal a short list of suspicious activities. Proxy logs are a great place to start hunting, he said, because warning signs like slow connections and automated behavior are easy to spot.


Data Preprocessing vs. Data Wrangling in Machine Learning Projects

A key task when you want to build an appropriate analytic model using machine learning or deep learning techniques, is the integration and preparation of data sets from various sources like files, databases, big data storage, sensors or social networks. This step can take up to 80 percent of the whole analytics project. This article compares different alternative techniques to prepare data, including extract-transform-load (ETL) batch processing, streaming ingestion and data wrangling. Various options and their trade-offs are discussed using different advanced analytics technologies and open source frameworks such as R, Apache Spark, KNIME or RapidMiner. The article also discusses how this is related to visual analytics, and best practices for how different user roles such as the Data Scientist or Business Analyst should work together to build analytic models.


CIO interview: Sarah Wilkinson, Home Office

Prioritising what to focus on is hard in any organisation, but Wilkinson says “everybody understands that one of the really critical success factors for us now in this post-Brexit world is to be far more brutal about what we actually need to get done versus what we would like to get done in a slightly simpler world”. While the exact implications Brexit will have on the Home Office’s IT projects aren’t yet set in stone due to ongoing negotiations in government, the department is trying to “hone in on the stuff that really matters”. “But we need to get that really clear to focus on it, because it’s important we ensure the critical matters are delivered. We’re going to have to let go of, or postpone, some of the stuff we wanted to do in a pre-Brexit world,” she says.


Ransomware: An executive guide to one of the biggest menaces on the web

While some ransomware developers -- like those behind Locky or Cryptowall -- closely guard their product, keeping it solely for their own use, others happily distribute ransomware to any wannabe hacker keen to cash in on cyber extortion. One of the most common forms of ransomware distributed in this way is Cerber, which has been known to infect hundreds of thousands of users in just a single month. The original creators of Cerber are selling it on the dark web, allowing other criminals to use the code in return for receiving 40 percent of each ransom paid. In exchange for giving up some of the profits, wannabe cyber fraudsters are provided with everything they need in order to successfully make money through extortion of victims.


Ransomware Picks Off Border Targets With Greater Security

The business should ensure that its business continuity/disaster recovery plan and backup and recovery tools are entirely separate from the data and systems that could fall under attack by ransomware. “There are many automated on-site and cloud-based backup solutions that will leave you with options even if ransomware hits network drives,” says Moffitt. There are measures to address ransomware that starts with phishing emails that contain macros, which prerecord commands that will run automatically, in this case unleashing malware and, ultimately, ransomware attacks. You can disable macro functionality in the trust center in Microsoft Office.



Quote for the day:


"When a man assumes a public trust he should consider himself a public property." -- Thomas Jefferson


Daily Tech Digest - March 06, 2017

Cobalt's robot is like a superhuman security guard

As far as design is concerned, the robot is nothing like the RoboCop we envisioned when we first heard about robotic security guards. Instead, it is a large cloth-covered gadget that is meant to blend in with minimalistic office décor. The Cobalt robot was designed by Yves Béhar, the industrial designer whose body of work includes iconic designs for Jawbone, Herman Miller, and Puma, to name just a few. According to Béhar, "The Cobalt robot's semi-cylindrical self-driving mechanism, sensors and cameras are covered by a tensile fabric skirt. This helps maximize the access and usability of the internal technologies, creates airflow to prevent overheating, and conveys a soft and friendly persona." The sensors include 360 degree day-night cameras, thermal cameras, point cloud cameras, laser scanners, a directional microphone array, long-range RFID, a badge reader, and environmental sensors including carbon monoxide and smoke detectors.


Mozilla Partnership Provides No-Cost Firefox Mobile Device Testing

Desktop testing is also being offered free for one month, reflecting the growing emphasis on the mobile Web, which recently surpassed desktop browsing for the first time, according to StatCounter. Under the program, developers can also accrue up to 30 minutes of testing across all browser/OS/device combinations available in the BrowserStack device cloud, a Mozilla spokesperson told ADTmag. Mozilla said the free testing will simplify the complicated device testing process, which adds even more complexity to mobile Web development where it's notoriously difficult to even create equivalent cross-browser functionality. Running Web sites on the multitude of mobile devices introduces many more variables, such as different screen sizes, display densities and more.


FinTech unleashed: Has FinTech outlived its usefulness?

The term FinTech may have outlived its usefulness, or at least be weakened by overuse since the industry is using the term to describe not only new start-up firms but also the entire concept of financial services innovation. In addition, the connection between ‘FinTech’ and ‘disruption’ is often misused since most new services are more of an evolution of what has been done in the past as opposed to a revolution in banking. Both terms are great descriptors but using them together is often done in error. ... Good FinTech start-ups should be disruptive if they want to succeed because why else would someone become a customer if the start-ups don’t offer something better than what’s out there? So, to answer your question, great FinTech companies never stop trying to be disruptive and providing value to customers.


Making sense of machine learning

Deep learning is the hottest area of machine learning. In most cases, deep learning refers to many layers of neural networks working together. Deep learning has benefited from abundant GPU processing services in the cloud, which greatly enhance performance (and of course eliminate the chore of setting up GPU clusters on prem). All the major clouds — AWS, Microsoft Azure, and Google Cloud Platform — now offer deep learning frameworks, although Google’s TensorFlow is considered the most advanced. If you want a full explanation from someone who actually understands this stuff, read Martin Heller’s “What deep learning really means.” Also check out his comparative review of the six most popular machine/deep learning frameworks.


Driving Innovation in Your Cloud Adoption Program

Within the cloud, lean & agile methodologies fully realize their potential. The central tenet of lean philosophy is to maximize value, while minimizing waste. The agile approach seeks to shift from large scale releases to smaller work increments, including frequent releases and iterations, prototyping and increased collaborations with stakeholders and users. A primary benefit of agile methodology is to reduce risk and increase success rate. Cloud PaaS development platforms, containerization, microservices and the increased adoption of cloud serverless computing fully complement an agile approach. Any organization that is serious about innovation as part of a cloud adoption strategy, will need to require its people to adopt an agile approach to software development.


Lessons learned from data center outages, but still a long trip ahead

Change control and tests are the keys to keep any environment healthy, Mansfield said. Robust change control is needed to recognize and review changes, and there should be a plan to back out of them. When IT pros get ready to make a change, they need to rigorously test in an environment representative of the one to be changed. Users are most often the cause of a mistake, and automation helps avoid this, he said. Despite the progress that airlines are making in the eyes of some experts, a six- to eight-hour outage is substantial, and airlines must address the severity and duration of data center outages, said Ahmed Abdelghany, a professor of airline operations at Embry-Riddle Aeronautical University in Daytona Beach, Fla., and a former analyst in United's information services division.


Does Your Association Need Cyber-Liability Insurance?

“Depending on your organization’s exposure to cyber liability, you may feel the cost of purchasing a cyber-liability policy is not cost-effective for your organization,” said Pam Townley, VP of cyber at AXIS Capital, during a recent ASAE webinar “Ask the Insurance Nerds: Cyber Security.” So, how do you go about determining your exposure to a cyber breach, figuring out if you need a cyber insurance policy, and determining which kind of cyber coverage is required? ... Organizations tend to not realize that the cost of responding to a cyber data breach can be very expensive, Townley said on the webinar. As of November 2016, Townley said that the average estimated cost per compromised record was $214. (Warning: Multiplying that cost by the number of member records your association has could keep you up at night).


7 Tips For Managing An IT Outsourcing Contract

Those professionals managing the engagement often don’t understand how their conduct or communication can impact their company’s legal rights, which can cause a number of problems should disputes arise. “The result is that the benefits for which you negotiated hard and are paying great amounts may be lost,” says Peterson. What’s more, disputes may be more difficult to resolve, and those that aren’t becoming costly to litigate, requiring interviewing dozens of witnesses and sorting through thousands of emails to figure out what has happened and who is responsible. The real value of IT outsourcing is achieved through active governance—not only of the projects in play, but of the communication and interaction between customer and provider. “Protecting the value of the contract after the ink is dry is about motivating suppliers to deliver on their promises,” says Peterson, “and preserving remedies for failure.”


Big data disruption gets real for car insurers

The insurance industry has long feared the entry of companies such as Google, Amazon.com Inc. or Facebook Inc. which have a closer relationship to customers -- and above all better data on them. The potential disruption to the market is adding to pressure on providers already seeing their investments hurt by record-low interest rates. Insurers are reacting to the challenge. Allianz SE Chief Executive Officer Oliver Baete has pledged to make Europe’s biggest insurer “digital by default” to help boost productivity and retain clients. Thomas Buberl, CEO of Axa SA, told investors last year that “customers are now used to buying things at Amazon to interact with Google and Facebook, they are demanding the same from us and, as you can imagine, buying an insurance policy at Axa is not yet quite the same as buying a book at Amazon.”


Cyber security readiness study finds widespread shortcomings

Overall, 40 per cent of firms say they have taken out cyber insurance, a higher figure than generally quoted elsewhere. The figure is highest in the US, at 55 per cent, while nearly two-thirds of the ‘expert’ companies say they are insured for cyber risks. These higher than expected take-up figures may also reflect confusion over what exactly constitutes cyber insurance cover with some companies believing they are protected under their existing insurance coverage. Steve Langan, chief executive, Hiscox Insurance, comments, ‘With fewer than a third of businesses qualified as ‘expert’, our study reveals a worrying absence of cyber security readiness among business consumers. ‘By surveying those directly involved in the business battle against cyber crime, this study provides new perspective on the challenges they face and the steps they are taking to protect themselves.



Quote for the day:


"Any sufficiently advanced technology is indistinguishable from magic." -- Arthur C. Clarke


Daily Tech Digest - March 05, 2017

CTO: Our quest for agility led us to the OpenStack framework

Once we were confident that we were not about to make a tragic mistake, we plunged in and started the sometimes challenging process of redoing what we had in order to fit our lives into the OpenStack framework. We started with one of the available implementations of OpenStack/Cloud Foundry. (As with Linux, you can go entirely open source or you can choose a supported version from a number of providers). But, as our knowledge and experience of the OpenStack framework grew, we identified some gaps that created issues around segregation of duties (which is critical for SOX, SOC 2 and other compliance standards). We began modifying our way into our own version, which includes some technologies we created to better handle application-level security and data access controls.


Metadata Management and Data Governance: The Essentials of Enterprise Architecture

Bremeau illustrated what a successfully integrated – but simplified – big picture model would look like, using a classic Enterprise Architecture for Data Warehousing. “If there is one thing to learn and master in any Metadata Management and Data Governance solution, it’s known as ‘the big picture.’” “There are a couple of data stores on one side, could be files, and then I have some ETL tools that are bringing everything into the Data Warehouse,” with the BI tools on the other side. “Now this is very simplified because most of the customers that we deal with do a lot of staging areas, before. And they’re not using one ETL but three or four different types of ETLs, and some hand-written SQL scripts, and you have to deal with all that. That’s the reality, if you truly want to know the lineage of what’s going on in the enterprise.”


The worst enterprise architecture anti-pattern of them all

What many have tried is give more power to the IT department, or have stricter controls, more principles and guidelines, reviews, gates, and so forth. All are ways in which the agility of the enterprise suffers, with nothing much to show for it. Because in the end: the immediate business goals almost always outweigh the long term architecture goals. So, these ways never last. What we need is more agility in architecture (especially now that agile change methods have become popular), not less. My answer is that boards of enterprises should not give these IT architecture goals to the IT department, they must explicitly give them to the business units instead. And they must have the strength of conviction to actually hold those business units accountable for the IT goals, in the same way that they hold those units accountable to compliance with external demands, from owner/shareholder to regulator.


Your Data Is Your Strategic Firewall Against Competition

Per VoC research conducted by our firm, today’s personalization is broken. It relies on implicit data, i.e., web browsing behavior, data mined from social media, data modeling, and purchase-based behaviors. These are not providing the necessary depth of information to drive relevant communications and offers. As a result, most attempts at personalization simply do not drive the expected increases in response. Marketers must now make a profound shift and move to human data, which is based on explicit, self-profiled, opt-in preference data. Human data personalization is unique in that it lends itself to segmentation based on self-described personality types, attitudes, and life stages. Human data-based personalization is consistently driving double-digit response rates.


Executive Guide to Artificial Intelligence

Most crucial part of an AI system that brings machines slightly closer to humans is continuous learning. How does a recommendation engine in eCommerce sites works? It uses humongous historical data on browsing and purchase behavior of website visitors, learns patterns in the data for product preferences and makes relevant product recommendations. This learning is not one time, but happens continuously whenever chunk of new data is available. In fact learning is a key component that differentiates current generation of AI systems from earlier generations. This advancement is made possible mainly because of prevalence of machine learning algorithms. For example, recently Google announced that its language translation tool is dramatically improved because of using a versatile machine learning technique called Deep Learning.


FinTech and Blockchain: Financial Services In Transition

From a macroeconomic perspective, there is a significant pressure on banks, especially European banks, because there is limited growth opportunities. If you cannot go because interest rates are low, and the transaction volume is also because in the market of uncertainty, is low. So, there’s a revenue pressure, the pressure even on the cost side is going up significantly. Cost side meaning your cost-income ratio is under pressure compared to US banks. US banks are at 55% of your cost vs. revenue, most European banks are at over 70%. So there is a significant pressure on those banks to be very careful to reduce your operating expenses, which has also an impact on potential investments going forward. So it is constrained and stressed environment, and the new technology is even triggering, from my perspective, even bigger, significant change.


Pain in the bot? Artificial intelligence in banking

Interactions via natural language processing must be quick and simple - in a word, functional. From a bot perspective, one key differentiator is the capacity for banks to allow richer “mini-apps” as part of their messaging experience, in which each message has the potential to become an atomic application. That means functionality must be broken down into manageable chunks supported by services or better said, micro-services, in the integration layers of core systems. Sadly, if you are a banker, these micro-services are unlikely to exist in your organization. ... If we limit the choice of what users can do in a chat, we will need to somehow train the users or offer “menu” choices, much more obvious in a traditional interface, which reduces useability and defeats the purpose of a “conversation” in the first place. Check out this example from BI Intelligence:


IT Service Management In Disruption, Moving Toward Automation

The incoming description of a problem can be analyzed for its underlying patterns. Much time is wasted in IT services as one service desk listener responds to a problem one way and another in a different way.  "Incident management needs better categorization. There's sometimes misinterpretation of what the incident is about and what skill set is needed to resolve it," said Hough. With ServiceNow's existing configuration management database and change management products will be tied into machine learning to get a more accurate incident management process. The information available through them will also make it possible for a machine-learning system to look at pending changes and "assess the risk as changes come through, based on its learnings from what's happened in the past," she said.


Harnessing the value of big data with MDM

At first hand, it appears that MDM and big data are two mutually exclusive systems with a degree of mismatch. Enterprise MDM initiative is all about solving business issues and improving data trustworthiness through the effective and seamless integration of master information with business processes. Its intent is to create a central trusted repository of structured master information accessible by enterprise applications. The big data system deals with large volumes of data coming in unstructured or semi-structured format from heterogeneous sources like social media, field devises, log files and machine generated data. The big data initiative is intended to support specific analytics tasks within a given span of time after that it is taken down. In Figure 1 we see the characteristics of MDM and big data.


How data governance is now a strategic boardroom consideration in a data-driven world

Data is without a doubt a boardroom responsibility in a digital economy. Organizations have to think of their business from a customer and data perspectives if they want to thrive amidst rapid progress of data-enabled technologies and increasingly competitive environments. The recent Microsoft Asia Data Culture Study 2016, which polled 940 business leaders from medium to large-sized companies in 13 markets in Asia, found that 87% of respondents felt a data culture should be driven from top down, and that there should be a formalized role in the leadership team to drive successful adoption of their data strategy. ... A data strategy is needed to define what data is to be used by the organization – and how that will add long term value. As part of an overall data governance framework, this requires an understanding of the value, risk and constraints inherent in all data.



Quote for the day:


"If someone's criticism is completely unfounded on data, then I don't want to hear it. It doesn't hold up to scrutiny." -- Tim Ferriss



Daily Tech Digest - March 04, 2017

A (Short) Guide to Blockchain Consensus Protocols

A consensus algorithm, like bitcoin's proof of work, does two things: it ensures that the next block in a blockchain is the one and only version of the truth, and it keeps powerful adversaries from derailing the system and successfully forking the chain. In proof of work, miners compete to add the next block (a set of transactions) in the chain by racing to solve a extremely difficult cryptographic puzzle. The first to solve the puzzle, wins the lottery. As a reward for his or her efforts, the miner receives 12.5 newly minted bitcoins – and a small transaction fee. Yet, although a masterpiece in its own right, bitcoin's proof of work isn't quite perfect. Common criticisms include that it requires enormous amounts of computational energy, that it does not scale well and that the majority of mining is centralized in areas of the world where electricity is cheap.


How to install the OpenVAS vulnerability scanner on Ubuntu 16.04

The Open Vulnerability Assessment System (OpenVAS) is a set of tools for vulnerability scanning and management. OpenVAS can scan systems for thousands of known vulnerabilities. It's incredibly powerful and should be considered a must have for anyone who serious about their network and system security. I'll walk you through the process of installing this powerhouse security admin tool on Ubuntu 16.04. The process is a bit time consuming, but what you gain in the end is worth every second. OpenVAS is an outstanding way to test machines you own/service/administer for vulnerabilities. Do not use this tool on systems outside of your purview.


The potential of blockchain as a future financial services infrastructure

The value of DLT to industry players is multifaceted. The top value driver noted by the report is operational simplification, whereby DLT reduces or eliminates manual efforts required to perform reconciliation and resolve disputes. The second key driver stems from improved regulatory efficiency, as DLT allows regulators real-time monitoring access to financial activity between regulatory entities across borders. The technology also allows for counterparty risk reduction propositions, reduce the clearing and settlement time, reduce locked-in capital requirements and boost liquidity as well as minimise fraud, by creating a full transparent and a practically immutable transaction history.


Peugeot concept learns from your IoT gear to improve the ride

It's not just pulling in the information, either. The car also gives you access to all of those connected devices from the interior of the Instinct Concept. We're talking about temperature information from your Nest, what you like to watch from your smart TV or details from your virtual assistant on a gadget like Amazon Echo. Speaking of Amazon, a number of other automakers have already enlisted Alexa to power AI inside their vehicles, Peugeot decided instead to go with Samsung's cloud platform to collect all of the info and data science company Sentience analyzes the details for what's relevant to the system. The car has it's own AI that passengers can interact with via spoken cues. The Instinct Concept also features four modes that tailor the ride to you. There are two driving modes -- Drive Boost and Drive Relax -- for performance or more every day driving scenarios.


The Trends, Companies, And Categories The Top VC Firms Are Betting On

So where is smart money going? We crunched the data to identify where smart money VCs are investing in early-stage companies in recent years and how that investment focus has shifted. Using CB Insights’ natural language processing, we identified the most common words used in company descriptions among those companies that received early-stage investment from a smart money VC between 2010-2016. We then looked at which words have trended up and down among this cohort over the years. In addition, we identified the categories and industries that are seeing the most smart money early-stage investment. Through this lens, we can see where top investors see the most potential.


Blockchain and Cloud kissing cousins

Whilst cloud removes old legacy systems, blockchain removes the middleman within such systems. Why then would you want to deploy your shiny new blockchain project on an old restrictive, expensive and possibly less than safe on-premise system? Cloud also opens up the bank to immense scale as we are now seeing with Black Friday, Cyber Monday and Singles Day where on one day $17 billion in sales occurred. Imagine the supply chain finance activities needed to support that single day’s activities. The traditional legacy system was to build more capacity by buying more computers, more software and hiring more IT people. The cloud provides cyber security and pay as you go so you can scale in safety. A second generation of banking is coming. We’re already on the cusp of it, and banks are running out of time before they become completely marginalised.


New technology, same bugs: the rise and fall of the robot revolution

The trouble is that right now it's almost impossible to tell for regular users if a robot has been hacked or not, so it's a good target for APT attacks. So just how 'real world' is the robot hacking threat according to other security industry experts? Mike Pittenger, vice president of security strategy at Black Duck Software, is in no doubt that we will have already seen the consequences. "Drones (unmanned aerial vehicles) are a form of robot," he explains, "and an attractive target for our adversaries. Taking control of a drone would certainly disrupt a military mission, and could possibly turn a military's weapons on itself."  ... Deral Heiland, research lead at Rapid7, agrees that the problem is both real and current. "On the personal level, the boom in IoT technology that we are now seeing has led to robots in various forms becoming part of our daily life," Heiland says.


The Best Machine Learning Tools? Here Are 7 Everyone Should Look At

Artificial Intelligence is the hottest buzzword in computing and business at the moment, and Machine Learning is the cutting edge. If you’re looking to expand your horizons as an IT professional or harness technology to move your business forward, an understanding of how it works will be a huge advantage in the next few years. I’ve written a basic introduction to the terms AI and ML here, and this article is for those who want to look into the subject a little bit more deeply. There are already a large number of well-supported frameworks available which allow anyone to jump in at the deep-end and by process of trial and error, learn how to use machine learning to solve real-world problems. These platforms highlighted below vary in complexity and beginner-friendliness. Some of them are fully fledged “as a service” cloud offerings from big players, while some are extensions of existing toolkits like Spark and Python.


Why YOU Should Lead Digital Transformation

CIOs have always been told to get closer to the business -- but now their very survival may depend upon it. New executive titles such as "Chief Data Officer" are proliferating, and Gartner says there are two different types of CIOs emerging: the "Chief Innovation Officers" who spearhead the technology-led business models of the future -- and the "Chief Infrastructure Officers" who are relegated to looking after the IT plumbing. IDC's research shows that digital business has thus far relied on a culture of experimentation and innovation driven primarily by the business and shadow IT -- and this is set to continue. For example, Gartner says that in 2017 -- for the first time ever -- the average Chief Marketing Officer will spend more on technology than the average CIO. These funds are being used to create "islands of innovation" outside the realm of core IT



Quote for the day:


"Don’t look for your dreams to become true; look to become true to your dreams." -- Michael Bernard Beckwith


Daily Tech Digest - March 03, 2017

Businesses blame rivals for DDoS attacks

Rival firms are considered more likely culprits than cyber criminals, which were cited as suspects by just 38% of DDoS victims on average. Industrial sabotage is considered to be the most likely reason behind a DDoS attack, coming out higher than political conspiracy and personal vendettas against a business. Typically, DDoS attacks target web servers and aim to make websites unavailable to users. Although no data is stolen, the interruption to the service can be costly in terms of lost business damage to reputation. ... “DDoS attacks have been a threat for many years, and are one of the most popular weapons in a cyber criminals’ arsenal,” said Russ Madley, head of B2B at Kaspersky Lab UK. “The problem we face is that DDoS attacks can be set up cheaply and easily, from almost anyone, whether that be a competitor, a dismissed employee, socio-political protesters or just a lone wolf with a grudge.


De-mystifying Digital Transformation

Digital transformation is more than just a technology initiative. It means ensuring our organisations are ready for the challenges and opportunities of digitisation in terms of products and services, but also the organisation that produces them and the business models it operates. It impacts structures, culture, practices, and leadership, which means it is as much about people as it is about technology. Given so many organisations are connected only vertically, at the top, rather than laterally, some initiatives fall back into the old model of top-down change management, which no longer works in a complex world. Instead, as we have written before, organisational improvement and maintenance needs to be an ongoing priority at every level – we need to make change routine.


How Artificial Intelligence Can Benefit E-Commerce Businesses

While “artificial” tends to imply something negative or dehumanized, Artificial Intelligence actually allows sales people to provide a more personalized experience for their customers. How so? AI can analyze vast data sets way more efficiently than a human being. This means that it can rapidly identify clusters and patterns in the information - such as similarities between customers, past purchasing behavior, credit checks and other common threads. Millions of transactions can be analyzed every day to target offers down to a single customer. Key information that may have previously remained in cyberspace can be put to good use. Through actionable sales intelligence, companies have access to rich insights regarding client behavior before, during and after a purchase.


Spooked by spike in cyber extortion, businesses are stockpiling bitcoin for payoffs

U.S. corporations that have long resisted bending to the demands of computer hackers who take their networks hostage are increasingly stockpiling bitcoin, the digital currency, so that they can quickly meet ransom demands rather than lose valuable corporate data. The companies are responding to cybersecurity experts who recently have changed their advice on how to deal with the growing problem of extortionists taking control of the computers. “It’s a moral dilemma. If you pay, you are helping the bad guys,” said Paula Long, chief executive of DataGravity, a Nashua, N.H., company that helps clients secure corporate data. But, she added, “You can’t go to the moral high ground and put your company at risk.”


The latest research into digital banking's future: Four key takeaways

In its whitepaper Juniper states that almost $14bn was invested in the fintech industry in 2015 through venture capitalism, and this hasn’t slowed down in the past 12 months. The Chinese fintech industry in particular is being pumped up with huge amounts of capital. And of course banks themselves have set aside funds for digital transformation and the adoption of the mobile first approach. Amongst the banks highlighted by Juniper is Deutsche Bank, who have already announced that it will invest $750m in digital transformation by 2020. Spanish banking giant BBVA is also on the record pledging $1.2bn of investment into digital innovation, including the acquisition of 29.5% of UK challenger bank Atom for $68m, and UK bank Lloyds has confirmed that it will invest £1bn over the next three years in improving its digital banking capabilities.


5 things to think about for industrial IoT readiness

The number of connected devices is growing exponentially. In fact, current estimates from IDC Research predict IoT spending will reach $1.29 trillion by 2020. Although many of these are consumer devices (such as Fitbits or smartphones), the presence of IoT devices in industrial settings is skyrocketing as well, with manufacturing forecasted to be the industry making the largest investment in IoT. With this increased connectivity, the Industrial Internet of Things (IIoT) offers exciting possibilities for transforming many different industries – from industrial automation and manufacturing, to oil & gas and building security. By utilizing the IIoT, industrial companies can leverage technologies like big data analytics to optimize operations, improve efficiency and generate insights that can increase profitability and competitive advantage.


A digital revolution in health care is speeding up

Rapid medical and diagnostic innovation will disrupt all businesses that rely heavily on physical facilities and staff. A mobile ultrasound scanner made by Philips, called Lumify, means that a far larger number of patients can be seen by their own doctors. As for data-based diagnostics, one potential example of its power to change business models is Guardant Health, a startup that is analysing large quantities of medical data in order to develop a way of diagnosing cancer from blood tests. If the firm can devise an early test for breast cancer, demand for mammograms and the machines that take them would fall, along with the need for expensive drugs and spells in hospital. There is also good news for hospitals, however. Increasingly, machine-learning programs are able to make diagnoses from scans and from test results.


Cyber attack on Barts NHS trust exploited zero-day vulnerability

The incident at Bart, said Rowan, yet again shows that the signature-based approach is very limited and needs replacing with methods capable of detecting the attributes and behaviours of malware, rather than depending entirely on “knowing” the sample from other affected sites. Andy Norton, risk officer for Europe, Middle East and Africa at SentinelOne, said the incident also shows that despite the fact that the existing antivirus system was up to date, malware was still able to execute unhindered. “This is because the volume of new variants of malware far outstrip the ability of the antivirus system to keep up to date,” he said. At the time of the attack, security commentators said it further underlined the importance of cyber security at healthcare organisations and raised renewed fears about NHS legacy IT systems


Security experts talk insider threats

The greatest resource of a company is its people. The role of the Human Resources leader is to help the CEO in managing that great resource, but all line of business executives care for and lead their people. In the case where a person becomes malicious the HR department and line of business executive both have huge responsibilities, but they will need support of IT and security. How this plays out will vary from company to company. Our recommendation for larger firms is to appoint an insider threat manager who can help HR, IT and the line of business executives think through policies to mitigate threats in advance and, if the unthinkable occurs, help lead actions across boundaries to detect, respond and recover.


How To Get Your Infrastructure In Shape To Shake Off Scriptable Attacks

Scriptable attacks simply use scripts. “A script is a series of commands or computer tasks that execute automatically,” says Michael Cook, Team Lead, CERT Division, SEI, Carnegie-Mellon University. Scripts enable attackers to orchestrate many simultaneous attacks where they would otherwise have to perform each one by hand, one at a time. Attackers select their scripts from several scripting languages including Bash, Ruby, Python, PowerShell, Visual Basic, JavaScript, and others. The language of choice can be the one they find most familiar, the one best suited to the necessary steps along the attack path, or the one that is compatible with the system they plan to attack, says Cook. For this reason, attackers will use multiple scripting languages in their attacks. An attacker can also use a wrapper to make a script work in an environment where it is not otherwise compatible, explains Cook.



Quote for the day:


"Experience without theory is blind, but theory without experience is mere intellectual play." -- Immanuel Kant


Daily Tech Digest - March 02, 2017

15 tools to prime your Raspberry Pi for IoT

Both researchers and businesses are essentially looking for “time series” data -- in other words, time-stamped data about the physical world around you. ... The vast majority of IT pros I have spoken with note that the perceived development cost for an IoT solution is the primary reason management has been preventing them from pursuing it. But an IoT project doesn’t have to be costly, thanks in large part to the Raspberry Pi and its developing ecosystem. For example, the latest Interop in Las Vegas included an array of IoT demonstrations that are both low-cost and low-effort, with several leveraging zero-coding IoT systems. Following are 15 IoT solutions centered largely around the Raspberry Pi, many of which we highlighted at Interop and a few that I’ve been exploring for use at the University of Hawaii School of Ocean and Earth Science and Technology.


Use C# on AWS Lambda to build multi-platform apps

C# is multithreaded language that can handle multiple requests per second. Wrapping it with Lambda enables IT teams to build a serverless application that returns consistent performance, even as the demand for the app grows. Developers can start projects using C# on AWS Lambda and integrate them with other Amazon cloud services, such as Amazon Simple Storage Service, AWS CloudFormation, Amazon DynamoDB and Amazon Simple Notification Service, to improve applications. AWS Lambda enables developers to run and scale code without provisioning servers. Other AWS tools and services trigger C# code in Lambda, or can be automatically called from any web or mobile application. Running C# scripts on AWS Lambda enables developers to create new APIs through the Amazon API Gateway for serverless applications.


High-tech bacon making using industrial IoT at SugarCreek

One of the problems they ran into during the project, which Rodden said was the largest the company has ever undertaken, was the IT contractor that they used for the installation of door security and access points. "We had used them for a long time, they'd always done excellent work, but what we hadn't anticipated was that they had never done a project of this size. As we got into the project, they struggled. They brought in people who didn't have the skill level because they just needed bodies, and we ended up with install problems that we had to go back and rework," Rodden said. "A big lesson learned by me was to properly vet your contractors—any contractor—to make sure they have the resources necessary to complete your project," he said. ... "It was more expensive than using a partner, but we wanted to get the design right. We plan to take this to other facilities now which are still operating under traditional infrastructure," he said.


A billion India identities at risk as Modi widens digital reach

Aadhaar is getting more attention: Modi, who scrapped 86 percent of India’s currency in early November to curb the illegal hoarding of cash, has urged citizens to enroll. With a 12-digit number assigned to users, Aadhaar is key to Modi’s plan to move transactions online. He wants to make it compulsory. The government is seeking to link the database, with information on about 88 percent of the population of more than 1.2 billion, including children, to all state services -- from school admissions to passports and the purchase of cooking gas. In effect, it would create more large databases. But in a nation without an overarching privacy law, Indians have few options for redress in the event of identity theft or data leaks.


House panel approves cybersecurity framework bill

The legislation would direct NIST to develop metrics for evaluating federal agencies’ cybersecurity and submit an initial assessment and regular audits to Congress on cybersecurity measures put in place by federal agencies. It would also set up guidance for federal agencies to incorporate the NIST cyber framework and establish working groups in the federal and private sectors to help public and private entities use the framework. “Much as the nature of cyberattacks continue to evolve to reflect the sophistication of the cyber criminals, we in the government must also be willing to evolve to protect Americans and our government,” Abraham, who is vice chair of the subcommittee on research and technology, said in opening remarks Wednesday.


Meeting Security Challenges Through Vigilance, Readiness and Resilience

Smart Cities are being developed as components of the universe of the IoT. The term “Smart City” connotes creating a public/private infrastructure to conduct activities that protect and secure citizens. The concept of Smart Cities integrates transportation, energy, water resources, waste collections, smart-building technologies, and security technologies and services. They are the cities of the future. The functions and services of Smart Cities depend upon the secure networking of embedded sensors. These sensors can also be corrupted and breached like any digitally connected device and require strong cybersecurity software applications, hardware and protocols. The more digitally interconnected we become in our work and personal lives, the more vulnerable we will become.


Australia Introduces Mandatory Data Breach Notification Scheme

In view of the growing threat of data breaches, the Federal Government has already made several aborted attempts to legislate data breach notification provisions in 2013 and 2015. The newly-passed bill reflects the Federal Government’s renewed commitment to impose positive obligations on businesses that suffer serious data breaches to notify the affected individuals and provide remedial steps for those individuals to minimise the adverse impact that might arise from such breaches. The Federal Government will designate the date on which the scheme will come into force. The designated date must be within one year of the date on which the Governor-General gives Royal Assent to the bill, which is expected to happen within the next few weeks. Should the Federal Government fail to designate a date within that one-year period, the Privacy Act will come into force the day after the expirary of that period.


Everything you need to know about the Google Home app

If you have a Chromecast, Chromecast Audio, Google Home, or device with Chromecast support like an Android TV, you’ll need the Google Home app. It's the main hub that serves as a suggestion screen and dashboard for everything you can do with those products. As indicated, it’s a must-have if you have any of the aforementioned hardware. In order to get some of the goodies like “OK Google, play Prince songs” or to launch Netflix, you’ll need to connect your accounts to various services. If you have a Google Home or a Pixel, this app is a good resource to keep up with the expanding list of commands that you can issue to the Assistant. From the slide-out menu screen touch Things to Ask and you can browse many of the different capabilities of your devices. Expect the gap to close over time in what the Assistant on the Pixel compared to Google Home.


Looking to get hyperpersonal with customers? Better get AI

Machine learning models tend to be narrow in scope, which means companies will need a substantial portfolio if they want to provide hyperpersonal customer service. A lot of models means a lot more scale, Gualtieri said. To illustrate his point, he did some back-of-the-envelope math: If a company was interested in predicting 10 characteristics, 10 behaviors and 10 needs for every customer, it may need 30 AI models per customer. And if a company has 25 million customers? "I know what you're thinking," Gualtieri interrupted himself. "OK, one model can apply to a segment of customers. I get it, right?" The numbers may be a little hyperbolic, but the point is if retailers want to provide intimate customer service, they're going to need more compute power -- and not just for scale. Another wrinkle businesses will encounter is the technology to deliver hyperpersonal service quickly.


Developing Quality Software: Differentiating Factors

Effective developers are not infallible, however their deliberate design and implementation decisions ensure “built-in” quality. Thereby reducing the probability of unexpected and undesired quality related outcomes. The effective developer relies on critical analytical and deductive reasoning skills, as oppose to rote or surface comprehension to guide them during the software design, implementation and testing stages. Recognizing the role and contributions made by effective developers, towards the production of quality software, does not diminish the need for light-weight processes nor the contributions of others. There are many articles that describe software development processes importance and the contributions of others along the software value chain. This article will resonate most with those that have had exposure to software development environments wherein roadmap development and/or custom/fix bid implementations are the norm.



Quote for the day:


“Don’t judge each day by the harvest you reap but by the seeds you plant.” -- Robert Louis Stevenson


Daily Tech Digest - March 01, 2017

The ugly truth behind Android's upgrade problem

The underlying problem with Android upgrades isn't anything technical. It's the fact that the companies making and selling Android phones have no real motivation to care about high-quality post-sales support and to make timely, ongoing upgrades a priority. It's a harsh reality to consider, I realize. But stick with me for a minute, and you'll see what I mean. Most phone manufacturers make their money by selling phones -- right? And so not surprisingly, selling phones remains their primary focus. Providing timely updates takes a fair amount of effort and doesn't directly put dollars into the company coffers.  Google, on the other hand, makes its money by encouraging you to spend time using the internet and thus its various web-based services.


Laid-Off IT Workers Worry US Is Losing Tech Jobs To Outsourcing

The laid-off workers say this isn't the case. Before they left their positions, some trained their incoming replacements from HCL, which they suspect are on H-1B visas and will work at the school. “Once you send out the manufacturing jobs, once you send out the service jobs, once you send out the research jobs, what’s left? There’s nothing left,” said Tan, who’s 55 and now looking for a new job.  ... “In two years, I could be at another company, and I could be facing the same thing,” he said. Thirteen of the workers are thinking about suing the school, claiming the way their jobs were eliminated amounted to discrimination. But filing a lawsuit will mean receiving no severance pay. The workers will likely file the lawsuit in 30 to 60 days, a lawyer for them said.


5G Digital Services Platform

Reliance Jio Infocomm Ltd. (“Jio”) is collaborating with Cisco to further expand Jio’s existing multi-terabit capacity, first All-IP converged network. With this network, Jio offers a combination of high-speed data, mobile video, VoLTE, digital commerce, media, cloud, and payment services. It is the first network of its kind globally with the fastest growth to 100 million broadband and VoLTE customers, reaching the milestone within six months of launch. With the Cisco All-IP network, Jio will help deliver the vision of Digital India and transform the delivery of citizen services from transportation, utilities and financial inclusion to entertainment, agriculture, education, and healthcare in the country. Cisco forecasts that mobile data traffic will grow 7-fold from 2016 to 2021. Technology has become the biggest driver of economic development in India.


Optimization among the key benefits of converged infrastructure

Converged infrastructure (CI) and hyper-converged infrastructure (HCI) are seen by many as far superior to the heterogeneous structure of most data centers. In the traditional process, infrastructure requires configuration work whenever something is added or changed, and the management duties never seem to let up. But when a product's subsystems are tested and optimized beforehand, complexity is all but eliminated. Despite some clear benefits of converged infrastructure, adoption is a significant change for an IT organization, and one that deserves careful consideration. Not only is CI a different way of running a data center, it's a costly investment.


Blockchain won’t kill currencies: RBI deputy governor R. Gandhi

According to the deputy governor, virtual currencies pose financial, operational, legal, customer protection and security-related risks. “They are prone to losses arising out of hacking, loss of passwords, compromise of access credentials, malware attacks etc.,” Gandhi said. Moreover, virtual currencies also do not have any feasible customer grievance, customer problem or charge-back mechanism, he added. While speaking about currencies, the central banker pointed out that to be effective, a currency needs to uphold concepts of confidence and anonymity at all times. However, after the initial rounds of usage, these concepts cannot be sustained in virtual currencies.


Cyber Security and Social Engineering: A Big Low Tech Problem

The consequences of computer network penetration through social engineering have been dire for victims, as the recent hack of the Clinton presidential campaign organization illustrates. There, the campaign chair received what appeared to be a genuine email from Google’s “Gmail Team” informing him that a Ukrainian computer had just used his password to try to sign in to his Gmail account. The email went on to say that Google had stopped the attempt, advised the chair to change his password immediately, and provided a “Change Password” link. Believing the email to be authentic, the chair clicked on the link and changed his password. But as the world now knows, the change went to hackers who downloaded the 30,000-plus emails in the account and sent them to WikiLeaks for publication.


In Cybersecurity, Language Is a Source of Misunderstandings

There is a fairly recent concept that warrants particular attention to ensure government, industry, and academia are speaking the same language, ... Active defense is a term that captures a spectrum of proactive cybersecurity measures that fall between traditional passive defense and offense, according to the George Washington University Center for Cyber & Homeland Security. There is a plethora of detail on this concept in a recent GWU report, but at its essence, active defense identifies a list of 11 techniques that private entities can employ to interdict cyber exploitations and attacks in a "gray zone." This zone falls between passive defense, which typically features basic internal security controls, and offensive cyber, which features more proactive activities security organizations can undertake, such as "hacking back."


Cognitive computing targets problem of physician burnout

“We’re excited about the vision and promise of cognitive computing,” says William Morris, MD, the Cleveland Clinic’s associate chief information officer. “We feel like it has a strong potential to address the problem of physician burnout and the challenge of being mired in data and not actually having synthesized knowledge.” IBM’s Watson Health, the first commercially available cognitive computing capability delivered through the cloud to provide actionable insights from large amounts of unstructured data, has been “working very hard on mastering the complexity of the medical lexicon and actually getting it from a bench-top research project into a clinical workflow,” according to Morris. ... At the same time, Morris emphasizes that the “physician will always be the physician” and Watson “is there to augment the clinical thought process, not to replace it.”


Game theory says publicly shaming cyberattackers could backfire

“If there’s no effective way to strike back, it’d be embarrassing to blame the perpetrator,” says Steven Bellovin, a computer scientist at Columbia University in New York. In some cases, it may even benefit an attacker if you name them, because this could bolster their reputation as a cybersecurity threat. “There’s a saying in chess: A threat is always stronger than an actual attack,” says Bellovin. “Once you actually launch the attack, the enemy sees what’s coming and can figure out how to respond. If they know you have capabilities but don’t know what you’re going to do, they have to defend everything.” Edwards and his colleagues use the 2016 Democratic National Committee email leak as an example of how the blame game can play out. Following investigations by intelligence agencies, the US government eventually responded to mounting public pressure and blamed Russia for the hacking.


The ineffectiveness of siloed cyber security thinking

While almost three quarters (73%) of respondents admit they aren’t using threat data very effectively to pinpoint cyber threats. Here lies the importance of threat intelligence. Organisations are too often just collating data. The context and value of it is what’s most important. It must be simple to understand, relevant and actionable, and ultimately help to illuminate risk blind spots and empower organisations to make informed decisions. This can best be achieved with a mix of human-powered intelligence and automation. Alongside this is the importance of sharing this information across the business – ensuring that all employees are abreast of any risks coming in and preventing any intellectual property going out (i.e. not using work credentials for non-work sites, or even physical security concerns).



Quote for the day:


"Programmers are tools for converting caffeine into code." -- Unknown


Daily Tech Digest - February 28, 2017

FinTech unleashed: Why banks and FinTech have a love-hate relationship

Banks, asset managers, wealth advisors and insurance companies once competed only in their silos. While they still do today, they also face competition from non-traditional market players with new skills, funding sources, and approaches. In the prolonged low-interest rate environment, many have been driven to use cost containment as the key to success in a more complex regulatory environment. Others are scrambling for top line growth (both organically and through acquisition) in a search for new revenue opportunities. Getting back to technology, the nature of the FinTech narrative over the past few years has been evolving. As well, the pace of technology change continues to accelerate. Rapidly evolving advances in artificial intelligence across chatbots, robo-advisors, claims, underwriting, IoT and soon blockchain, add another layer of potential to further shake-up the traditional business model.


Ransomware Getting More Targeted, Expensive

“Actors engaging in this targeting strategy are also charging ransoms based on the number of host (or servers) infected,” the FBI warned. “Additionally, recent victims who have been infected with these types of ransomware variants have not been provided the decryption keys for all their files after paying the ransom, and some have been extorted for even more money after payment.” According to the FBI, this recent technique of targeting host servers and systems “could translate into victims paying more to get their decryption keys, a prolonged recovery time, and the possibility that victims will not obtain full decryption of their files.” ... “People behind these scams seem to be setting different rates for different countries,” Abrams said. “Victims in the U.S. generally pay more than people in, say, Spain.


Digitization inches towards the mainstream

Most CIOs joke that their transformations are never truly complete as they embrace emerging technologies, including internet of things, artificial intelligence and blockchain, but some sectors are further along than others. Media and entertainment (62 percent), along with retail (55 percent) and high-tech (54 percent) tend to be ahead in their digitization efforts compared to sectors such as consumer packaged goods (31 percent), automotive (32 percent) and financial services (39 percent). Industries hovering in the digital media include healthcare (51 percent), telecom (44 percent) and professional services (42 percent). McKinsey also found that digitization levels vary by business operations. For example, 49 percent of survey respondents say customer-focused areas such as marketing and distribution are primary focuses of their digital strategies.


Stanford experts urge healthcare professionals to harness power of people’s mindsets

“It should be about designing a formal curriculum for medical school that weaves all of this throughout the training,” Leibowitz said. “So it’s not just mentioned in one or two classes or taught for one semester and then forgotten about.” The experts also called for a reform of standard randomized trials in the healthcare system. When examining the effects of a new drug, researchers should include natural conditions, which don’t use placebos, alongside conditions that include altered social context and mindset. This, Crum said, will help researchers understand how beliefs, labels and context can help magnify or reduce the effects of the drug and treatment. These reforms, however, would require additional rigorous research that builds more scientific evidence for the importance of the effects of social context and mindsets, they said.


IT orgs enlist startups to address container security concerns

Startups have begun to make a name for themselves with IT organizations, as their products address container security concerns. Network-based attacks and exploits on IT infrastructure aren't new, but container technology, popularized by Docker, demands a new way to address time-honored problems. For example, containers spin up and disappear far faster and more often than VMs, so container security policies must follow an ever-changing infrastructure. Containers also tend to rely on overlay networks, which can be difficult to visualize with traditional network monitoring tools. ... It's not uncommon for startups to pop up around new technologies, according to analysts, but there are pros and cons to trusting a startup's product as part of an IT infrastructure. A big pro for many large IT organizations is that they can play a part in shaping the roadmap of an early-stage vendor, and possibly an entire market space.


Artificial Intelligence: Removing The Human From Fintech

If and when AI becomes more prevalent in the fintech industry, the same will happen. This is the thing with technology, as sometimes it can seem as if the new system has taken again, years or decades in fact, to create, but for customers to adopt and more importantly, trust, the technology, it could take even longer. Alongside this, with films like Ex Machina coming out and showing society what could potentially happen, as Pesenti alluded to, the negativity surrounding AI could result in the service taking even longer to be adopted. On the other hand, the millennial generation seem to welcome and encourage new technology - cellphone apps are a perfect example of how quickly new systems can enter the marketplace, so it could be said that this is the area in which AI could potentially blossom.


Google Shifts On Email Encryption Tool Leaving Its Fate Unclear

The tool is designed to work as an extension to Google's Chrome browser that uses the OpenPGP standard to encrypt emails, ensuring that only the recipient can read them -- and not the email provider or a government. The main goal of Google's project was to make OpenPGP easier to use. It was announced amid growing scrutiny over U.S. surveillance efforts following disclosures from noted leaker Edward Snowden. However, the search giant hasn't made the extension officially available on its Chrome Web Store. Instead, the project's source code has only been made available on GitHub, a software collaboration site, making the extension harder to install, especially for non-technical users.


20 Cybersecurity Startups To Watch In 2017

In spite of a slowdown in the overall funding activity from venture capital firms in 2016, the cybersecurity market continued to raise money at full steam. Last year saw the market break records in terms of funding deals, with Q3 tallying up to be the most active quarter for deals in cybersecurity in the last five years, according to CBInsights. That influx of money is driving innovation in a number of areas. Particularly notable market segments targeted by these firms include security for data centers and public cloud infrastructure, security orchestration and incident response tools, and third-party risk assessment tools. The following 20 firms are primarily early- to middle-stage startups, with a few more mature start-ups that have courted growth equity to change course or expand into a particularly hot new market segment. We believe these firms are worth watching due to several factors.


Are You Over-Confident on Cyber Security Risks?

"Consumers vastly underestimate cybersecurity threats and don't know how to identify, respond or protect themselves from future attacks," said David Blumberg, founder and managing partner of Blumberg Capital. "Naiveté and arrogance are a really dangerous combination. The cybersecurity landscape is complex and ever-evolving. Bad actors are constantly finding new ways to bypass security measures to infiltrate confidential systems and steal information or sabotage infrastructure. Even experts can miscalculate how to mitigate risks and existing security solutions are no longer enough, especially in areas such as IoT or cloud security. At Blumberg Capital, we support companies at the forefront of innovation in cybersecurity. We partner with innovative startups creating new ways to minimize cybersecurity threats and protect personal, business and government information."


A Tale Of Two User Experiences

Although the products and software are of undoubted quality, what’s remarkable is the fit and finish of the process the user goes through. The selection cycle and the actual purchase steps are streamlined, taking into account how busy I am.  Then there’s the initial product experience, which is the box. Apple’s process dictates that I feel it and appreciate it before I open it. Really. But the fact that they want me to go through this tactile experience is an indication of how seriously they take the first impressions of their product, and the implied quality of every part of the product experience. In subsequent steps, they want me to touch the product and use the UI in low-risk interactions that provide the most non-threatening training experience. Even though migrating the old phone’s data and configuration had built-in complexity and potential for blind alleys, it didn’t feel like it.



Quote for the day:


"Encourage the small steps in order to see the big steps achieved." -- Gordon Tredgold