Daily Tech Digest - April 16, 2017

The 4 Types Of Data Science Problems Companies Face

The data science process is extensively covered by resources all over the web and known by everyone. A data scientist connects to data, splits it or merges it, cleans it, builds features, trains a model, deploys it to assess performance, and iterates until they’re happy with it. That’s not the end of the story though. Next, you need to try the model on real data and enter the production environment. These two environments are inherently different because the production environment is continuously running – and potentially impacting existing internal or external systems. Data is constantly coming in, being processed and computed into KPIs, and going through models that are retrained frequently. These systems, more often than not, are written in different languages than the data science environment.


What performance metrics do developers value and when do they feel most productive?

Interestingly, the top two answers, "Communication skills" (4.10 on a five-point scale) and "Track record of getting things done" (4.09), aren't usually explicitly quantifiable criteria. They're also things you can get across before even getting an interview using a strong resume or cover letter, respectively. Of course, hard skills are also very important, as we see knowledge of algorithms, data, and frameworks filling out the next two top spots. Once you've picked the right people, you need to ensure they're collaborating effectively, which is why Stack Overflow also asked about favored development practices:


Optimizing your application architecture at the ‘federated edge’

To craft high-performance IoT apps, developers need a federated environment that distributes algorithmic capabilities for execution at IoT network endpoints, also known as “edge devices.” Federation is essential because many IoT edge devices — such as mobile phones — lack sufficient local resources for storing all data and executing all the algorithms needed to do their jobs effectively. Key among the capabilities being federated to the IoT edges are machine learning, deep learning and other cognitive-computing algorithms. These analytic capabilities enable IoT edge devices ... to make decisions and take actions autonomously based on locally acquired sensor data. In particular, these algorithms drive the video recognition, motion detection, natural-language processing, clickstream processing and other real-time pattern-sensing applications upon which IoT apps depend.


Self-taught artificial intelligence beats doctors at predicting heart attacks

“This is high-quality work,” says Evangelos Kontopantelis, a data scientist at the University of Manchester in the United Kingdom who works with primary care databases. He says that dedicating more computational power or more training data to the problem “could have led to even bigger gains.” Several of the risk factors that the machine-learning algorithms identified as the strongest predictors are not included in the ACC/AHA guidelines, such as severe mental illness and taking oral corticosteroids. Meanwhile, none of the algorithms considered diabetes, which is on the ACC/AHA list, to be among the top 10 predictors. Going forward, Weng hopes to include other lifestyle and genetic factors in computer algorithms to further improve their accuracy.



Chatbots: The Hottest Thing In Tech Right Now

Chatbots are the biggest innovation in customer service ever since businesses created web portals for customers to serve themselves. Email and live chat may have increased the interaction between firms and clients. However, chatbots are available 24 hours a day and will interact with customers in the same way a human would. Since most customer queries do not require human intervention, chatbots save you money by automating your customer service. You can now put an end to automated email replies and unavailable live chat services. ... One of the reasons chatbots may herald the end of apps is that they speak the same language as the user. The language used by apps to interact with customers is frankly, not engaging or friendly.


How we learned to talk to computers, and how they learned to answer back

There are many challenges that ASR engines need to address. For example, recognition accuracy is affected by the quality of the microphone used, and by the level of background noise. Refinements in signal processing and acoustic modelling help to create more noise-robust speech recognition, which is especially important as ASR use cases move from relatively quiet offices and homes to noisier mobile environments. People's accents and speaking styles also vary widely, of course, which is why most ASR systems benefit from the creation of user profiles from supplied training texts, so the decoder can fine-tune its "speaker-independent" acoustic model. People may also use words that are not in the language model or the lexicon, so the software also needs to be able to add "out of vocabulary" words and record their pronunciation.


A Beginner's Guide to Information Architecture

In short - we don’t have much patience when it comes to bad user experience. As a result, near perfection has become a must to survive in the competitive tech environment. The job of an information architect is to maintain a competitive advantage by making sure things are where they should be, and believe me, it’s not always easy. As you’ll soon discover, there is a lot to think about. So what do we really mean by IA? I’ll begin by explaining, in layman’s terms, what it means. If you scroll down, you’ll find 8 easy principles that highlight some crucial things to think about when designing the IA of a website. Further down, I explain the many ways that good IA will benefit both the user and your bottom line, and finally I share some handy processes to get you started, plus a list useful tools to use when designing the IA of a site.


Automation and Lean: Scaling up the Lean Value Chain

In today’s world of disruptive technology innovation, needless to say that Lean Principles apply to any field of IT, and as we will see now, Lean Principles also apply to more than just manual processes in IT environment. About Ericsson: Ericsson is a global leader in delivering ICT solutions, carrying over 40% of the world's mobile traffic through its networks. It has customers in over 180 countries and comprehensive industry solutions ranging from Cloud services and Mobile Broadband to Network Design and Optimization. In our service delivery unit IT & Cloud (SDU IT&C), we commenced the Lean Journey with small steps around five years ago. We selected a few important KPIs aligned with the organization’s strategy and initiated lean transformation programs on those areas which helped us by delivering consistently on the following parameters


Learning to Love Intelligent Machines

There is no going back, only forward. We don’t get to pick and choose when technological progress stops or where. People whose jobs are on the chopping block of automation are afraid that the current wave of tech will impoverish them, but they also depend on the next wave of technology to generate the economic growth that is the only way to create sustainable new jobs. I understand that it is far easier to tell millions of newly redundant workers to “retrain for the information age” or to “join the entrepreneurial economy” than to be one of them or to actually do it. And who can say how quickly all that new training will also become worthless? What professions today can be called “computer proof”?  ... Compare what a child can do with an iPad in a few minutes to the knowledge and time it took to do basic tasks with a PC just a decade ago. These advances in digital tools mean that less training and retraining are required for those whose jobs are taken by robots.


Moving towards a ‘Zero-Friction’ PaaS

In a nutshell, a serverless platform needs the application developers to think and write business logic in the form of functions which are invoked when an event is dispatched to the system. Event streams are central to Serverless Architectures especially in AWS’s Lambda implementation. Any interaction with the platform such as an user’s request or mutation of state such as updating an object in the data store generates events, which is streamed into a user defined function for processing the event and accomplishes any domain specific concerns. ... Companies like Netflix, Google, and Facebook have invested significantly in this area during the course of building modern platforms for their consumer facing services. Each of these companies have a proven track record for their quality of service despite running on commodity hardware and network.



Quote for the day:

"The question of whether Machines Can Think... is about as relevant as the question of whether Submarines Can Swim." -- Edsger W. Dijkstra


Daily Tech Digest - April 15, 2017

Let's talk about how we talk about blockchain

The characteristics of third generation DLTs are shifting markedly, and the blockchain vernacular is losing some of its mystique. Decentralisation distinguished the first generation blockchain, and some still say it’s essential. But let’s remember that the public blockchains don’t actually produce decentralisation; they are designed with decentralization as a starting point. Nakamoto rejected financial institutions, and the Bitcoin blockchain was designed to handle e-cash with no central authority. Yet nothing in the original design indicated that decentralisation could fit all types of business, nor that the blockchain could decentralise anything other than e-cash.  Immutability is another word that’s becoming a bit stale. In my nearly twenty years experience in cybersecurity prior to blockchain, I don’t recall “immutability” ever being expressed as a requirement.


The Democratization of Machine Learning: What It Means for Tech Innovation

Market-based access to data and algorithms will lower entry barriers and lead to an explosion in new applications of AI. As recently as 2015, only large companies like Google, Amazon and Apple had access to the massive data and computing resources needed to train and launch sophisticated AI algorithms. Small startups and individuals simply didn’t have access and were effectively blocked out of the market. That changes now. The democratization of ML gives individuals and startups a chance to get their ideas off the ground and prove their concepts before raising the funds needed to scale. ... There is an effort underway to standardize and improve access across all layers of the machine learning stack, including specialized chipsets, scalable computing platforms, software frameworks, tools and ML algorithms.


Decoding banks digital customers’ expectations

Most banks’ customer strategies, fueled by customer analytics, will need to change to really take advantage of customers’ new channel preferences, for many different researches show that consumers who have grown up immersed in digital technologies, are two to three times more likely to want more digital interactions than what banks currently support, yet older customers are becoming surprisingly open to adding other channels to their portfolio and are increasingly experimenting with online interactions, using a wider variety of contact channels and apps. As a result, customers from all ages find it easier to compare a bank’s or financial institution’s promise with its delivery and how the overall experience meets their own expectations and, subsequently, make changes if they consider their bank isn’t as digitally ready as they would want it to be.


Search the world's largest cybercrime library

"The repository enables lawmakers to draw upon the database of legislation when drafting laws on cybercrime or electronic evidence," said Loide Lungameni, chief of the UNODC (UN Office on Drugs and Crime) Organized Crime Branch. " ... Established in conjunction with the 2013 Comprehensive Study on Cybercrime, the database is a response to the explosion of global connectivity at "a time of economic and demographic transformations, with rising income disparities, tightened private sector spending, and reduced financial liquidity." "Upwards of 80 percent of cybercrime acts are estimated to originate in some form of organized activity," the study determined, "with cybercrime black markets established on a cycle of malware creation, computer infection, botnet management, harvesting of personal and financial data, data sale, and 'cashing out' of financial information."


Last Words: Computational Linguistics and Deep Learning

Where has Deep Learning helped NLP? The gains so far have not so much been from true Deep Learning as from the use of distributed word representations—through the use of real-valued vector representations of words and concepts. Having a dense, multidimensional representation of similarity between all words is incredibly useful in NLP, but not only in NLP. Indeed, the importance of distributed representations evokes the “Parallel Distributed Processing” mantra of the earlier surge of neural network methods, which had a much more cognitive-science directed focus (Rumelhart and McClelland 1986). It can better explain human-like generalization, but also, from an engineering perspective, the use of small dimensionality and dense vectors for words allows us to model large contexts, leading to greatly improved language models.


AI and robots will take our jobs - but better ones will emerge for us

Innovation is the only sustainable way to make society wealthier and better off. In terms of real GDP, Americans are on average more than eight times wealthier today than they were in 1917 2. In the 16th century, Queen Elizabeth was practically the only person wearing silk stockings. In the 21st century, any American woman can. A similar point holds true for cars, plumbing, electricity, and a variety of other modern wonders that began as luxury goods. When technological unemployment occurs, laid-off workers seek retraining and private sector leaders create transitional infrastructure to reabsorb them into the economy. Innovative technologies create more wealth and better jobs in the end by eliminating unpleasant rote work and increasing overall productivity. In the past 30 years, we have experienced a complicated period of globalisation.


How Digital Transformation Will Affect The Automotive Industry

Today already 40 million people use app-enabled carpooling services, and the usage of ridehailing apps has grown rapidly to over 70 million users. Frost & Sullivan’s mobility research has highlighted the continued trend of the automotive industry investing in dedicated collaborations. “As information services, in particular, become more sophisticated, the potential to integrate and aggregate mobility services is increasing,” explains Shwetha Surender, Program Manager Mobility. This allows users to plan, book and pay for their journeys on the smartphone in real time. To make this effective, partnerships between both private and public transport providers are essential. The revenue potential of such digital mobility services is expected to rise to ~$2 trillion by 2025 globally, explaining the continued interest from the private sector.


Fintech start-ups put banks under pressure

Startups have the advantage of being free of legacy technology systems and tough regulation, both of which limit the digital developments of established financial services firms. As a result, start-up companies can more efficiently create mobile-focused services or products that threaten existing financial companies. For example, a number of mobile-based banks such as Atom, Tandem, Starling and Monzo have emerged in the past year with the aim of offering current accounts that help customers to manage their money and lifestyle. Some fintech start-ups pose a direct threat by capitalising on weaknesses and gaps left by established companies. Nutmeg in the UK, for example, provides low-cost online wealth management, which makes investment expertise accessible to millions of people who cannot afford advice but do not have the confidence to go it alone.


NSA's arsenal of Windows hacking tools have leaked

The dump of Windows exploits -- arguably affecting the most people and organizations and likely to cause the most damage and embarrassment to the intelligence agency -- has been expected since the hacking group first emerged on the scene last year. In case you missed it, hacking tools that were confirmed to belong to the NSA's so-called Equation Group were stolen last year in one of the biggest breaches of classified files since the Edward Snowden revelations. These tools, allowed NSA analysts to break into a range of systems, network equipment, and firewalls, and most recently tools to target the Linux operating system -- many of which were old and outdated. The group attempted to auction off the files but failed, and have been releasing portions of the stolen files in stages.


Are UK IT contractors leaving the sinking Brexit ship?

Ever since the UK shocked the world (and, maybe, itself) by voting to exit the European Union, pundits have prognosticated on what effects this will have on the economy and society. While many think it’s too early to say, UK skills sourcing company Arrows Group broke cover and came out with a notable statement, suggesting that Brexit is already leading to a 10 per cent reduction in skilled tech workers from within the EU relocating to the UK. Conversely, the company says there is an increase in UK digital skills heading elsewhere, notably Switzerland. The Arrows database used for this research only covers about 2,000 contractors but as an early indicator of what is going on its insights might have some value. With that caveat, I followed up with Arrows founder and CEO James Parsons and the following is a lightly edited version of our email exchange.



Quote for the day:


"A computer will do what you tell it to do, but that may be much different from what you had in mind." -- Joseph Weizenbaum


Daily Tech Digest - April 14, 2017

3 Overlooked Attributes of a Great Chief Digital Officer

Confronting the tidal wave known as digitization, some CEOs call for a lifeboat in the form of a Chief Digital Officer (CDO). The CDO helps a company respond quickly and strategically, to the rapidly evolving digital landscape. There are several qualities that every CDO needs. To start, they need an innovative mind and great skill at communication. Those are obvious. “It’s really about [developing] a set of capabilities—around customer engagement, digital marketing, using algorithms to adjust the way the company works—not about a title,” says Martha Heller, President of executive search firm Heller Search Associates. Here are three less-obvious qualities that Heller says make CDOs effective


The Future of Application Development Is Here and it Is Cognitive-First

The DataRPM platform automates predictive modeling, leveraging proprietary Meta Learning capabilities to increase quality, accuracy and timeliness of equipment failure predictions by more than 300 percent. The technology enables customers such as Jaguar, Samsung and Mitsubishi Heavy Industries to predict and prevent asset failures, reduce maintenance costs, optimize inventory and resources, predict quality issues, forecast warranty and insurance claims and manage risks effectively. Imagine, analyzing a massive volume of data, with hundreds of different variables, concurrently, within hours and leveraging that data to drive the business applications of the future? This is what Progress will deliver and we’ll do it in a way that is easy and affordable for businesses of any size.


Analysing distributed architectures in the era of IoT

Design and architecture phases must aim at conceiving a structure able to easily provide data and services to a multitude of unrelated devices. Third generation consumers, like wearable devices, personal and support equipment, sensors and actuators, and more in general any electrical appliance, should be easily pluggable and require the lowest integration and maintenance efforts, without any structural integration. The consequence is simple: we cannot architect our applications as they were isolated islands, self-contained and device/platform dependent. We must provide easy access to the information processed by our software, easing the fruition from devices potentially unknown.


Communicate IT’s Business Benefits More Effectively

Over half of IT leaders see themselves as part of a cost center or service provider, and only 4% are highly satisfied with IT’s communication with the rest of the business. This survey points out the risks and costs of these sorts of order-taker relationships, including loss of credibility and low level of engagement with business partners. Today’s CIOs acknowledge the problem, but many are struggling with how to address it. In fact, the same CEC survey found that 89% of IT leaders report at least one significant barrier to effective communication. How can you show the company the benefits IT is bringing, and help them to process and understand that story? The first step is to accept the inadequacy of working in silence while hoping the company understands the impact you are having.


95% of Organizations Have Employees Seeking to Bypass Security Controls

“Insider breaches are a growing threat to virtually all organizations including mainframe users,” says John Crossno, product manager of Compuware’s security solutions group, which recently released a tool designed to mitigate the threat. The increasing number of incidents where employees fall prey to phishing and other social engineering attacks and hand over authorized user credentials to attackers have made even otherwise secure mainframe environments vulnerable, he says. He points to the massive data breach at the U.S. Office of Personnel Management in 2015 as one example of how attackers are able to gain access to critical mainframe systems by acquiring the valid credentials to do it. In the mainframe environment, “enterprises have traditionally relied on insufficient methods to identify threats including disparate logs and data gathered by security products to piece together user behavior,” he says.


‘Cloud adoption and escalating threats accelerate encryption deployments’

The report revealed enterprises have accelerated adoption of encryption strategies, with 41% of respondents saying their organisation has an encryption strategy applied consistently across the enterprise. Notably, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations. Other critical findings demonstrate organisations continue to show a preference for control over encryption and key management when those activities migrate to the cloud. John Grimm, senior director of security strategy at Thales e-Security, said that “This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection.


Blockchain 101: How This Next Big Service Will Change The Future

Setting up your own Blockchain is not easy. It requires heavy infrastructure and development capabilities that most businesses aren’t savvy enough to manage. Enter BaaS. As more companies discover the power of Blockchain and what it can do for their businesses, there will be even greater demand for making this technology more easily accessible. According to Harvard Business Review, Blockchain is the next great disruptor, even more likely to change the next decade of business than big data or artificial intelligence (AI). Says the writer, just as the internet was the first native digital medium for information, Blockchain is the first native digital medium for value. Some 65 percent of banks are expected to implement a Blockchain solution in the next few years—and that’s just on the finance side. The technology is set to see a massive explosion throughout the business landscape.


Multi Or Hybrid? Dealing With A Complicated Cloud World

“We’re seeing conversations shift towards multiple clouds, not one single technology,” said Simon Crawley-Trice, director of global solutions & services for EMEA at Rackspace. “I think it’s going to be a combination between hybrid and multi-cloud depending on what’s right for the business.” “A lot of service providers tend to lead with the technology, but CIOs want a business conversation around what is the business value of hybrid cloud? They want to know what the business value is of consuming these different cloud technologies.” Cockerton agreed, highlighting that “ultimately the conversation is going to become one of the right workload in the right place at the right price. That’s going to determine the conversation for the next 10 years”.


The AI revolution: Is the future finally now?

Despite the mounting interest and the proliferation of new technologies, is this current wave that much different than what we have seen in the past? Do the techniques of the modern AI movement – machine learning, data mining, deep learning, natural language processing and neural nets – deserve to be captured under the AI moniker, or is it just more of the same? In the earlier peaks of interest, the broad set of activities that were typically bunched together under the term ‘AI’ were reserved for the labs and, if they ever saw the light of day, they were severely constrained by what the technology of the day could deliver and were limited by cost constraints. Many of the algorithms and structures central to AI have been known for some time; rather, previous surges of AI had unrealistic expectations of immediate consumer applications that could never be accomplished given limitations of the data and techniques available at the time.


Augmented reality in financial services

Within a bank, AR has the potential to transform productivity. Data visualisation is a key tool for traders needing to make important data-driven decisions quickly. AR can help traders view, analyse and manipulate large quantities of complex data faster through a more intuitive AR interface. Several companies have trialled Oculus Rift to create immersive 3D virtual reality environments for analysing data. Citibank has taken the next step by using Microsoft’s HoloLens headset to create Holographic Workstations for traders. These headsets use AR to layer complex data sets that enable traders to visualise and make decisions collaboratively with clients. We can expect to see more AR in bank offices in the future.  With the rapid growth in mobile banking apps and introduction of digital-only banks, there are more and more questions about the future role of branches.




Quote for the day:

"We're entering a new world in which data may be more important than software." -- Tim O'Reilly


Daily Tech Digest - April 13, 2017

Managed services - A catalyst for transformation in banking

To view managed services in the right context, it’s often helpful to understand the evolution and growth of outsourcing in financial services companies. Historically, banks have used a variety of outsourcing models to maximize resource efficiency. These models have evolved with changing times. A good example of this progression is business process outsourcing (BPO), which has existed for at least several decades. In 1992, American Express (Amex) spun off its transaction processing unit, where it already had developed scale and experience, and partnered with a third-party card processing unit. Amex anticipated the commoditization of the transaction processing business, so it placed a strategic bet to focus on the growth of the card issuing business.


Bank gets lesson in the security failings of third parties

A story detailing this attack in Dark Reading noted that “customers accessing the bank’s online services were hit with malware posing as a Trusteer banking security plug-in application. The malware harvested login credentials, email contact lists, and email and FTP credentials.” The bank and the DNS provider did apparently make some mistakes — and mistakes are a great way to learn, especially if they are made by someone else. First, the bank had declined to use the DNS provider’s two-factor authentication. Had it done so, the attack might have never worked. Second, the DNS provider, according to Kaspersky Labs, had patched a cross-site request forgery flaw on its site, Dark Reading said. That flaw, coupled with an email phishing attack of the DNS firm, may have provided the initial access prior to the patching.


The 10 best features in Android O (so far)

Google I/O is still more than a month away, but we’ve already gotten a sneak peek at what Google is planning for Android O. To help developers make sure their apps are in tip-top shape for the public release later this year, Google has given them the first preview a little early, opening up a brand new box of tricks and tools. This first release is just for developers, and is focused mostly on feautures that require particular devleoper support—there will be much more in Android O, with more user-facing improvements in later beta releases. While we’re not sure how many of these features will make it out of Developer options and the System UI tuner and into the main release, but there are a bunch of cool tricks we’ve found while exploring the new settings. Here are our 10 favorites.


Data science gets chic

Predictive analytics is one type of analytical method that is getting much attention. This is because senior executives appear to be shifting away from a command-and-control style of management – reacting after the fact to results – to a much more anticipatory style of managing. With predictive analytics executives, managers and employee teams can see the future coming at them, such as the volume and mix of demands to be placed on them. As a result they can adjust their resource capacity levels and types, such as number of employees needed or spending amounts. They can also quickly address small problems before they become big ones. They can transform their mountains of raw data into information to test hypothesis, see trends, and make better decisions.


With Robots On The Job - It Won't Be IT As Usual

The trend means that CIOs and IT managers need to be prepared for an influx of robotics because introducing this technology isn't as simple as firing up a fleet of humanoid robots and letting them loose in an office building. It's going to take planning, new skills and thought about how robots will affect employees and require new infrastructure. ... "It's very much a different mindset than traditional IT," said Mike Gennert, a professor and director of the Robotics Engineering Program at Worcester Polytechnic Institute, in Worcester, Mass. "IT managers worry about how they manage information, how it's used, how it's stored and secured. But none of that has the ability to directly affect the physical world. Robots affect the real world. That brings issues IT managers have not had to confront."


Who Should Regulate Cybersecurity for Connected Cars?

Lauzon along with other researchers remains skeptical that federal regulations are the best way to ensure safety. “To have regulation that chases down cybersecurity is very difficult because the law generally does not keep up with technology very well,” he said. “No automotive company wants to make a car that is hackable.” One option that could gain support would be to follow suit with the federal automated vehicle guidance released in September 2016. The guidance, which was intended to serve as a living document, laid out several best practices, specified what separate jurisdictions are responsible for regulating, and set up a 15-point self-check safety assessment letter. “I like the way NHTSA approaches it now and says, ‘Here are guidelines you should follow,'” said Lauzon. “With security, you don't usually know there is a problem until it's too late.”


Hacked Dallas sirens get extra encryption to fend off future attacks

The city believes the hack came from the Dallas area, but officials haven't detailed how it occurred. Dallas police are working with the FBI and the Federal Communications Commission (FCC) to validate what they think happened and find the source. The hack caused all 156 emergency sirens to activate for about 90 minutes, scaring some residents and doubling the number of calls to 911. Radio security experts theorized the incident may have been a simple "replay attack" where the hacker recorded the radio signal sent out on April 5 at noon as part of a monthly test of the emergency siren system. Then, the hacker could have played that signal back repeatedly early Saturday. It would take a hacker with a software defined radio (SDR) or other off-the-shelf radio frequency test equipment to pull off the attack, said Chris Risley, CEO of Bastille Networks.


Always-On Strategy

Always-on strategy complements the annual process by giving senior leadership a regular forum in which to monitor and discuss issues that warrant continual attention, including those identified during the annual process and during the course of the year. The always-on process is particularly well suited to addressing issues that span multiple business units (such as a common technology platform), lie outside the scope of existing businesses (for example, growth into adjacent markets), or are too far-reaching to address at the business unit level (such as downstream integration). However, companies must apply always-on strategy systematically—to ensure that executives focus on the highest-priority issues, push for issues to be resolved, and effectively coordinate the activities of the annual planning process with those of the always-on forums.


BrickerBot – The Dark Knight of IoT

The use of the ‘Busybox’ command combined with the MTD and MMC special devices means this attack is targeted specifically at Linux/BusyBox-based Internet of Things (IoT) devices. The similar exploit vector as Mirai means the devices must have their Telnet port open and exposed publically on the Internet. Mostly this would match IoT devices that have been proven vulnerable to Mirai. Because the process does not perform malware infection, but has a clear purpose of corrupting and disabling the device, there is no binary to study and there is not much we can say about how the bot finds its targets. Because BrickerBot.2 is hiding itself behind TOR exit nodes, there is no indication on the location of the bots or even how many bots might be out there. We could assume a random public IP scan to detect potential victims much like Mirai bots are performing.


How to Sell Refactoring? The Case of Nordea Bank AB

When you begin to work with an organization in the context of a specific subject, you usually encounter many points of view. From the very beginning, it is extremely important to realize that these are just different narratives of the same reality and none of them is more real than others. Within the same organization, you talk to different people who often present contradictory information, but each of these is consistent and seems to be justified. ... This way, the developers could focus on how to refactor the backend, style the new views and integrate them with their e-banking system. It drastically reduced the threshold for entering the new technology and made it easier to achieve success. At that stage, our priority was to promote the need for refactoring, not to migrate to a new technology.




Quote for the day:



"The meeting of two personalities is like the contact of two chemical substances: if there is any reaction, both are transformed." -- Carl Jung


Daily Tech Digest - April 12, 2017

A.I. in the kitchen: It's not that far from reality

"Hello Egg comes with cooking assistance even for the most advanced chefs, as well as step-by-step voice-navigated recipe video tutorials and real-time prompts from a human support team for those who might need a little more hand-holding in the kitchen," tech expert Lulu Chang explains. "Moreover, the smart device promises to 'keep a lively conversation going by expressing itself through mimicking facial expressions,' and can also keep you entertained and informed by way of Spotify, audio news feeds, weather forecasts and voice-activated timers and reminders." Having Watson author a smart cookbook and getting to interact with a little egg that responds to your commands is cool, but the future of A.I. in the kitchen has much more in store than trendy products and gadgets.


Why You Should (Sometimes) Let Software Run Your Business

A less radical approach is to take an existing software product (which could be run on premises or accessed as a service) and have it customized to match your company's operations and processes — either by the vendor, by a third party or internally. "That can still be expensive and open-ended," Bartoletti warns. "You can spend two years customizing software, and every change you make can cost you millions." He adds that there is also a risk that you will end up out of sync with the base product's update cycle. That's because each time the base software is update it is your responsibility to test the customizations to ensure that they still work as expected with the base software and modify them as necessary. By the time this work has been carried out the base software may have been updated again — perhaps to include some of the functionality that your customizations provide.


How Amazon is bringing the Alexa experience to your phone

Now instead of facing competition from Google and Apple in the home assistant market, Amazon seeks to strike back by integrating Alexa with phones. As CNET reports, Huawei Mate 9 owners “will get it first in an over-the-air update”, and it is available for iPhone users as well. Other Android users will eventually be able to install Alexa over their phones through the Google Play Store. But while Amazon so far has been looked like an unstoppable juggernaut everywhere it goes, working with smartphones is one area that will be a major challenge. While Amazon can seamlessly integrate Alexa with its own technology in the Echo, integrating it with a phone made by a different company presents challenges. Unfortunately, the Alexa app is not the same as having an Echo in your pocket, though it offers plenty of useful features.


That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

New findings published Monday by researchers at New York University and Michigan State University suggest that smartphones can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. In computer simulations, the researchers from the universities were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time. The researchers did not test their approach with real phones, and other security experts said the match rate would be significantly lower in real-life conditions. Still, the findings raise troubling questions about the effectiveness of fingerprint security on smartphones.


The journey of data storage: what’s next?

Reflecting the growing importance of seamless data delivery to businesses as they become ever-more tech dependent, the storage industry has been developing at a significant rate in recent years. Some great new solutions have hit the market, and we are starting to see the beginnings of a shakeup of the industry. For the past twenty years the industry has been dominated by large specialists like EMC and NetApp. However, the emergence of flash storage is providing customers with a simple, cost effective way to manage data, and new companies such as Nimble Storage, Nutanix and Pure Storage are starting to change the way the industry is run. IDC recently found that the flash based storage market grew a massive 71.9 per cent on top of last year, so there is no question that flash storage is dominating the present market and driving greater expectations around performance, and data centre and TCO (total cost of ownership) reduction.


Fintech firms still see a future for fiduciary compliance tools

Financial services marketing consultant Dan Sondhelm, CEO of Sondhelm Partners, said it was smart for the firms to have aggressively promoted DoL-related features before the rule came into effect. "Whether a law is in place to protect investors isn't the issue," Sondhelm says. "The problem is now visible. Advisers have to have to deal with the problem. They have to have an answer and process to show they are looking out for the best interest of their clients. Smarter clients will keep this issue top of mind." There's been no slowdown in demand for the analytics platform being offered by Boston-based FinMason, says its CEO Kendrick Wakeman. "We are not changing our products in light of the delay of the DoL and last week was one of the busiest weeks we have had in our history from the standpoint of sales demand," he says.


When Hacks Are about Image instead of Money

The biggest risks from these hacks is not the exposure of personally identifying information, but the erosion of trust in our organizations and notable figures. This is because cyberespionage and sabotage campaigns don’t just deal with leaked information. Once a hacker gains high-privilege access to a network, he or she can change internal data, public-facing assets and even insert fake data. If you think fake news is a problem, what about the possibility of fake medical or financial information making the rounds with no way to verify its legitimacy? Unfortunately, like most issues in security, there isn’t a straightforward solution to the problem. It’s impossible to predict how extortion can take place, or what data will be used to tarnish the victim’s image.


As cities get smarter, hackers become more dangerous: This could stop them

After the forensic exams were ordered, several of those who filed suit asked the judge to drop their complaints, either because they suspected Anthem would find evidence the data was lost before the breach or because they didn’t want to submit to having their PCs snooped. Or perhaps they just didn’t want the inconvenience of giving up use of their machines for the duration of the search. Regardless, it proved an effective legal strategy for Anthem. If just a few of those who sue walk away, it still means fewer possible payouts. And it points out how difficult it is to prove that personal data used by criminals was stolen in a particular breach. Yes, the victim’s information was exploited, but how it got into the hands of the criminals is not so easily determined.


DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

“Security for electronic systems has been left up to software until now, but the overall confidence in this approach is summed up in the sardonic description of this standard practice as ‘patch and pray,’” said SSITH program manager Linton Salmon of the Agency’s Microsystems Technology Office in a statement. “This race against ever more clever cyber intruders is never going to end if we keep designing our systems around gullible hardware that can be fooled in countless ways by software.” Salmon said SSITH specifically seeks to address the seven classes of hardware vulnerabilities listed in the Common Weakness Enumeration, a crowd-sourced compendium of security issues that is familiar to the information technology security community.


21 Hot Programming Trends & 21 Going Cold

Programmers love to sneer at the world of fashion where trends blow through like breezes. Skirt lengths rise and fall, pigments come and go, ties get fatter, then thinner. But in the world of technology, rigor, science, math, and precision rule over fad. That's not to say programming is a profession devoid of trends. The difference is that programming trends are driven by greater efficiency, increased customization, and ease of use. The new technologies that deliver one or more of these eclipse the previous generation. It's a meritocracy, not a whimsy-ocracy. What follows is a list of what's hot and what's not among today's programmers. Not everyone will agree with what's A-listed, what's D-listed, and what's been left out. That's what makes programming an endlessly fascinating profession: rapid change, passionate debate, sudden comebacks.



Quote for the day:


"Excellent firms don’t believe in excellence – only in constant improvement and constant change." -- @tom_peters


Daily Tech Digest - April 11, 2017

Why a Quiet Blockchain Consortium Could Soon Make Noise

Amidst this backdrop, an upcoming piece of legislation is set to buffet the industry with a sweeping change that will produce upheaval and possibly contraction. I'm talking about MiFid II. It's hard to overstate the impact these regulations will have on asset management. Due to come into force in January 2018, MiFid II aims to increase transparency, enhancing investor protection and removing shady practices in pricing and allocation. Fund managers will be required to pay separately for research, financial advisers will no longer earn a commission and reporting requirements will multiply. And that's just scratching the surface. An independent report estimates the cost of complying with Mifid II to be more than £2.5bn. This is likely to bring about a sector shift, with many smaller firms not being able to bear the cost, and larger enterprises offsetting the increase elsewhere.


Why the board needs security leaders to fuel disciplined growth

As the risk of breaches increases, boards – whose role when they oversee the CEO is to act as fiduciaries on behalf of shareholders– are increasingly at risk of falling short of their responsibilities. While board members are not expected to be experts on information security, they must make sure that the company has the right people and processes in place to erect defenses against information security violations, to establish procedures for monitoring the level of information security, and to make sure that the right steps are taken should a security breach occur. At the same time, CISOs should educate board members about the best information security practices among peer companies as well as introducing board members to important trends in hacking and defense. Such briefings will help directors to evaluate proposals for investment of people and capital into new technologies and processes to protect companies against an ever-evolving information security threat environment.


Blockchain: The Battle To Secure Digital Identities

Recently, IBM and SecureKey also announced they are working together with the main goal of creating a “new digital identity and attribute sharing network” to make it easier for users to verify their data in a privacy-enhanced, secure and efficient way. Deloitte is doing a similar project using the Ethereum blockchain. It is an open source based on a smart identity platform available for users and companies that want to obtain, verify and identity credentials when communicating with one another. This way, customers can create and store identity info such as ID reference, driving license or passport, which can be confirmed by third parties to create verifiable credentials to be used for any digital communication. This Deloitte’s platform provides many opportunities for the automation of identity-related process including customer registration and Know Your Customer (KYC).


Is Digital Privacy A Right Or A Privilege?

The proponents of net neutrality rollbacks argue that tiered rate schedules will fund infrastructure innovation. The supporters of anti-privacy legislation argue that there’s little distinction between media companies (like Facebook) and ISPs, and both should have the right to collect and sell data that reflects the behavior of their customers. These are the business arguments. Are there other arguments we might want to consider? First, everyone should have the right to opt-out of the collection and distribution of personal data without losing privileged services or paying higher rates or extra fees. If a media company or an ISP wants to collect and sell my data it should only do so with my explicit permission – which I might well give (for a price). Why shouldn’t individuals share in these revenue streams? If I spend a ton of money online every year and everyone wants to follow me, stream to me and entice me, why shouldn’t I get a piece of the action?


MapR Announces Availability of Native Tableau Connector for Apache Drill

“Strong demand from our joint customers led to this tighter integration,” said Robert Green, director of product management at Tableau. “Tableau and Apache Drill share a common view on self-service data discovery and this development opens up new avenues for users of both technologies.” Apache Drill is a supported data source for Tableau bringing more robust integration compared to generic ODBC. The MapR Tableau Connector for Apache Drill delivers tighter metadata integration between Tableau and Apache Drill, and brings advanced analytics capabilities that leverage Tableau Sets to Apache Drill users. Additionally, Tableau users on Macs can now access Apache Drill.


No vendor lock-in fear with converged infrastructure

Cisco reached out to all the appropriate experts, who joined in on a call. The problem resided within a software-based Trend Micro firewall. The firewall was deactivated, which resolved the PCoIP problem. Before settling on HyperFlex, Safonov said he shopped around. He got three quotes from hyper-converged vendors and three quotes for more traditional architectures, including all-flash arrays. While his paramount concern was price, Safonov was still worried about managing servers, storage and networking gear from different vendors. "We would still have to troubleshoot across all the vendors," he said. Perry said the reduced concern about vendor lock-in may not last forever. It could change if server software and management tools head down an increasingly proprietary path.


Software developers – business enabler or hostage taker?

The skills attained during a computer science degree will be out of date by graduation, meaning organisations need to look beyond blunt qualification statements. Without undertaking specific skills tests, it is impossible to ascertain whether an individual can truly do the job. In addition, technical skills alone are not the only requirement. These individuals need to work as part of a team – are they team players? Do they buy in to the specific development processes of that organisation? Many developers are perfectionists which sounds great in theory, but is useless in practice – the software will never be good enough, never ready to be deployed. A pragmatic attitude is essential; plus an understanding of the importance of a standardised development process. Determining whether or not an individual has the right mix of skills and expertise to become a good software developer is a very significant challenge


Mobile Analyst: Factoring in Progressive Web Apps a Matter of 'When,' Not 'If'

More recently, Google announced deeper integration of PWA technology into its Android mobile OS. "Once a user adds a progressive Web app to their home screen, Chrome will integrate it into Android in a much deeper way than before," Google said. ...  "PWAs aim to disrupt the mobile app paradigm by bridging the Web experience with native app functionality, by using the latest browser technologies to meld the accessibility of the Web with the presence of the mobile app," Wong said in a recent blog post promoting that research. "Most of the leading desktop and mobile browsers (except for Safari and browsers on iOS at the time of writing) have embraced the browser advancements (service workers) brought forth by Mozilla, Google, Facebook and others to implement service workers that enable a Web site to behave like an app," Wong continued.


Why smart stores don't check out

Amazon's "Just Walk-Out Technology" has one job: to figure out what you're taking out of the store. As you remove items from the shelf, A.I. uses multiple inputs to figure out what you grabbed. Cameras watch you take it. Scales built into the shelves provide data to calculate the weight of what you took. Amazon's patent filing suggests that the system may also refer to past purchases to help identify current ones. In other words, intelligent software analyzes a video feed to determine that you removed something from the shelf that looked like a cupcake. It considers data from the shelf, which is also a scale, and calculates that you took something that weighs about as much as a cupcake. And it checks your purchase history — it knows you're a cupcake-eating maniac. After all that input, the software decides that you took a cupcake off the shelf and adds it to your list, which is kept up-to-date in real time as you shop.


Why we must strengthen cyber risk management now

When it comes to combating financial crime, financial institutions are increasingly in the frontline of defense. Regulators the world over require financial institutions to meet stringent Know Your Customer (KYC), anti-money laundering and sanctions rules and regulations. Complying with such obligations in multiple jurisdictions is demanding – and increasingly costly – but the costs and reputational impact of non-compliance are even higher. SWIFT has a broad finance crime compliance portfolio, developed with the SWIFT community. It’s a suite of managed and shared services that leverages our platform, technology and standards expertise to cut through the complexity and give the industry simpler, more cost-effective ways to meet the challenges of financial crime compliance.



Quote for the day:


"It's the little details that are vital. Little things make big things happen." -- John Wooden


Daily Tech Digest - April 10, 2017

Building a strategic threat intelligence program

In spite of more modern protocols available, Barros views SIEM as more simplistic than UEBA models. SIEM correlation typically generates alerts for each situation, treating potential threats as isolated. Some SIEM products, such as Qradar, are capable of aggregating potential threats based on timing and IP addresses, but Barros said this product is primarily intended for aggregation and reducing the number of alerts rather than correlation. "SIEM correlation is still useful, but we need to recognize its limitations and embrace the new capabilities of new tools such as UEBA to improve that. As we've been talking, SIEM and UEBA are getting closer every day, so now it's just a matter of time before SIEMs move (or give the option) to track issues based on entity scores. But if you want to have that now, you should look at UEBA tools," Barros said.


What one company learned from testing Intel's superfast Optane SSDs

Optane gives tremendous flexibility to how Aerospike deploys its software because it helps speed up critical tasks like database indexing.  The Aerospike database is highly flexible thanks to its hybrid memory architecture, meaning it can be deployed on different types of systems including all-flash arrays, converged infrastructures, or through major cloud services like Amazon AWS.  The software is notably adaptable to a cluster topology via direct-attached storage managers. The database architecture can be broken into spokes and set up for high availability through database replication on interconnected servers. Optane cuts the network round-trip time, and that helps build a faster and more reliable database. Aerospike's database can help can create an environment where Optane can be used like RAM for in-memory processing or SSD for caching or hot storage.


The evolution of data center segmentation

In a nutshell, micro-segmentation offers a more granular method for separating workloads and controlling application in these cloud environments. Individual workloads can be isolated using a zero-trust model with whitelist controls enabled for specific network and application flows between workloads.  Products and features such as firewalls, IPS, VRFs and VLANs have long been used to provide segmentation as a common best practice. While these can shrink the attack surface, the operational aspects can prove to be difficult. Traffic must be hair-pinned to firewalls, and there is a lack of granular controls to filter the east-west traffic inside of a VLAN.  Getting visibility and telemetry can also be an issue, especially for east-west traffic. As a result, assets requiring separation are often placed in different VLANs. This leads to the creation of new firewall rules, IP subnets, routing and default gateways.


Email-Based Attacks Exploit Unpatched Vulnerability In Microsoft Word

When the rogue documents used in this attack are opened, they reach out to an external server and download an HTA (HTML Application) file that contains malicious VBScript code. The HTA file is disguised as an RTF (Rich Text Format) document and is automatically executed. "The successful exploit closes the bait Word document, and pops up a fake one to show the victim," the McAfee researchers said. "In the background, the malware has already been stealthily installed on the victim’s system." By searching back through its data, McAfee has tracked down attacks exploiting this vulnerability to late January. Following McAfee's report, security researchers from FireEye also confirmed that they've been aware of these attacks and exploit for several weeks and have coordinated disclosure with Microsoft.


Three Of The Biggest Cyber Security Threats To Australian Business

"Attackers will research employees' personal information and activity online and leverage these details to convince them to click a link and/or download a document that subsequently infects their device." Bentley believes the best way to combat against personalised, socially engineered attacks is to not just create awareness programs but also to deploy advanced email security solutions. These work by helping to identify and quarantine these emails before they ever reach an employee's inbox. Itay Glick, CEO and co-founder Votiro told HuffPost Australia the three key elements to good protection are training, detection and protection. "Training will only take you so far. When someone in the HR department receives an email from a job applicant with a CV, they will most likely open this file. They are simply doing their job and through doing so, can put an organisation at risk," Glick said.


Flatbed scanners are latest cyberattack vector

The malware compromises the scanner and allows the scanner to receive the light-modulated commands at certain pre-defined times: Every day at 11 o’clock, is one example the researchers use. The attacker, however, remotely controls the light source creating the commands. That allows the actual attack to be run on the fly at a pre-determined day of the perpetrator’s choosing—destroying files just before a moving-target important event, like a presentation, say. Control of the light source could be through a micro-controller, connected to the light source, and running an algorithm creating sequences of bright shades of light that fool the scanner. The attacker does have his work cut-out for him, though. The attack will fail if the flatbed scanner lid is fully closed, and the algorithm isn’t all that easy to figure—light is influenced by distance, and other light sources, for example. The further the distance the harder the attack is.


AI, Machine Learning as a Service Set to Overhaul Healthcare

Coupled with an artificial intelligence sector slated to bring more than $46 billion in revenue to vendors by 2020, MLaaS could fundamentally revolutionize the way healthcare organizations approach big data analytics by making these tools more budget-friendly for a broader range of organizations. “Intelligent applications based on cognitive computing, artificial intelligence, and deep learning are the next wave of technology transforming how consumers and enterprises work, learn, and play,” says David Schubmehl, research director, cognitive systems and content analytics at IDC, which compiled the AI report. “These applications are being developed and implemented on cognitive/AI software platforms that offer the tools and capabilities to provide predictions, recommendations, and intelligent assistance through the use of cognitive systems, machine learning, and artificial intelligence. ...”


Machine Learning At American Express: Benefits & Requirements

In the case of fraud detection and prevention, machine learning has been helpful to improve American Express’s already excellent track record, including their online business interactions. To do this, modeling methods make use of a variety of data sources including card membership information, spending details, and merchant information. The goal is to stop fraudulent transactions before substantial loss is incurred while allowing normal business transactions to proceed in a timely manner. A customer has swiped their card to make a purchase, for instance, and expects to get approval immediately. ... Chao mentioned that one of his favorite uses of machine learning at American Express is to build a machine learning mobile phone application to provide customized recommendations for restaurant choices.


Setting Up Security as a Business: 3 Best Practices for Security Execs

The existence of CyberGRX and other new services signals a movement in the security community. It's a clear confirmation that security is now a fundamental business issue and a potential growth advantage — and that security executives must take the lead in convening the business and having discussions about how security becomes a strategic lever. And more often, security execs have the floor. The massive amount of cyberattacks, exploits, and cybercrime have made it clear that every company will be affected by a security issue. Security officers no longer have to waste time legitimizing security as a business risk; they should be the lead executives who provide the insightful information and details on business impact that business leaders need to make sound decisions.


Predictive Analytics Can Stop Ransomware In Its Tracks

“Protecting an organization from ransomware or any type of malware is similar to an arms race, as the threat evolves so must your defenses!” Malewicz said. The county turned to predictive analytics in hopes of halting the ransomware attacks. Livingston County uses Unitrends backup solution to provide Malewicz's team peace of mind that in the event our cyber defense fails. “Ransomware was largely unheard of years ago, but today it's a household name - everyone knows someone or some organization which has been infected. The future guarantees that more menacing ransomware variants will take center stage wreaking havoc in our homes and places of business. When ransomware exploits bypass perimeter cyber defenses you have only to rely on your predictive analytic cyber defenses to protect you, else I hope you have stable and secure backup to fall back on!” he said.



Quote for the day:


"We'd achieve more if we chased the dream instead of the competition." -- @simonsinek



Daily Tech Digest - April 09, 2017

Why more tech workers should take sabbaticals

Taking a break from work, like a long weekend, is one way that employees and their managers can use to counteract burnout. Another tactic is to move an employee to a less stressful assignment, or to transfer an employee to a new area of work where he/she can get away from older pressures and start fresh. Still another tactic is to develop staff "bench strength" so that project stresses don't continuously fall on the same group of people. Finally, it helps to have fun and relaxation at work! An occasional pizza party, an onsite exercise workout room, or even a quiet sanctuary where employees can meditate or relax their minds, all contribute. Five years ago, only 4% of American companies offered sabbaticals, and the reality is, many smaller and mid-sized companies simply don't have the bench strength to offer them.


Bank consortium demonstrates leveraged loan trade via blockchain

Long said the goal of the test was to prove not just that a trade can be done over blockchain, but that it is well worth the investment in terms of time and cost savings for syndicated loan buyers and sellers. The demonstration, which involved a typical roster of syndicated loan trade participants, showed that a trade could potentially be settled in a few days, at much lower cost. Other efforts are underway to speed up trade settlement. The LSTA recently introduced rules aimed at discouraging buyers from dragging their feet in bringing their money to the table. As a result, median settlement times have been reduced from 16 days to 11 days since 2013. But banks are still aiming for loan-trade settlements in under three days, Long said. “We were looking to automate processing and remove all duplication and we did succeed at that,” Long said.


Why a combination of agile and DevOps is essential in propelling digital transformation

New research commissioned by CA Technologies shows that 67 per cent of UK organisations using an agile methodology experience an improvement in customer experience.  It also highlights how DevOps and agile are better together than apart: Organisations that add DevOps practices to an agile environment improve new business growth by 38 per cent more than using agile alone. Agile and DevOps together also increase operational efficiency by 23 per cent, compared to using agile alone.  However, organisations need to do more than simply launch both in unison and assume great customer experiences will emerge. They need to mature their agile and DevOps deployments as quickly as possible, because that’s where the greatest payback lies.


How CIOs can drive change by setting a vision

“We lead people,” he continues, “not projects.”Shurts forged that perspective through, among other experiences, a series of challenging and complicated CIO assignments, all of which involved organizations in massive need of change, and in massive need of decisive leadership. ... The mission mattered, not just for motivational purposes, but also because it was true and transparent. And sharing ownership of that mission was sorely needed to get past the reticence of many IT staffers. “Otherwise, to some degree, we were a bunch of professionals coming into the office just to do something,” Shurts says. To a high degree, it worked. After Shurts invited his boss, the division president, to a town hall about the project, the executive told his colleagues (as Shurts recalls) that Shurts’ team ‘really believes they’re working on the most important thing for this company.’ Shurts thought to himself, “Damn it, Rick — you should, too!”


The Unreasonable Ineffectiveness of Machine Learning in Computer Systems Research

A contemporary example of such “unreasonable effectiveness” is the success that machine learning has had in transforming many disciplines in the past decade. Particularly impressive is the progress in autonomous vehicles. In the 2004 DARPA Grand Challenge for autonomous vehicles, which popularized the idea of driverless cars, none of the vehicles was able to complete a relatively simple route through the Mojave Desert, and I thought it unlikely that I would see driverless cars operating in urban environments in my lifetime. Since that time, progress in this area has been phenomenal, thanks to rapid advances in using machine learning for sensing and navigation. Driverless long-haul trucks are apparently just a few years away, and the main worry now is not so much the safety of these trucks but the specter of unemployment facing millions of people currently employed as truck drivers.


Artificial intelligence (AI) and cognitive computing: what, why and where

Artificial intelligence is being used faster in many technological and societal areas although there is quite some hype about what “it” can do from vendors. Still, the increasing attention and adoption of forms of AI in specific areas triggers debates about how far we want it to go in the future. Prominent technology leaders have warned about the danger and think tanks and associations have been set up to think about and watch over the long-term impact of AI (and robotics) with dicussions on the future of humanity and the impact of superintelligence but also, closer to today’s concerns, impact of automation/AI/robots on employment. Anyway, it again adds to that mix of ingredients that creates the conditions to strengthen the negative connotation regarding the term artificial intelligence


So You Want to Be a Data Scientist? – It’s Complicated

Anyone who is considering a career in data science needs to understand first, the myriad of things such a career involves, the type of education and training required, and exactly what the job market holds. And because the field is growing so fast, students and mid-career professionals both have an opportunity to move into data science careers, if they get the right education and training. ... There is no single definition of data science, as it varies with industry, specific business, and what the purpose of the data scientist’s role is. And different roles require different skill sets, therefore the educational and training path is not uniform. Data scientists can come from many fields – math, statistics, computer science, and even engineering.


Technology has forever changed our creative thinking. Here's how to take it back

When you walk around these days, count how many people are looking down at their phones. Almost everyone! Surprising, right? It’s sad how frequently screens have substituted the need for others in our lives. The same is true when working on projects. Having a person around IRL is more valuable than shooting an email over or setting up a call to ask for feedback. When creating with others, you’re able to share your ideas and creations at the moment they’re being made. While you chat things through, new ideas could even come to light based on the discussions that you’re having with real time feedback. In addition, behind a screen, you don’t get to see the actual project you’re working with nor have the luxury to read the body language behind the other individual to see their thoughts and feelings.


The Synthesis Of Enterprise Architecture And Design Thinking

To be human-centred is to focus on people and outcomes. While traditionally Enterprise Architecture has arguably been pre-occupied with outputs (i.e., various domain specific models or views of the business) a human-centred approach demands a shift in focus to the outcomes that a design process delivers (including the experience of the design process itself as an outcome). This dynamic has seen us re-think the TOGAF ADM as a series of design activities that each require a meshing of both Enterprise Architecture and Design Thinking to deliver not only the blueprints and plans needed to guide change, but also carefully crafted experiences that change individuals, organisational culture and create opportunity for insight.


The relationship between enterprise architecture artefacts

Considerations (principles, policies, maxims, etc.) are global conceptual rules and fundamental considerations important for business and relevant for IT. Standards (technology reference models, guidelines, reference architectures, etc.) are global technical rules, standards, patterns and best practices relevant for IT systems. Visions (business capability models, roadmaps, future state architectures, etc.) are high-level conceptual descriptions of an organization from the business perspective. Landscapes are high-level technical descriptions of the organisational IT landscape. Outlines (solution overviews, conceptual architectures, options papers, etc.) are high-level descriptions of specific IT initiatives understandable to business leaders. Designs are detailed technical descriptions of specific IT projects actionable for project teams.



Quote for the day:



"There will always be someone who thinks you can't succeed. Make sure that someone is never you."-- @LeadToday