Daily Tech Digest - April 19, 2017

AI will create many new jobs — here’s how you can prepare

For humans to be the most productive in their collaboration with machines, they need advanced technology skills that probably exceed their current capabilities. The skills gap must be closed for workers at various levels of competencies and who possess a variety of experiences. Filling such widely disparate skills gaps, bridging the college-to-work gap, and retooling millions of workers into completely new jobs are daunting tasks. Traditional approaches to education have come under pressure due to the costs (student debt in the U.S. is estimated at $1.3 trillion) and questionable efficacy (a late-2016 study showed that nearly half of new college graduates are underemployed). Given the magnitude of the problem, a new approach is necessary. Though not yet widely adopted, adaptive learning is a low-cost, proven, and highly efficient way to equip people from factory workers to physicians with skills — not just in technology, but in other realms as well.


StorageOS goes to market with persistent Docker container storage

StorageOS also optimises storage, tracking where containers are running and ensuring storage remains as local as possible to keep latency down. It aims to tackle the key weakness of storage for container environments – that container storage is not persistent. That means that when containers cease running, whether for planned or unplanned reasons, storage is lost and not resumed when containers are restarted. Containers are gaining popularity because of their ability to be deployed and scaled rapidly. Organisations can deploy a given number of containers to support a campaign launch, for example, then, if demand spikes, more containers can be added, effectively increasing the parallelised operation of the application. These can also be in different locations, so some containers could be run in-house while additional capacity is run from a public cloud.


The benefits and pitfalls of implementing threat intelligence

The industry should aim to achieve a level of interactive integration and cooperation between analysts and their tools, so that they seamlessly play off of each other’s strengths to be better than their sum. The current place where analyst and automation meet are at the SIEM and the threat intelligence platform. The SIEM is the centre of events. The threat intelligence platform (TIP) is where intelligence is managed by the analyst. Your SIEM and TIP should work well enough together that any events that already correlate to threat intelligence can be viewed in the SIEM while the TIP can still be used to research any probable future threats. The experienced analyst is central to the process for the steps that require their intuition, given all of the possible information, to make a decision. Once they make or review decisions they can quickly deploy any changes to the appropriate systems or channels.


Spanner, the Google Database That Mastered Time, Is Now Open to Everyone

To be sure, a few others could build a similar service, namely Amazon and Microsoft. But they haven’t yet. With help from TrueTime, Spanner has provided Google with a competitive advantage in so many different markets. It underpins not only AdWords and Gmail but more than 2,000 other Google services, including Google Photos and the Google Play store. Google gained the ability to juggle online transactions at an unprecedented scale, and thanks to Spanner’s extreme form of data replication, it was able to keep its services up and running with unprecedented consistency. Now Google wants a different kind of competitive advantage in the cloud computing market. It hopes to convince customers that Spanner provides an easier way of running a global business, a easier way of replicating their data across multiple regions and, thus, guard against outages.


Mobile device strategies catch on among hospitals

In developing mobile policies, hospitals must address the security of patient information and the need to comply with the privacy and security regulations of the Health Insurance Portability and Accountability Act (HIPAA), notes the Spok report. Some organizations that responded to the survey, in fact, “viewed mobile strategies as primarily a security project concerning HIPAA compliance,” the report points out. However, hospitals’ mobility strategies must extend beyond security to help them reach their organizational goals, Edds says. Kuhnen, similarly, says that hospitals must go beyond mobile security if they don’t want to fall behind. “They need to look at the productive uses of mobile technology—how the technology can make their workflows more efficient and improve user satisfaction.”


Four Data Science Imperatives for Customer Success Executives

To decrease customer churn, you can use predictive modeling to identify the variables that are predictive of customer churn. While you can find drivers of churn manually when the data set is small, you will need to rely on the power of machine learning when you integrate all your data sources. Because integrated data sets can contain many variables, data analysts/scientists are simply unable to quickly sift through the sheer volume of data manually. Instead, to create predictive models of customer churn, businesses can now rely on the power of machine learning. Machine learning is a set of techniques that allow computers to make dynamic, data-driven decisions without explicit human input. In the context of CSM, machine learning helps computers “learn” the differences between users who stay and those who leave.


New Verizon Smartwatch Doesn't Need A Smartphone

Wearables may soon not rely on a smartphone, as more than one network-connected smartwatch hit the market. One such smartwatch launching next month was developed by a major network to function as an independent device. Verizon’s new Wear24 smartwatch can connect to Verizon’s 4G LTE network without requiring a smartphone. The smartwatch automatically operates using the user’s existing phone number when sending texts and making calls, according to Verizon. The smartwatch is equipped with an eSIM (Embedded Subscriber Identity Module), which enables the network connectivity. This functions similarly to the SIM card in a smartphone, but is not removable. Integrating eSIMs into IoT devices enables networks to remotely configure device connectivity settings and allow or deny access based on the status of a device owner’s subscription.


Addressing the Cybersecurity Skills Gap

The talent shortage is real, and it might get worse before it gets better. As the amount of accessible data grows, data crime is becoming more pervasive. Ransomware, sophisticated extended-duration attacks, phishing and whaling attacks are all targeting large enterprises, government organizations, mom and pop shops and everyone in between. It doesn't help that the rapid growth of data crimes is a relatively new trend, making it hard to find people who are deeply experienced in fighting data crime and who can be thrown into the fire immediately. This gap can have the biggest effect on small business leaders, who often can’t compete with larger companies when it comes to offering the salary and benefits that attract today’s top IT talent. At this point, qualified newly hired professionals command average salaries of roughly $150,000, and that number most likely has room to grow.


Cyber threats are growing more serious, and artificial intelligence could be the key to security

"This is the real scare, to not just a particular industry of a particular size, but to everybody. It is a matter of existence," said Aurora. That's where Darktrace's artificial intelligence system comes in, with the latest technology offering called Antigena. Once a threat is identified, Antigena automatically responds by taking proportionate actions to neutralize it and buy security teams enough time to catch up. In essence, it acts like a digital antibody that can slow down or stop compromised connections or devices within a network without disrupting normal business operations. "Human beings are still going to be fundamental, but right now, the kind of attacks — you find it very difficult to figure out and they're so quick that if you look at traditional means, by the time human beings get to respond, it's too late," Aurora explained.


Demystifying Network Analytics

A common request from network operations: “I don’t want to wait for users to phone us about problems, nor do I have time to sift through mounds of data. Tell us who’s having a problem and how to fix it.”  True analytics needs to automatically surface insights and recommend useful actions that IT can take to proactively improve user experience. What’s more, the tools should be able to suggest what actions to take to deliver the biggest bang for the buck relative to improving the users’ network experience. ...  But what comes out of the machine learning algorithm must be translated back into a plain English recommendation, such as: “By removing the rogue access points interfering with the 5GHz radio of a certain access point you can effectively mitigate 400 client hours of poor client Wi-Fi performance.”



Quote for the day:


"Any powerful idea is absolutely fascinating and absolutely useless until we choose to use it." -- Richard Bach


Daily Tech Digest - April 18, 2017

Five Pitfalls To Avoid When Migrating To The Cloud

"This is part of the learning curve," said Deepak Mohan, an analyst with IDC. "The negatives are attributed to the cloud and not to these mistakes that need to be corrected... If a company does not realize the cost savings and they fail to see the results they thought they'd get, the result is that there is a drop in faith and a lowering of confidence in your cloud strategy. And that will cause a slowdown in adoption." Part of the issue is that the cloud is really a different beast for a lot of IT shops. ... "What we learned is that while it's easy to get started, cloud is completely different from IT," said Temujin Baker, senior manager of engineering and architecture for King County, Wash. "How you run your business in the cloud is different than how you run it" on premises. "There are changes in how you do your work, the skills that are needed, the process."


Software preservationists look ahead to enterprise focus

Software archiving is nothing new, from organizations such as Archive.org, Bitsavers.org, the federal government's National Software Reference Laboratory, and many smaller players who've all been working for years to post applications online for public download or at least for browser-based emulation. It never was easy, and now it's becoming more difficult. Preservationists are joining resources because they realize that programs are going cloud-native, upgrades are increasingly transparent to users, and how do you take snapshots of a program that's reliant on constantly changing infrastructure? "The Software Preservation Network (SPN), we make no claims that we're the first people," noted SPN's Jessica Meyerson, a digital archivist at the University of Texas at Austin. "Many archivists, information professionals, and just individuals... have become the caretakers and maintainers of legacy software just because they see the value in doing so. "


Why strong cybersecurity means giving ex-employees the cold shoulder

A cybersecurity best practice is to always avoid becoming the low-hanging fruit, and by making hackers work just a little bit harder your property could avoid a potential digital break-in. While Rodriguez likely had insider knowledge of Marriott’s internal systems and processes, it’s possible that following proper security protocol could have prevented, or deterred, his actions. At the recent Serviced Apartment Summit Americas event, hosted April 11 at the New York Marriott Downtown, Matthew Baker, senior associate at Katten Law, said data breaches in hotels are increasing in number and sophistication. Baker said one of the biggest threats to hotel security is vulnerabilities found in third-party contractors, and called for better and more thorough vetting before entering into digital partnerships.


Can AI and ML slay the healthcare ransomware dragon?

“Attackers can simply move to different techniques – for example non-malware attacks that do not use binaries but scripts or macros – which are much harder to train/learn from an AI/ML perspective. Any preventative technology that relies on the classification of good or bad is always susceptible to the arms race,” he said. Reza Chapman, managing director of cybersecurity in Accenture’s health practice, said maintaining the effectiveness of AI/ML can require significant maintenance. “Detection thresholds need to be adjusted to reach a balance between false alarm rate and missed detection rate,” he said. “Further, constant tuning is often necessary within the specific operation environment. Overall, this is not a reason to steer away from these technologies. Instead, consider AI and ML as complementary to the personnel in your security program.”


Tips for Disinfecting Your Data Center

Perhaps the most important thing to realize is that technology alone will never solve the problem. Perfect email filters will cause the bad guys to use the phone. Perfect phone filters lead them to target peoples’ personal social media accounts. Close one door and they will find another—it’s not unlike those movies where the thief always gets the loot or the painting, no matter how many layers of security are employed. But there is something you can do about it. “Training and education has to be is part of the solution to make people aware of these attacks, how they can detect, stop and report them,” wrote Sjouwerman. End-user Internet Security Awareness Training is all about teaching users not to do silly things like clicking on suspect URLs in emails, or opening attachments that let in the bad hats. Sjouwerman recommended putting all staff through such training.


New Breed of DDoS Attack On the Rise

"CLDAP reflection works in the same way as any other UDP-based reflection attack," Arteaga says. "[But] the amplification of the response is impressive compared to most other vectors," he says. On average, Akamai observed CLDAP-enabled DDoS attacks achieving amplifications of over 56%. The largest attack using CLDAP as the sole vector that Akamai has mitigated so far had a peak bandwidth of 24 Gigabits per second, or about two million packets per second. "These attacks are averaging around 3 gigabits per second—a pretty impressive number considering the limited number of available reflectors," ... CLDAP uses the User Datagram Protocol (UDP) instead of the Transmission Control Protocol (TCP) for communication. UDP does not validate source IP addresses, thereby making application-layer protocols that rely on it—such as CLDAP—good vectors for launching DDoS attacks.


IOT Meets Augmented Reality

A lot of time people will use ThingWorx in the factory, collecting information from sensors and controllers and various other pieces of hardware. ThingWorx is a great tool for aggregating that information. But it can also bring in data from other digital resources, such as CAD and PLM and even ERP.  Really what all of this is about is allowing you to create a digital twin of what’s happening out there in the physical world. You’ve got some smart, connected product in the world, you want to be able to have a digital equivalent of it so you can understand how it’s being operated, predict when it’s going to fail, make sure it’s operating most efficiently. The digital twin is getting more and more airplay. What goes into the digital twin? Ideally it’s everything you would ever want to know about that thing. In practical use cases, what do you care about? A digital twin could be a set of properties and their current attributes. It could be rich 3D information.


Samsung Galaxy S8 makes every other phone feel like a cinder block

For years, Apple has touted "thinner and lighter" as the hallmarks of each new release of the iPhone. With the Galaxy S8, Samsung has beat Apple to the punch in a big way. The S8+ makes the iPhone 7 Plus and the Google Pixel XL feel like cinder blocks by comparison. With an almost bezel-less screen that covers 83% of the front of the phone, the S8+ has a 6.2-inch screen that offers extra functional real estate at the same time. Again, it makes the iPhone 7 Plus and the Pixel XL look outdated by comparison. ... Going into testing the Galaxy S8 Plus, my biggest concern was battery life since the S8 Plus actually has a slightly smaller battery than last year's Galaxy S7 Edge (and that phone sometimes struggles to get through a full day). However, because of the S8's new 10nm processor and some nice power management features in the software, the S8 has ridiculously good battery life.


Risky Business – The Valuation of Data Breaches

How can you calculate the value of a data breach in your organisation and implement an effective mitigation strategy? This is the question that Todd Forgie answers in his fascinating presentation, originally delivered at CLOUDSEC Singapore. You can either read the summary below, which includes Forgie's key recommendations, or watch the video at the end of the article. Forgie is the Vice President of IT and Managed Services at MEDHOST, a healthcare IT company in the US that services about 25% of hospitals in the US and Puerto Rico. He explains that due to the huge growth in the estimated number of successful cyber-attacks and ransomware, it's now critical for organisations to operate with the assumption of a breach. ... But in order to make this happen, his organisation had to accurately model the level of risk being faced and the value attributed to that risk.


A blueprint for the modern government security operations center

Moderate- to high-risk actions should not be automated. Start by examining what could go wrong if an automated action is taken incorrectly. Generate as many scenarios as possible to try to discover circumstances in which the action could cause damage. From my experience, remediation steps like blocking IPs or disconnecting users should not be automated. Scale must also be considered when deciding which processes are appropriate for automation. For example, running a tool against a single system to gather some information can be automated when performed on a small scale, but if the same action is run on thousands of hosts, it can have a detrimental effect on the network stability. For these types of actions, set thresholds for type, amount and time frame of automated activities to protect the network.



Quote for the day:


"The greatest single human gift - the ability to chase down our dreams." -- Prof. Hobby


Daily Tech Digest - April 17, 2017

Has Retail Security Technology Gone Too Far?

The most common and highly visible form of retail security technology that shoppers will encounter is radio-frequency identification (RFID). As explained by OCS Retail Support, RFID tags and scanners work by having individual items give off unique frequencies embedded with information, and having scanners (often in the doorway) pick up this information. If an item leaves the store without being paid for, an alarm will sound, alerting shop staff to the shoplifter (or accidental shoplifter). Amazon Go have already announced that they will be using a variant of this technology to facilitate their checkout-less payments, with purchases being registered when customers leave the store. Other retailers may follow suit. Though perhaps a little intrusive by nature, this form of technology has not caused indignation amongst privacy campaigners.


Honesty is not the best privacy policy

For starters, it's probably a good idea to create fake Facebook and Twitter accounts now so they can have a history by the time you need them. Best practices around this deception haven't been fully developed by security experts, but it probably begins with using your real picture for the fake accounts and a picture of something other than your face for the real ones. When border agents demand the passwords to your social accounts, you can give them access to the fake accounts. Increasingly, people with business or other secrets may buy a second phone to carry while traveling, and leave the real one behind — or at least in checked luggage. And finally, there's the pollution solution, as demonstrated by MIT's Steven Smith. You probably won't have to roll your own. I expect to see an emerging industry of traffic-spoofing browser plug-ins and something similar for messaging apps.


How will future cars stay up-to-date? Make them open like a PC

“There’s going to be pressure to keep the software up-to-date, and not to use hardware beyond an expiration date,” Perens said. He himself has gone through at least six mobile phones over the course of owning his 2007 Toyota Prius, and wonders how future cars will keep up with rapid technological changes. “We haven’t seen much discussion about it, so we thought this might kick things off,” Determann said. Their open car idea may sound like a threat to the auto industry. But every car vendor has a vision for their future business, Determann said. And for some, it may include a degree of openness. He can imagine partnerships between automakers and software vendors to support the tech features in next-generation cars. In that way, “we might see more open and closed cars competing on the road,” he said.


Debating IoT security at MIT Connected Things

The first is to think about security systematically in those situations (typically industrial and other commercial uses) where devices are managed and the manufacturer presumably has a formal responsibility for ongoing updates and patches and maintains some sort of control. Brandon Freeman of Leidos said that there are two questions that he always asks suppliers, “What’s your lifecycle update process? When have you pen [penetration] tested the device?” The second is to acknowledge that low-cost, whether consumer or industrial, endpoint devices are going to be problematic to secure. I made this point recently and it was echoed by a number of speakers throughout the day; it’s just not viable economically to expect updates of essentially disposable devices. ... As United Technologies’ Isaac Chute put it, “Should we be doing some things differently? It comes down to having a different trust model. Things are too complex for the average person.”


Why So Many Businesses Mess Up Employee Development

Good leaders know how to listen, but strong listening skills are rare. Focus some managerial training on active listening, which is crucial to communication. Active listening is a technique that requires the listener to fully concentrate on the content being shared and to develop a strong understanding of it. This helps the listener gain insight into the employee’s perspective and provide effective input. Training management on this skill is pretty simple. The basic tips to emphasize may sound like common sense, but they need to translate into a practice they use daily. They should pay attention, acknowledge the message and look at the speaker directly. Body language such as nodding, smiling and maintaining an upright posture show they are listening and are engaged in the discussion. After the employee voices their perspective, managers should follow up by paraphrasing to reflect back their points and ask for clarification when needed.


How Accountants Can Help Clients Avoid Data Breaches

Because there are a lot of similarities in different types of data breach scenarios, Verizon has opened up the cyber case files in our second annual Data Breach Digest (DBD) so that industries can strengthen their network security processes. The DBD details 16 real-world data breach scenarios based on their prevalence and/or lethality in the field. It is important for organizations to understand how to identify signs of a data breach and important sources of evidence so they can investigate, contain and recover from a breach as fast as possible. Given today’s highly charged cybercrime environment, CPAs can play a vital role in helping their clients become aware of commonly used tactics to better protect financial assets. It’s important to understand that timing is critical when it comes to incident response. The reality is, cybercriminals can break in and steal data in a matter of minutes.


Low-Code Platforms: The Ultimate In Consumerization Of Enterprise Tech

Not only are low-code platforms easy to use, they also follow rapid application development methodologies, which helps in building a prototype quickly. Citizen developers can create a minimum viable product, ready to be used, 4-7 times faster than that created using traditional coding. Citizen developers are typically business managers who are closer to the problem and are best suited to develop a solution. So instead of creating and maintaining multiple apps for each and every department, an IT department can just train people from each department to use low-code platforms, and enable them to fulfil their own app demands. In fact, Gartner predicts that IT will evolve into bimodal IT, where the department primarily focuses on strategy with stability and efficiency in mind, while shifting the development portion to the business units that need it.


Microchip implants help employees access data

The practice, in which employees at Epicenter, a Swedish innovation house, become chip-enabled, has been widely reported on—but the headlines have been somewhat misleading. A party, like the one held in 2014, is held there about once a quarter. The employees are not quite "cyborgs," and they are not asked to implant chips against their will. The company does not pay the cost, and there is no HR policy that encourages it. Epicenter has a member base of about 2000 people from over 300 companies, and only about six of the employees at Epicenter have had chips implanted. The technology, it must be noted, is not new. These kinds of chips have been used to track pets, or deliveries. But having them implanted in humans raises concerns about privacy risks.


How self-driving cars can change your cloud strategy

Every enterprise of any size is now or soon will become a cloud-based company. The issue then is not whether to use the cloud but how to extract the best value from it. Alongside that cloud subscription comes a wave of bits from the exponential growth of devices: from cars to wall widgets returning environmental data, all that information needs to be stored and analysed if it is to add value. For manufacturers and resellers of technology such as IoT devices, this looks like an extension of existing business models, as such companies already offer services on the back of hardware and software sales. However, this may not be a familiar business model to companies not involved in the tech industry. Yet, because of today's reliance by all enterprises on technology, exploiting the data for which the company has already paid makes a lot of sense.


Cars and the IoT: The lane lines are blurring

Of course you can argue that the IoT in some form has existed for decades, but we're talking about what the progression of Moore's Law has wrought in the modern day. Moore's Law is salient because in the majority of organizations that have an IoT business practice, division, subsidiary, product or service line, etc., the origins often came from something to do with semiconductors. This is understandable since the modern era of IoT, literally from the time the term first began floating around, started with devices, a.k.a., things. That were connected to the internet. For a long while, it's been about getting things out there and connected.  In concert with the IoT showing up in non-mobile form, in environments and instances ranging from home thermostats to enormous factories, there's been a gradual introduction of connected, microprocessor-based devices that are mobile.



Quote for the day:


"Technology has become as ubiquitous as the air we breathe, so we are no longer conscious of its presence." -- Godfrey Reggio


Daily Tech Digest - April 16, 2017

The 4 Types Of Data Science Problems Companies Face

The data science process is extensively covered by resources all over the web and known by everyone. A data scientist connects to data, splits it or merges it, cleans it, builds features, trains a model, deploys it to assess performance, and iterates until they’re happy with it. That’s not the end of the story though. Next, you need to try the model on real data and enter the production environment. These two environments are inherently different because the production environment is continuously running – and potentially impacting existing internal or external systems. Data is constantly coming in, being processed and computed into KPIs, and going through models that are retrained frequently. These systems, more often than not, are written in different languages than the data science environment.


What performance metrics do developers value and when do they feel most productive?

Interestingly, the top two answers, "Communication skills" (4.10 on a five-point scale) and "Track record of getting things done" (4.09), aren't usually explicitly quantifiable criteria. They're also things you can get across before even getting an interview using a strong resume or cover letter, respectively. Of course, hard skills are also very important, as we see knowledge of algorithms, data, and frameworks filling out the next two top spots. Once you've picked the right people, you need to ensure they're collaborating effectively, which is why Stack Overflow also asked about favored development practices:


Optimizing your application architecture at the ‘federated edge’

To craft high-performance IoT apps, developers need a federated environment that distributes algorithmic capabilities for execution at IoT network endpoints, also known as “edge devices.” Federation is essential because many IoT edge devices — such as mobile phones — lack sufficient local resources for storing all data and executing all the algorithms needed to do their jobs effectively. Key among the capabilities being federated to the IoT edges are machine learning, deep learning and other cognitive-computing algorithms. These analytic capabilities enable IoT edge devices ... to make decisions and take actions autonomously based on locally acquired sensor data. In particular, these algorithms drive the video recognition, motion detection, natural-language processing, clickstream processing and other real-time pattern-sensing applications upon which IoT apps depend.


Self-taught artificial intelligence beats doctors at predicting heart attacks

“This is high-quality work,” says Evangelos Kontopantelis, a data scientist at the University of Manchester in the United Kingdom who works with primary care databases. He says that dedicating more computational power or more training data to the problem “could have led to even bigger gains.” Several of the risk factors that the machine-learning algorithms identified as the strongest predictors are not included in the ACC/AHA guidelines, such as severe mental illness and taking oral corticosteroids. Meanwhile, none of the algorithms considered diabetes, which is on the ACC/AHA list, to be among the top 10 predictors. Going forward, Weng hopes to include other lifestyle and genetic factors in computer algorithms to further improve their accuracy.



Chatbots: The Hottest Thing In Tech Right Now

Chatbots are the biggest innovation in customer service ever since businesses created web portals for customers to serve themselves. Email and live chat may have increased the interaction between firms and clients. However, chatbots are available 24 hours a day and will interact with customers in the same way a human would. Since most customer queries do not require human intervention, chatbots save you money by automating your customer service. You can now put an end to automated email replies and unavailable live chat services. ... One of the reasons chatbots may herald the end of apps is that they speak the same language as the user. The language used by apps to interact with customers is frankly, not engaging or friendly.


How we learned to talk to computers, and how they learned to answer back

There are many challenges that ASR engines need to address. For example, recognition accuracy is affected by the quality of the microphone used, and by the level of background noise. Refinements in signal processing and acoustic modelling help to create more noise-robust speech recognition, which is especially important as ASR use cases move from relatively quiet offices and homes to noisier mobile environments. People's accents and speaking styles also vary widely, of course, which is why most ASR systems benefit from the creation of user profiles from supplied training texts, so the decoder can fine-tune its "speaker-independent" acoustic model. People may also use words that are not in the language model or the lexicon, so the software also needs to be able to add "out of vocabulary" words and record their pronunciation.


A Beginner's Guide to Information Architecture

In short - we don’t have much patience when it comes to bad user experience. As a result, near perfection has become a must to survive in the competitive tech environment. The job of an information architect is to maintain a competitive advantage by making sure things are where they should be, and believe me, it’s not always easy. As you’ll soon discover, there is a lot to think about. So what do we really mean by IA? I’ll begin by explaining, in layman’s terms, what it means. If you scroll down, you’ll find 8 easy principles that highlight some crucial things to think about when designing the IA of a website. Further down, I explain the many ways that good IA will benefit both the user and your bottom line, and finally I share some handy processes to get you started, plus a list useful tools to use when designing the IA of a site.


Automation and Lean: Scaling up the Lean Value Chain

In today’s world of disruptive technology innovation, needless to say that Lean Principles apply to any field of IT, and as we will see now, Lean Principles also apply to more than just manual processes in IT environment. About Ericsson: Ericsson is a global leader in delivering ICT solutions, carrying over 40% of the world's mobile traffic through its networks. It has customers in over 180 countries and comprehensive industry solutions ranging from Cloud services and Mobile Broadband to Network Design and Optimization. In our service delivery unit IT & Cloud (SDU IT&C), we commenced the Lean Journey with small steps around five years ago. We selected a few important KPIs aligned with the organization’s strategy and initiated lean transformation programs on those areas which helped us by delivering consistently on the following parameters


Learning to Love Intelligent Machines

There is no going back, only forward. We don’t get to pick and choose when technological progress stops or where. People whose jobs are on the chopping block of automation are afraid that the current wave of tech will impoverish them, but they also depend on the next wave of technology to generate the economic growth that is the only way to create sustainable new jobs. I understand that it is far easier to tell millions of newly redundant workers to “retrain for the information age” or to “join the entrepreneurial economy” than to be one of them or to actually do it. And who can say how quickly all that new training will also become worthless? What professions today can be called “computer proof”?  ... Compare what a child can do with an iPad in a few minutes to the knowledge and time it took to do basic tasks with a PC just a decade ago. These advances in digital tools mean that less training and retraining are required for those whose jobs are taken by robots.


Moving towards a ‘Zero-Friction’ PaaS

In a nutshell, a serverless platform needs the application developers to think and write business logic in the form of functions which are invoked when an event is dispatched to the system. Event streams are central to Serverless Architectures especially in AWS’s Lambda implementation. Any interaction with the platform such as an user’s request or mutation of state such as updating an object in the data store generates events, which is streamed into a user defined function for processing the event and accomplishes any domain specific concerns. ... Companies like Netflix, Google, and Facebook have invested significantly in this area during the course of building modern platforms for their consumer facing services. Each of these companies have a proven track record for their quality of service despite running on commodity hardware and network.



Quote for the day:

"The question of whether Machines Can Think... is about as relevant as the question of whether Submarines Can Swim." -- Edsger W. Dijkstra


Daily Tech Digest - April 15, 2017

Let's talk about how we talk about blockchain

The characteristics of third generation DLTs are shifting markedly, and the blockchain vernacular is losing some of its mystique. Decentralisation distinguished the first generation blockchain, and some still say it’s essential. But let’s remember that the public blockchains don’t actually produce decentralisation; they are designed with decentralization as a starting point. Nakamoto rejected financial institutions, and the Bitcoin blockchain was designed to handle e-cash with no central authority. Yet nothing in the original design indicated that decentralisation could fit all types of business, nor that the blockchain could decentralise anything other than e-cash.  Immutability is another word that’s becoming a bit stale. In my nearly twenty years experience in cybersecurity prior to blockchain, I don’t recall “immutability” ever being expressed as a requirement.


The Democratization of Machine Learning: What It Means for Tech Innovation

Market-based access to data and algorithms will lower entry barriers and lead to an explosion in new applications of AI. As recently as 2015, only large companies like Google, Amazon and Apple had access to the massive data and computing resources needed to train and launch sophisticated AI algorithms. Small startups and individuals simply didn’t have access and were effectively blocked out of the market. That changes now. The democratization of ML gives individuals and startups a chance to get their ideas off the ground and prove their concepts before raising the funds needed to scale. ... There is an effort underway to standardize and improve access across all layers of the machine learning stack, including specialized chipsets, scalable computing platforms, software frameworks, tools and ML algorithms.


Decoding banks digital customers’ expectations

Most banks’ customer strategies, fueled by customer analytics, will need to change to really take advantage of customers’ new channel preferences, for many different researches show that consumers who have grown up immersed in digital technologies, are two to three times more likely to want more digital interactions than what banks currently support, yet older customers are becoming surprisingly open to adding other channels to their portfolio and are increasingly experimenting with online interactions, using a wider variety of contact channels and apps. As a result, customers from all ages find it easier to compare a bank’s or financial institution’s promise with its delivery and how the overall experience meets their own expectations and, subsequently, make changes if they consider their bank isn’t as digitally ready as they would want it to be.


Search the world's largest cybercrime library

"The repository enables lawmakers to draw upon the database of legislation when drafting laws on cybercrime or electronic evidence," said Loide Lungameni, chief of the UNODC (UN Office on Drugs and Crime) Organized Crime Branch. " ... Established in conjunction with the 2013 Comprehensive Study on Cybercrime, the database is a response to the explosion of global connectivity at "a time of economic and demographic transformations, with rising income disparities, tightened private sector spending, and reduced financial liquidity." "Upwards of 80 percent of cybercrime acts are estimated to originate in some form of organized activity," the study determined, "with cybercrime black markets established on a cycle of malware creation, computer infection, botnet management, harvesting of personal and financial data, data sale, and 'cashing out' of financial information."


Last Words: Computational Linguistics and Deep Learning

Where has Deep Learning helped NLP? The gains so far have not so much been from true Deep Learning as from the use of distributed word representations—through the use of real-valued vector representations of words and concepts. Having a dense, multidimensional representation of similarity between all words is incredibly useful in NLP, but not only in NLP. Indeed, the importance of distributed representations evokes the “Parallel Distributed Processing” mantra of the earlier surge of neural network methods, which had a much more cognitive-science directed focus (Rumelhart and McClelland 1986). It can better explain human-like generalization, but also, from an engineering perspective, the use of small dimensionality and dense vectors for words allows us to model large contexts, leading to greatly improved language models.


AI and robots will take our jobs - but better ones will emerge for us

Innovation is the only sustainable way to make society wealthier and better off. In terms of real GDP, Americans are on average more than eight times wealthier today than they were in 1917 2. In the 16th century, Queen Elizabeth was practically the only person wearing silk stockings. In the 21st century, any American woman can. A similar point holds true for cars, plumbing, electricity, and a variety of other modern wonders that began as luxury goods. When technological unemployment occurs, laid-off workers seek retraining and private sector leaders create transitional infrastructure to reabsorb them into the economy. Innovative technologies create more wealth and better jobs in the end by eliminating unpleasant rote work and increasing overall productivity. In the past 30 years, we have experienced a complicated period of globalisation.


How Digital Transformation Will Affect The Automotive Industry

Today already 40 million people use app-enabled carpooling services, and the usage of ridehailing apps has grown rapidly to over 70 million users. Frost & Sullivan’s mobility research has highlighted the continued trend of the automotive industry investing in dedicated collaborations. “As information services, in particular, become more sophisticated, the potential to integrate and aggregate mobility services is increasing,” explains Shwetha Surender, Program Manager Mobility. This allows users to plan, book and pay for their journeys on the smartphone in real time. To make this effective, partnerships between both private and public transport providers are essential. The revenue potential of such digital mobility services is expected to rise to ~$2 trillion by 2025 globally, explaining the continued interest from the private sector.


Fintech start-ups put banks under pressure

Startups have the advantage of being free of legacy technology systems and tough regulation, both of which limit the digital developments of established financial services firms. As a result, start-up companies can more efficiently create mobile-focused services or products that threaten existing financial companies. For example, a number of mobile-based banks such as Atom, Tandem, Starling and Monzo have emerged in the past year with the aim of offering current accounts that help customers to manage their money and lifestyle. Some fintech start-ups pose a direct threat by capitalising on weaknesses and gaps left by established companies. Nutmeg in the UK, for example, provides low-cost online wealth management, which makes investment expertise accessible to millions of people who cannot afford advice but do not have the confidence to go it alone.


NSA's arsenal of Windows hacking tools have leaked

The dump of Windows exploits -- arguably affecting the most people and organizations and likely to cause the most damage and embarrassment to the intelligence agency -- has been expected since the hacking group first emerged on the scene last year. In case you missed it, hacking tools that were confirmed to belong to the NSA's so-called Equation Group were stolen last year in one of the biggest breaches of classified files since the Edward Snowden revelations. These tools, allowed NSA analysts to break into a range of systems, network equipment, and firewalls, and most recently tools to target the Linux operating system -- many of which were old and outdated. The group attempted to auction off the files but failed, and have been releasing portions of the stolen files in stages.


Are UK IT contractors leaving the sinking Brexit ship?

Ever since the UK shocked the world (and, maybe, itself) by voting to exit the European Union, pundits have prognosticated on what effects this will have on the economy and society. While many think it’s too early to say, UK skills sourcing company Arrows Group broke cover and came out with a notable statement, suggesting that Brexit is already leading to a 10 per cent reduction in skilled tech workers from within the EU relocating to the UK. Conversely, the company says there is an increase in UK digital skills heading elsewhere, notably Switzerland. The Arrows database used for this research only covers about 2,000 contractors but as an early indicator of what is going on its insights might have some value. With that caveat, I followed up with Arrows founder and CEO James Parsons and the following is a lightly edited version of our email exchange.



Quote for the day:


"A computer will do what you tell it to do, but that may be much different from what you had in mind." -- Joseph Weizenbaum


Daily Tech Digest - April 14, 2017

3 Overlooked Attributes of a Great Chief Digital Officer

Confronting the tidal wave known as digitization, some CEOs call for a lifeboat in the form of a Chief Digital Officer (CDO). The CDO helps a company respond quickly and strategically, to the rapidly evolving digital landscape. There are several qualities that every CDO needs. To start, they need an innovative mind and great skill at communication. Those are obvious. “It’s really about [developing] a set of capabilities—around customer engagement, digital marketing, using algorithms to adjust the way the company works—not about a title,” says Martha Heller, President of executive search firm Heller Search Associates. Here are three less-obvious qualities that Heller says make CDOs effective


The Future of Application Development Is Here and it Is Cognitive-First

The DataRPM platform automates predictive modeling, leveraging proprietary Meta Learning capabilities to increase quality, accuracy and timeliness of equipment failure predictions by more than 300 percent. The technology enables customers such as Jaguar, Samsung and Mitsubishi Heavy Industries to predict and prevent asset failures, reduce maintenance costs, optimize inventory and resources, predict quality issues, forecast warranty and insurance claims and manage risks effectively. Imagine, analyzing a massive volume of data, with hundreds of different variables, concurrently, within hours and leveraging that data to drive the business applications of the future? This is what Progress will deliver and we’ll do it in a way that is easy and affordable for businesses of any size.


Analysing distributed architectures in the era of IoT

Design and architecture phases must aim at conceiving a structure able to easily provide data and services to a multitude of unrelated devices. Third generation consumers, like wearable devices, personal and support equipment, sensors and actuators, and more in general any electrical appliance, should be easily pluggable and require the lowest integration and maintenance efforts, without any structural integration. The consequence is simple: we cannot architect our applications as they were isolated islands, self-contained and device/platform dependent. We must provide easy access to the information processed by our software, easing the fruition from devices potentially unknown.


Communicate IT’s Business Benefits More Effectively

Over half of IT leaders see themselves as part of a cost center or service provider, and only 4% are highly satisfied with IT’s communication with the rest of the business. This survey points out the risks and costs of these sorts of order-taker relationships, including loss of credibility and low level of engagement with business partners. Today’s CIOs acknowledge the problem, but many are struggling with how to address it. In fact, the same CEC survey found that 89% of IT leaders report at least one significant barrier to effective communication. How can you show the company the benefits IT is bringing, and help them to process and understand that story? The first step is to accept the inadequacy of working in silence while hoping the company understands the impact you are having.


95% of Organizations Have Employees Seeking to Bypass Security Controls

“Insider breaches are a growing threat to virtually all organizations including mainframe users,” says John Crossno, product manager of Compuware’s security solutions group, which recently released a tool designed to mitigate the threat. The increasing number of incidents where employees fall prey to phishing and other social engineering attacks and hand over authorized user credentials to attackers have made even otherwise secure mainframe environments vulnerable, he says. He points to the massive data breach at the U.S. Office of Personnel Management in 2015 as one example of how attackers are able to gain access to critical mainframe systems by acquiring the valid credentials to do it. In the mainframe environment, “enterprises have traditionally relied on insufficient methods to identify threats including disparate logs and data gathered by security products to piece together user behavior,” he says.


‘Cloud adoption and escalating threats accelerate encryption deployments’

The report revealed enterprises have accelerated adoption of encryption strategies, with 41% of respondents saying their organisation has an encryption strategy applied consistently across the enterprise. Notably, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations. Other critical findings demonstrate organisations continue to show a preference for control over encryption and key management when those activities migrate to the cloud. John Grimm, senior director of security strategy at Thales e-Security, said that “This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection.


Blockchain 101: How This Next Big Service Will Change The Future

Setting up your own Blockchain is not easy. It requires heavy infrastructure and development capabilities that most businesses aren’t savvy enough to manage. Enter BaaS. As more companies discover the power of Blockchain and what it can do for their businesses, there will be even greater demand for making this technology more easily accessible. According to Harvard Business Review, Blockchain is the next great disruptor, even more likely to change the next decade of business than big data or artificial intelligence (AI). Says the writer, just as the internet was the first native digital medium for information, Blockchain is the first native digital medium for value. Some 65 percent of banks are expected to implement a Blockchain solution in the next few years—and that’s just on the finance side. The technology is set to see a massive explosion throughout the business landscape.


Multi Or Hybrid? Dealing With A Complicated Cloud World

“We’re seeing conversations shift towards multiple clouds, not one single technology,” said Simon Crawley-Trice, director of global solutions & services for EMEA at Rackspace. “I think it’s going to be a combination between hybrid and multi-cloud depending on what’s right for the business.” “A lot of service providers tend to lead with the technology, but CIOs want a business conversation around what is the business value of hybrid cloud? They want to know what the business value is of consuming these different cloud technologies.” Cockerton agreed, highlighting that “ultimately the conversation is going to become one of the right workload in the right place at the right price. That’s going to determine the conversation for the next 10 years”.


The AI revolution: Is the future finally now?

Despite the mounting interest and the proliferation of new technologies, is this current wave that much different than what we have seen in the past? Do the techniques of the modern AI movement – machine learning, data mining, deep learning, natural language processing and neural nets – deserve to be captured under the AI moniker, or is it just more of the same? In the earlier peaks of interest, the broad set of activities that were typically bunched together under the term ‘AI’ were reserved for the labs and, if they ever saw the light of day, they were severely constrained by what the technology of the day could deliver and were limited by cost constraints. Many of the algorithms and structures central to AI have been known for some time; rather, previous surges of AI had unrealistic expectations of immediate consumer applications that could never be accomplished given limitations of the data and techniques available at the time.


Augmented reality in financial services

Within a bank, AR has the potential to transform productivity. Data visualisation is a key tool for traders needing to make important data-driven decisions quickly. AR can help traders view, analyse and manipulate large quantities of complex data faster through a more intuitive AR interface. Several companies have trialled Oculus Rift to create immersive 3D virtual reality environments for analysing data. Citibank has taken the next step by using Microsoft’s HoloLens headset to create Holographic Workstations for traders. These headsets use AR to layer complex data sets that enable traders to visualise and make decisions collaboratively with clients. We can expect to see more AR in bank offices in the future.  With the rapid growth in mobile banking apps and introduction of digital-only banks, there are more and more questions about the future role of branches.




Quote for the day:

"We're entering a new world in which data may be more important than software." -- Tim O'Reilly


Daily Tech Digest - April 13, 2017

Managed services - A catalyst for transformation in banking

To view managed services in the right context, it’s often helpful to understand the evolution and growth of outsourcing in financial services companies. Historically, banks have used a variety of outsourcing models to maximize resource efficiency. These models have evolved with changing times. A good example of this progression is business process outsourcing (BPO), which has existed for at least several decades. In 1992, American Express (Amex) spun off its transaction processing unit, where it already had developed scale and experience, and partnered with a third-party card processing unit. Amex anticipated the commoditization of the transaction processing business, so it placed a strategic bet to focus on the growth of the card issuing business.


Bank gets lesson in the security failings of third parties

A story detailing this attack in Dark Reading noted that “customers accessing the bank’s online services were hit with malware posing as a Trusteer banking security plug-in application. The malware harvested login credentials, email contact lists, and email and FTP credentials.” The bank and the DNS provider did apparently make some mistakes — and mistakes are a great way to learn, especially if they are made by someone else. First, the bank had declined to use the DNS provider’s two-factor authentication. Had it done so, the attack might have never worked. Second, the DNS provider, according to Kaspersky Labs, had patched a cross-site request forgery flaw on its site, Dark Reading said. That flaw, coupled with an email phishing attack of the DNS firm, may have provided the initial access prior to the patching.


The 10 best features in Android O (so far)

Google I/O is still more than a month away, but we’ve already gotten a sneak peek at what Google is planning for Android O. To help developers make sure their apps are in tip-top shape for the public release later this year, Google has given them the first preview a little early, opening up a brand new box of tricks and tools. This first release is just for developers, and is focused mostly on feautures that require particular devleoper support—there will be much more in Android O, with more user-facing improvements in later beta releases. While we’re not sure how many of these features will make it out of Developer options and the System UI tuner and into the main release, but there are a bunch of cool tricks we’ve found while exploring the new settings. Here are our 10 favorites.


Data science gets chic

Predictive analytics is one type of analytical method that is getting much attention. This is because senior executives appear to be shifting away from a command-and-control style of management – reacting after the fact to results – to a much more anticipatory style of managing. With predictive analytics executives, managers and employee teams can see the future coming at them, such as the volume and mix of demands to be placed on them. As a result they can adjust their resource capacity levels and types, such as number of employees needed or spending amounts. They can also quickly address small problems before they become big ones. They can transform their mountains of raw data into information to test hypothesis, see trends, and make better decisions.


With Robots On The Job - It Won't Be IT As Usual

The trend means that CIOs and IT managers need to be prepared for an influx of robotics because introducing this technology isn't as simple as firing up a fleet of humanoid robots and letting them loose in an office building. It's going to take planning, new skills and thought about how robots will affect employees and require new infrastructure. ... "It's very much a different mindset than traditional IT," said Mike Gennert, a professor and director of the Robotics Engineering Program at Worcester Polytechnic Institute, in Worcester, Mass. "IT managers worry about how they manage information, how it's used, how it's stored and secured. But none of that has the ability to directly affect the physical world. Robots affect the real world. That brings issues IT managers have not had to confront."


Who Should Regulate Cybersecurity for Connected Cars?

Lauzon along with other researchers remains skeptical that federal regulations are the best way to ensure safety. “To have regulation that chases down cybersecurity is very difficult because the law generally does not keep up with technology very well,” he said. “No automotive company wants to make a car that is hackable.” One option that could gain support would be to follow suit with the federal automated vehicle guidance released in September 2016. The guidance, which was intended to serve as a living document, laid out several best practices, specified what separate jurisdictions are responsible for regulating, and set up a 15-point self-check safety assessment letter. “I like the way NHTSA approaches it now and says, ‘Here are guidelines you should follow,'” said Lauzon. “With security, you don't usually know there is a problem until it's too late.”


Hacked Dallas sirens get extra encryption to fend off future attacks

The city believes the hack came from the Dallas area, but officials haven't detailed how it occurred. Dallas police are working with the FBI and the Federal Communications Commission (FCC) to validate what they think happened and find the source. The hack caused all 156 emergency sirens to activate for about 90 minutes, scaring some residents and doubling the number of calls to 911. Radio security experts theorized the incident may have been a simple "replay attack" where the hacker recorded the radio signal sent out on April 5 at noon as part of a monthly test of the emergency siren system. Then, the hacker could have played that signal back repeatedly early Saturday. It would take a hacker with a software defined radio (SDR) or other off-the-shelf radio frequency test equipment to pull off the attack, said Chris Risley, CEO of Bastille Networks.


Always-On Strategy

Always-on strategy complements the annual process by giving senior leadership a regular forum in which to monitor and discuss issues that warrant continual attention, including those identified during the annual process and during the course of the year. The always-on process is particularly well suited to addressing issues that span multiple business units (such as a common technology platform), lie outside the scope of existing businesses (for example, growth into adjacent markets), or are too far-reaching to address at the business unit level (such as downstream integration). However, companies must apply always-on strategy systematically—to ensure that executives focus on the highest-priority issues, push for issues to be resolved, and effectively coordinate the activities of the annual planning process with those of the always-on forums.


BrickerBot – The Dark Knight of IoT

The use of the ‘Busybox’ command combined with the MTD and MMC special devices means this attack is targeted specifically at Linux/BusyBox-based Internet of Things (IoT) devices. The similar exploit vector as Mirai means the devices must have their Telnet port open and exposed publically on the Internet. Mostly this would match IoT devices that have been proven vulnerable to Mirai. Because the process does not perform malware infection, but has a clear purpose of corrupting and disabling the device, there is no binary to study and there is not much we can say about how the bot finds its targets. Because BrickerBot.2 is hiding itself behind TOR exit nodes, there is no indication on the location of the bots or even how many bots might be out there. We could assume a random public IP scan to detect potential victims much like Mirai bots are performing.


How to Sell Refactoring? The Case of Nordea Bank AB

When you begin to work with an organization in the context of a specific subject, you usually encounter many points of view. From the very beginning, it is extremely important to realize that these are just different narratives of the same reality and none of them is more real than others. Within the same organization, you talk to different people who often present contradictory information, but each of these is consistent and seems to be justified. ... This way, the developers could focus on how to refactor the backend, style the new views and integrate them with their e-banking system. It drastically reduced the threshold for entering the new technology and made it easier to achieve success. At that stage, our priority was to promote the need for refactoring, not to migrate to a new technology.




Quote for the day:



"The meeting of two personalities is like the contact of two chemical substances: if there is any reaction, both are transformed." -- Carl Jung


Daily Tech Digest - April 12, 2017

A.I. in the kitchen: It's not that far from reality

"Hello Egg comes with cooking assistance even for the most advanced chefs, as well as step-by-step voice-navigated recipe video tutorials and real-time prompts from a human support team for those who might need a little more hand-holding in the kitchen," tech expert Lulu Chang explains. "Moreover, the smart device promises to 'keep a lively conversation going by expressing itself through mimicking facial expressions,' and can also keep you entertained and informed by way of Spotify, audio news feeds, weather forecasts and voice-activated timers and reminders." Having Watson author a smart cookbook and getting to interact with a little egg that responds to your commands is cool, but the future of A.I. in the kitchen has much more in store than trendy products and gadgets.


Why You Should (Sometimes) Let Software Run Your Business

A less radical approach is to take an existing software product (which could be run on premises or accessed as a service) and have it customized to match your company's operations and processes — either by the vendor, by a third party or internally. "That can still be expensive and open-ended," Bartoletti warns. "You can spend two years customizing software, and every change you make can cost you millions." He adds that there is also a risk that you will end up out of sync with the base product's update cycle. That's because each time the base software is update it is your responsibility to test the customizations to ensure that they still work as expected with the base software and modify them as necessary. By the time this work has been carried out the base software may have been updated again — perhaps to include some of the functionality that your customizations provide.


How Amazon is bringing the Alexa experience to your phone

Now instead of facing competition from Google and Apple in the home assistant market, Amazon seeks to strike back by integrating Alexa with phones. As CNET reports, Huawei Mate 9 owners “will get it first in an over-the-air update”, and it is available for iPhone users as well. Other Android users will eventually be able to install Alexa over their phones through the Google Play Store. But while Amazon so far has been looked like an unstoppable juggernaut everywhere it goes, working with smartphones is one area that will be a major challenge. While Amazon can seamlessly integrate Alexa with its own technology in the Echo, integrating it with a phone made by a different company presents challenges. Unfortunately, the Alexa app is not the same as having an Echo in your pocket, though it offers plenty of useful features.


That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

New findings published Monday by researchers at New York University and Michigan State University suggest that smartphones can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. In computer simulations, the researchers from the universities were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time. The researchers did not test their approach with real phones, and other security experts said the match rate would be significantly lower in real-life conditions. Still, the findings raise troubling questions about the effectiveness of fingerprint security on smartphones.


The journey of data storage: what’s next?

Reflecting the growing importance of seamless data delivery to businesses as they become ever-more tech dependent, the storage industry has been developing at a significant rate in recent years. Some great new solutions have hit the market, and we are starting to see the beginnings of a shakeup of the industry. For the past twenty years the industry has been dominated by large specialists like EMC and NetApp. However, the emergence of flash storage is providing customers with a simple, cost effective way to manage data, and new companies such as Nimble Storage, Nutanix and Pure Storage are starting to change the way the industry is run. IDC recently found that the flash based storage market grew a massive 71.9 per cent on top of last year, so there is no question that flash storage is dominating the present market and driving greater expectations around performance, and data centre and TCO (total cost of ownership) reduction.


Fintech firms still see a future for fiduciary compliance tools

Financial services marketing consultant Dan Sondhelm, CEO of Sondhelm Partners, said it was smart for the firms to have aggressively promoted DoL-related features before the rule came into effect. "Whether a law is in place to protect investors isn't the issue," Sondhelm says. "The problem is now visible. Advisers have to have to deal with the problem. They have to have an answer and process to show they are looking out for the best interest of their clients. Smarter clients will keep this issue top of mind." There's been no slowdown in demand for the analytics platform being offered by Boston-based FinMason, says its CEO Kendrick Wakeman. "We are not changing our products in light of the delay of the DoL and last week was one of the busiest weeks we have had in our history from the standpoint of sales demand," he says.


When Hacks Are about Image instead of Money

The biggest risks from these hacks is not the exposure of personally identifying information, but the erosion of trust in our organizations and notable figures. This is because cyberespionage and sabotage campaigns don’t just deal with leaked information. Once a hacker gains high-privilege access to a network, he or she can change internal data, public-facing assets and even insert fake data. If you think fake news is a problem, what about the possibility of fake medical or financial information making the rounds with no way to verify its legitimacy? Unfortunately, like most issues in security, there isn’t a straightforward solution to the problem. It’s impossible to predict how extortion can take place, or what data will be used to tarnish the victim’s image.


As cities get smarter, hackers become more dangerous: This could stop them

After the forensic exams were ordered, several of those who filed suit asked the judge to drop their complaints, either because they suspected Anthem would find evidence the data was lost before the breach or because they didn’t want to submit to having their PCs snooped. Or perhaps they just didn’t want the inconvenience of giving up use of their machines for the duration of the search. Regardless, it proved an effective legal strategy for Anthem. If just a few of those who sue walk away, it still means fewer possible payouts. And it points out how difficult it is to prove that personal data used by criminals was stolen in a particular breach. Yes, the victim’s information was exploited, but how it got into the hands of the criminals is not so easily determined.


DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

“Security for electronic systems has been left up to software until now, but the overall confidence in this approach is summed up in the sardonic description of this standard practice as ‘patch and pray,’” said SSITH program manager Linton Salmon of the Agency’s Microsystems Technology Office in a statement. “This race against ever more clever cyber intruders is never going to end if we keep designing our systems around gullible hardware that can be fooled in countless ways by software.” Salmon said SSITH specifically seeks to address the seven classes of hardware vulnerabilities listed in the Common Weakness Enumeration, a crowd-sourced compendium of security issues that is familiar to the information technology security community.


21 Hot Programming Trends & 21 Going Cold

Programmers love to sneer at the world of fashion where trends blow through like breezes. Skirt lengths rise and fall, pigments come and go, ties get fatter, then thinner. But in the world of technology, rigor, science, math, and precision rule over fad. That's not to say programming is a profession devoid of trends. The difference is that programming trends are driven by greater efficiency, increased customization, and ease of use. The new technologies that deliver one or more of these eclipse the previous generation. It's a meritocracy, not a whimsy-ocracy. What follows is a list of what's hot and what's not among today's programmers. Not everyone will agree with what's A-listed, what's D-listed, and what's been left out. That's what makes programming an endlessly fascinating profession: rapid change, passionate debate, sudden comebacks.



Quote for the day:


"Excellent firms don’t believe in excellence – only in constant improvement and constant change." -- @tom_peters