Daily Tech Digest - June 06, 2017

Vulnerabilities Could Unlock Brand-New Subarus

There's irony in Guzman's latest findings. Last year, he had a 2016 Subaru. It lacked the telematics unit, but Subaru had a mobile app that owners could use to track vehicle maintenance. It also used a token that didn't expire, which Guzman says he reported and Subaru fixed. But the same vulnerability appeared again this year. Subaru "must have re-merged the code and reintroduced the vulnerabilities," he says. So how would an attack work? There are preconditions: An attacker would have to know, for example, that the victim has a 2017 Subaru - or later - with Starlink installed. The key to Guzman's attack is capturing the token that gets generated, and there are a variety of ways to do this. One way is by exploiting a cross-site scripting - aka XSS - vulnerability that Guzman also found.


Reverse Mentoring A Unique Approach To Rejuvenating Your IT Culture

CIOs are searching for employees skilled in the latest mobile, cloud, social and analytics tools, who can build, ship and maintain software using agile and devops methodologies. But such skillsets are in short supply at traditional enterprises whose IT workforces are long in legacy systems and short on digital capabilities. Enter digitally-savvy millennials as mentors. This younger generation, now entering the workforce, is a great resource for educating more tenured staff members on the use of new technologies, Gartner analysts Lily Mok and Diane Berry wrote in a research note earlier this year. “In return, younger staff can gain from senior staff knowledge and capabilities, such as business acumen, proper business protocol and more mature decision-making skills that come with time and experience,” the analysts wrote.


Artificial Intelligence Is About Machine Reasoning

With machine learning you will never be able to adapt to change, which is what every company is looking for. Because change equals innovation! Thus, we consider machine learning as a mathematic optimization technique, which is fully optional. Talking about a decision-making process, everything works correctly without machine learning. Thus, the machine will find a solution on its own. Machine learning can be used to make the way to the solution shorter or more efficient by applying or selecting better knowledge. That's what machine learning is used for. In our case, machine learning classifies the atomic knowledge pieces in the situation of a certain problem and prioritizes and chooses the better suited pieces to provide the best solution. Thus, machine learning helps to select the best knowledge to a specific state of a problem.


IBM Research creates a groundbreaking 5-nanometer chip

It’s a remarkable technical achievement, though a commercial version of the chip may not be possible for a while. Still, it should enable chips with 30 billion transistors, the on-off switches of electronic devices, on a fingernail-sized chip. Researchers say this kind of achievement should enable the $330 billion chip industry to stay on the path of Moore’s Law, or the prediction made in 1965 by Intel chairman emeritus Gordon Moore that the number of transistors on a chip would double every couple of years. IBM is presenting details of its research on its “silicon nanosheet transistors” at the 2017 Symposia on VLSI Technology and Circuits conference in Kyoto, Japan. The development comes less than two years after IBM researchers made a 7-nanometer test node chip with 20 billion transistors.


Healthcare CIO advocates a faster move to the cloud

CIOs have a somewhat adversarial relationship with vendors even though we need them. A lot of CIOs lose sight of that and develop a real animosity toward vendors, which I get because we're bombarded by hundreds of vendors by email and phone calls. But it simplifies the CIO's job to have a small set of partners to manage rather than a wide variety of vendors. A partnership with a select few helps you drive your organization forward, because they become thought leaders, people you can turn to whenever you have big projects. Some CIOs ask: 'How do you know you're getting the best price?' You can test it as you go along and keep the vendors from getting too comfortable with their position. But most vendors understand the importance of the partnership. And with my partners, I can call the CEO and get some action. That's comforting to know.


Lack of Experience May Plague IoT Security Startups

“What’s going on right now is enterprises are extending the existing security infrastructure or security components they have already invested in to address early IoT issues,” said IDC analyst Robert Westervelt who co-authored a new forecast that said the worldwide market for IoT security product will grow from $11.2 billion in 2017 to $21.2 billion by 2021. “Some of the issues, depending on the industry and use case, are surely embedded system security. And so that’s why we think those two segments — device and sensor, and network and edge — are going to have the most growth over the next five years.” IoT security risks vary by industry. Healthcare organizations, for example, are using IoT patient monitoring tools that rely on sensors, which collect patient health data, and then transfer this data to the cloud so a physician can analyze it.


The 7 hottest jobs in IT

“With the intense focus on predictive analytics, deep learning, machine learning, and artificial intelligence, these positions should remain relevant for years to come,” says Flavio Villanustre, vice president of infrastructure and security for LexisNexis Risk Solutions. ... “To the best of our knowledge, it’s not clear how we can build machine learning models where only limited amount of data is available,” says Mehdi Samadi, CTO of Solvvy. “This is currently limiting the types of intelligent applications that we expect to see in the near future. The solution to this problem is either to find approaches that help us to generate data, or building more robust machine learning models which can learn from limited data. Transfer learning algorithms, learning from the data available in other domains in order to perform well in a new domain,” is a promising area for engineers, says Samadi.


Jindal Power And Steel Is Becoming Steel Smart With IoT

What Jindal Steel and Power has done at its Angul plant is enable an Industrial Internet of Things (IIoT) setup by creating a network of machines, advanced analytics, supply chain and people. The World Economic Forum, in its 2015 report, called IIoT— the latest wave of technological change that will bring unprecedented opportunities, along with new risks, to business and society.  “The IoT framework helps the steel plant work smart,” says Anand. The framework helps the plant workers at the Jindal Steel and Power Plant in Angul to monitor the health and status of the machines. It also provides the interoperability of mobile devices with control systems to ease real time remote management. “The IoT allows the real time process monitoring and control on local network and creates an interface to the mobile devices and analytics layer,” says Anand.


It's About Time: Where Attackers Have the Upper Hand

Researchers found a broad range of incident response time among businesses. In half of the successful data breaches, it took five to six weeks or less for defenders to detect malicious activity. In the other half, detection took as long as four years. "Half of [breaches] are dealt with in the first 38 days, which is actually pretty good," says Barbara Kay, senior director of product and solutions marketing at McAfee. "It could be better, but it's not too bad." However, she continues, the four-year window in this data indicates there's a lot of activity in infrastructure that goes undetected for a long time. This is a sign of threat actors hidden deep within the business, which will take "deep hunting" to root out. The longest timeframe will typically be with the most sophisticated type of attacker, Kay adds. Someone who is deep within the network for a long time either wants something or has a vendetta against the company.


How Computer Security Pros Hack The Hackers

The secret to hacking is there is no secret. Hacking is like any other trade, like a plumber or electrician, once you learn a few tools and techniques, the rest is just practice and perseverance. Most hackers find missing software patches, misconfigurations, vulnerabilities, or social engineer the victim. If it works once, it works a thousand times. It’s so easy and works so regularly that most professional penetration testers quit after a few years because they no longer find it challenging. In my 30 years of professional penetration testing, I’ve hacked into every single company I’ve been hired to legally break into in three hours or less. That includes every bank, government agency, hospital and type of business. I barely got out of high school, and I flunked out of an easy college with a 0.62 grade average. Let’s just say I’m no Rhodes scholar.



Quote for the day:


"Never make someone a priority when all you are to them is an option." -- Maya Angelou


Daily Tech Digest - June 05, 2017

Artificial intelligence will outperform humans in all tasks in just 45 years

A recent report suggests that those who are paid less than $20 an hour will be unemployed and see their jobs filled by robots over the next few years. But for workers who earn more than $20 an hour there is only a 31 percent chance and those paid double have just a 4 percent risk. To reach these numbers the CEA's 2016 economic report referred to a 2013 study about the 'automation of jobs performed by Oxford researchers that assigned a risk of automation to 702 different occupations'. Those jobs were then matched to a wage that determines the worker's risk of having their jobs taken over by a robot. 'The median probability of automation was then calculated for three ranges of hourly wage: less than 20 dollars; 20 to 40 dollars; and more than 40 dollars,' reads the report. The risk of having your job taken over by a robot, Council of Economic Advisers Chairman Jason Furman told reporters that it 'varies enormously based on what your salary is.'


Deep Learning 101: Demystifying Tensors

Tensorflow and systems like it are all about taking programs that describe a machine learning architecture (such as a deep neural network) and adjusting the parameters of that architecture to minimize some sort of error value. They do this by not only creating a data structure representing our program, but they also produce a data structure that represents the gradient of the error value with respect to all of the parameters of our model. Having such a gradient function makes the optimization go much more easily. But here is the kicker. You can write programs using TensorFlow or Caffe or any of the other systems that work basically the same way. But the programs that you write don’t have to optimize machine learning functions. You can write programs that optimize all kinds of programs if the ones you write use the tensor notation provided by the package that you have chosen.


Get ready for the ‘first robotic empathy crisis

Perhaps the most important thing humans can do to keep AI in check, according to Brin, is to apply accountability measures and regulation. “The only way that you have been able to make it so that our previous AIs — corporations, governments, and such — don’t become cheaters the way the kings and lords and priests were in the past is by breaking up power and setting it against each other in regulated competition, and that is the method by which we have division of powers, that’s the way we have healthy markets,” Brin said. Regulated competition and accountability have been vital to the protection and advancement of what Brin called the “five great arenas” over powerful interests: democracy, science, sports, law and courts, and markets. Beyond his work as a consultant to federal agencies and his writing, Brin is a Scholar-in-Residence at the Arthur C. Clarke Center for Imagination at the University of California, San Diego (UCSD).


Serverless computing takes another step forward

Like most other serverless environments Functions uses webhooks as triggers. You're able to define the type of webhook used, and Functions' code editor will help you extract payloads that can then be delivered to the Twilio APIs. It's a relatively simple environment at present, offering node.js functionality for your code. That makes sense, as node.js works best when treated as a switch in a message-driven environment. Messages for Functions come in on webhooks and once processed, the output is delivered through Twilio's messaging APIs. Malatack sees the serverless model as a style of programming, where you need to think as little as possible about anything other than your code. "It's a progression for developers as things are abstracted. That's important as abstractions are better, they make it easier to focus on the outcome." It should result in developers getting more leverage, as there's no need to think about complex issues like scaling.


Five Ways To Cultivate a Data-driven Culture for Your Business

In today’s dynamic marketplace, the ability for businesses to use data to identify challenges, spot opportunities, and adapt to change with agility is critical to its survival and long-term success. Therefore, it has become an absolute necessity for businesses to establish an objective, data-driven culture that empowers employees with the capabilities and skills they need to analyse data and use the insights extracted from it to facilitate a faster, more accurate decision-making process. Contrary to what many people think, cultivating a data-driven culture is not just a one-time transformation. Instead, it’s more like a journey that requires efforts from employees and direction from both managers and executives. In this article, I am sharing five different ways businesses can accelerate their transformation into a data-driven enterprise.


How to find the real value in operational big data

You must first understand how to conceptually rationalize all your sites. What is the strategic importance of all the sites in your business operations, and how will you measure performance in aggregate? How do business operations contribute to the overall health of the company, and how will you communicate that through key performance indicators? This exercise should result in a scorecard that aligns with your technical efforts. Metadata analysis is your next step. The strategic team and the technical team must work together to map data from the scorecard all the way down to the sites. Generalization, filtration, and transformation are three key activities this team must perform. Generalization involves mapping up similar data points in to one common concept; filtration is the purposeful exclusion and inclusion of data; and transformation is the rule set that moves included data to common concepts.


The digital revolution: The future is … disruptive banking

A full-serviced digital bank is now a more attractive option, especially because by definition these types of banks are more flexible and instantly responsive, focused on removing the bottlenecks in the existing experience, delivering increased convenience and a more humanised experience with the customer’s interest at its core. These start-up digital banks are likely to not only add competition into the marketplace but to disrupt the entire sector, forcing change with their greater focus on customer experience and satisfaction. Digital banks are more agile than established institutions and create a better user experience and more value for the customer. This value is not fiscal, but delivered through a more personalised experience for each customer.


Is technology destroying the quality of human interaction?

Looking at the world around us today, many things which were not here 10 years ago are fully ingrained in our daily lives. A day without Google, FaceTime or WhatsApp would be quite an experience for me. I use WhatsApp to stay in touch with my family and thanks to FaceTime my kids can see their dad every day even if I am on the other side of the planet. Although I have never met any of the makers of the software, I trust these brands because their products work seamlessly. So instead of trusting the people behind the brand, I have built trust in the brand because their product continuously satisfies my expectations. Obviously, banking is richer than a simple messaging service. Our spectrum ranges from a basic transaction to a complex corporate financing deal. The latter cannot be acknowledged by just ‘two blue ticks’ as is the case for a WhatsApp message.


Continuous Delivery with Kubernetes the Hard Way

Why is continuous delivery so important? Deploying releases to an application continuously eliminates a “release day” mindset. The theory here is that the more frequently releases are done, the less risky releases are. Developers can also make changes to the application (whether implementing new code or rolling back to an older version) as code is ready. This means that the business can make changes more quickly, and therefore be more competitive. Since microservices use APIs to speak to one another, a certain level of backwards compatibility needs to be guaranteed between releases to avoid having to synchronize releases between teams. According to Conway’s law, software takes on the structure of the organization it belongs to. Thus, microservices and containers are just as much about organizational changes as they are about technological changes.


Benchmarks Don't Have to Die

Benchmarks are not just useful for improvements. They can be used as the basis for regression testing, ensuring that performance stays consistent as code is changed. Given that performance isn’t a binary state like broken/working, it’s not always obvious when a regression has occurred. Methodically tracking performance regressions is extremely important for mature projects. Perhaps most important of all, publishing a well-crafted benchmark can codify an entire community’s understanding of interesting workloads and user behaviour. Since the best optimisations figure out the common case and tune for that, benchmarks can guide all developers (especially new ones) towards improving the code that matters most. However, as the Google Chromium team pointed out, there are several drawbacks to benchmarks.




Quote for the day:


"What I've really learned over time is that optimism is a very, very important part of leadership." -- Bob Iger


Daily Tech Digest - June 01, 2017

What is Digital Transformation?

To make this Digital Transformation definition clear and actionable, we also need to define “digital capabilities,” which we’ll define as: Digital capabilities are: electronic, scientific, data-driven, quantified, instrumented, measured, mathematic, calculated and/or automated. While it’s very useful to have a definition, how about we highlight the value of digital transformation by illustrating the difference between a traditional organization and one that has been digitally transformed? So let’s consider a hypothetical case study comparing two companies in the Grocery industry – a traditional Grocer and a “Digitally Transformed” Grocer – to see what the differences might look like.


What Went Wrong In British Airways Data Center in May 2017?

Combining all the different sources shown later in this post, a fairly accurate reconstruction of what went wrong can be provided. The issue BA suffered is very similar to the total failure Delta Airlines experienced in August 2016.  ... Most likely BA is using Rotary diesel UPS systems (aka Dynamic UPS) . Contrary to static UPS which uses batteries, a dynamic UPS uses kinetic to store energy. This is guessing but Dutch Hitec (Former Holec) could be the supplier. In normal operation, power is feed thorugh the green line. For maintenance and redundancy, the auto by-pass can be used. This black circuit feeds IT equipment directly from utility power. What likely happened is a failure in a component of the green line. The flywheel can typically supply only 8 to 10 seconds of backup. It is unknown if the UPS had batteries for temporary power.


Taming the Open Source Beast With an Effective Application Security Testing Program

Forrester specifically recommended the following: “Insert a software composition analysis (SCA) tool as early in the SDLC as possible and continue to scan applications, including older applications with inconsistent or long release cycles, to ferret out newly discovered vulnerabilities.” The best way to do this is to integrate open source discovery directly into the application security testing that you are already doing — making it an essential part of your DevOps strategy. IBM has made this process easy and transparent. With introduction of IBM Application Security Open Source Analyzer, part of IBM Application Security on Cloud, identifying open source components occurs automatically during static application security testing (SAST). These components are matched against a list of known vulnerabilities and results are returned.


SMB Security: Don’t Leave the Smaller Companies Behind

Most organizations prioritize risk, identify gaps, and then proceed to identify the people, process, and technology required to mitigate that risk and fill those gaps. This approach is most certainly a sound and methodical one, but it is one that demands a large amount of resources. For a security organization with 50, 100, or 200 staff members and an annual budget in the 10s of millions of dollars, this approach to risk mitigation is an obvious choice. But what are smaller organizations to do? For example, consider the typical mid-market organization. Their security team might consist of one, two, or perhaps five staff members. Their security budget may be a few million dollars, depending on their size, industry sector, and geographical location. Unfortunately, these organizations often find themselves left behind by the security community and without access to trusted circles that could help them make progress.


Securing Your Enterprise’s Expansion into the Cloud

In addition to scalability and segmentation, your underlying security infrastructure should offer automatic awareness of dynamic changes in the cloud environment to provide seamless protection. It’s not enough to detect bad traffic or block malware using discrete security devices. Security should be integrated into security information and event management (SIEM) and other analytics in private and public clouds, providing the ability to orchestrate changes to security policy/posture automatically in response to incidents and events. Individual elements need to work together as an integrated security system with true visibility and control. With these very complex, diverse environments, it becomes increasingly difficult for a human to make decisions intelligently, taking all the variables into consideration, and quickly enough to keep up with threats. Automating security is the goal.


‘Lone Wolf’ Criminal Hacker Gets Doxed Thanks To Series Of Dumb Mistakes

There's probably a lot of hackers just like him out there, but Symantec decided to expose him because it was a strange case. Igor is good enough to use custom-made malware, but also careless enough to make almost no effort to protect his real identity, DiMaggio argued. To hide his tracks in his more recent attacks, Igor has used covert channels such as randomly generated domains to communicate with his malware. But in 2013, when he uploaded an early version of the same malware to Virus Total, an online repository where anyone can upload files to check whether they are detected by antivirus companies, he used a regular domain, according to Symantec. That was one of his key mistakes. The other one was that throughout his years-long hacking career, Igor has used his real name—or at least a consistent persona or alias—to register domains


IBM’s Watson is really good at creating cancer treatment plans

Watson for Oncology is a cognitive computing system trained by physicians at Memorial Sloan Kettering. It's able to take a patient's medical records, extract pertinent information about their health, and come up with a personalized treatment plan. Watson can also suggest which treatments should not be pursued and provides relevant studies to back up its proposals. All in all, it's meant to help clinicians navigate each patient's case with the help of the latest available research. Watson's healthcare successes aren't new, but these additional findings make it that much more useful for doctors. Further, while Watson is already being used all around the world, it's adding nine new hospitals to its client list, including medical groups in Australia, Mexico, Brazil and throughout southeast Asia. However, financial and functional issues have postponed a planned launch at the University of Texas' MD Anderson Cancer Center.


A New Internal Threat to Your Environment? ‘Checkbox Security’

A checkbox security approach breaks down in this scenario – there are simply too many variables outside the scope of compliance-focused toolsets to ensure the security of your environment. A checkbox security approach that relies on your compliance policies is, simply put, vulnerable. Being compliant does not mean your environment is secure; and conversely, just because your environment is secure does not mean it’s compliant. Governance automation can go a long way in satisfying compliance requirements while also enforcing security policies to protect against internal and external threats. In a virtual or cloud-based (public, private or hybrid) environment with constantly shifting and distributed resources and possibly shared services, automated governance tooling is indispensable for implementing a comprehensive risk strategy at scale, no matter the size of your organization.


CIOs Key To Bridging The IT/OT Devide

"The intersection of IT and OT changes the relative importance of IT management disciplines for the IT organizations concerned. CIOs and other IT leaders need to evaluate and realign their roles and relationships to maximize the value of converging IT and OT," Gartner's Kristian Streenstrup, research vice president and Gartner fellow, said at the time. "CIOs have a great opportunity to lead their enterprises in exploiting information flows from digital technologies. By playing this role, they can better enable decisions that optimize business processes and performance." That still holds true six years later, Jouret believes, though the struggle to realize that opportunity remains.  Jouret’s perspective is unique. He spent the early part of his career as Cisco's IT director for Europe, Middle East and Africa (EMEA), with a turn as CTO of Emerging Technologies at Cisco and CTO for Nokia before landing his current role as CDO at ABB Group about nine months ago.


Cyber security employee shortage barrier to effective threat detection

“Tools and training cannot be a one-time investment, and conversely, require constant attention to keep cybersecurity threat detection tools up to date, patched, and working in an integrated fashion—on top of constantly retooling and training to keep pace with the increasing frequency, sophistication, and diversity of global threats. Your security operations strategy must be underpinned by teams that are equipped with the latest tools, threat intelligence, security content, training, time, and budget to stay ahead of new security threats.” he added. A security operations centre (SOC) consists of a highly skilled team, that continuously monitors and improves an organisation’s security posture whilst preventing, detecting, analysing and responding to cyber security incidents. 81% of respondents agree that the most valuable SOC capabilities are rapid identification and remediation of attacks, while 74% feel that 24×7 threat intelligence monitoring and analysis was an extremely important capability.



Quote for the day:


"Leaders must always question the status quo, be aware of the ever-changing environment and be willing to act decisively." -- Mike Finley


Daily Tech Digest - May 31, 2017

Cisco and IBM announce historic cybersecurity partnership

While the relationship brings technology collaboration and integration to Cisco and IBM customers, it also brings two armies of cyber experts. The tech giants are two of the top 10 cybersecurity startup acquirers. With 40 security acquisitions under their collective belts, Cisco and IBM have snapped up some of the top information security talent along the way. IBM Security alone employs more than 8,000 people globally. One of the core issues impacting security teams is the proliferation of security tools that do not communicate or integrate, according to the press release that announced the new partnership. A recent Cisco survey of 3,000 chief security officers found that 65 percent of their organizations use between six and 50 different security products. Managing such complexity challenges over-stretched security teams and can lead to potential gaps in security.


Florida is Now Courting Hyperscale Data Centers

Data centers developed in rural areas burdened with agricultural tax exemptions can help grow a commercial real estate tax base to boost local budgets. These data centers do not require significant investments in local schools, roads, and parks in return for the entitlement to develop. They also have state-of-the-art security and fire suppression systems which help limit the impact on fire and police resources. The Florida legislature and governor have now taken a crucial step to make the Sunshine State more competitive. However, it isn’t a silver bullet. Notably, the Florida legislature removed economic incentives from Enterprise Florida, which only received $16 million in funding in this latest budget. Florida still has challenges to overcome in attracting massive data centers that could benefit from the new legislation, including: frequent lightning storms, hurricanes, and a harsh climate which requires robust HVAC systems to deal with sensible (heat) and latent (humidity) loads.


Hackers upgrading malware to 64-bit code to evade detection

“The high prevalence of these worms in the threat landscape is unsurprising, as all of them infect files which in turn infect more files, and cause this type of malware to spread quickly and widely,” said the report. “To combat this threat, cyber-security teams must gain a deep understanding of 64-bit systems, and the different mechanisms attackers can leverage to attack them,” said Propper. Bogdan Botezatu, senior e-threat analyst at Bitdefender, told SC Media UK that for specific attacks, 64-bit malware is required to be compatible with the operating system version targeted. These extremely niched families of malware include rootkit drivers (which must be compiled specifically for the target platform), process injectors (including some banker Trojans) and some file infectors (viruses) even if viruses are close to going extinct these days.


OS Instrumentation Framework: osquery

osquery exposes an operating system as a high-performance relational database. This allows you to write SQL-based queries to explore operating system data. With osquery, SQL tables represent abstract concepts such as running processes, loaded kernel modules, open network connections, browser plugins, hardware events or file hashes. SQL tables are implemented via a simple plugin and extensions API.. ... Management can be simple and flexible. The osquery daemon uses a configuration input plugin and logging output plugin. By default both use a filesystem path. Read using osqueryd for an overview of configuration. osquery can be controllable in real time through community-supported management services. These complimentary services and open source projects are documented in our configuration guide. And writing your own configuration input and results output is supported and encouraged.


eBook: Enterprise Architecture in Practice

The author gives a good account of enterprise architecture in practice but makes some other points and raises some fundamental issues related to the practice of enterprise architecture as it exists today:
Enterprise Architecture is a strategic skill that transcends companies, and industries i.e. the fundamental principles apply across the board; and Enterprise Architecture is much more than a tool for "business IT alignment" or being only about IT - it concerns the entire enterprise and its restriction to IT has limited its value.  Toward that end, the ebook discusses: How to setup the enterprise architecture practice or capability in the enterprise; What "work" or "activity" does an enterprise architecture practice/department do and what business benefit does that produce?


Why mobile apps management trumps a traditional BYOD strategy

"We've started to see civil cases take shape," Silva said. "New York State is an example that comes to mind. Someone was a contractor; they signed away their rights on the dotted line. They ended their contract and left. The device got wiped and the last photos of a dead relative were destroyed. It found its way into a court room. That's had a chilling effect on this." In addition, in countries such as France and Germany, there are greater protections for an employee's personal electronic devices that make it even harder to implement tough BYOD policies, Silva added. "We've gotten a lot of questions from enterprises about how can they can manage this without locking down the whole device," Silva said. The majority of smartphones used in the workplace now are personally owned devices.


Why Microsoft's ARM-based Windows 10 laptops still have a lot to prove

The new machines will compete alongside Intel-based models in a sector Microsoft calls "always connected" PCs. These are Windows 10 machines intended to bring some of the best features of smartphones to laptops: an all-day battery life and fast, constant LTE cellular connection. "It's all around this idea that a PC should be connected, just like a smartphone," said McGuire. On current Windows 10 PCs, standby mode means the machine is shutdown but Qualcomm promises greater things from standby on the new computers. "With these systems, you're truly connected and you will be syncing data, Cortana will be available and it give you truly instant on," he said. During a demonstration at Computex in Taipei on Wednesday, Qualcomm showed off a Windows 10 ARM development system running on the Snapdragon 835.


Four Vectors Changing The Security Software Landscape: Gartner

The security software market is currently experiencing rapid transformation mainly because of four key developments, according to Gartner. The use of advanced analytics, expanded ecosystems, adoption of software as a service (SaaS) and managed services, and the prospect of punitive regulations are causing enterprises to rethink their security and risk management software requirements and investments. "The overall security market is undergoing a period of disruption due to the rapid transition to cloud-based digital business and technology models that are changing how risk and security functions deliver value in an organization," said Deborah Kish, principal research analyst at Gartner. "At the same time, the threat landscape and rise in the number of high-impact security incidents are also creating demand for security technologies and innovations that deliver greater effectiveness."


Why employees hate virtual collaboration and what to do about it

Despite the constant influx of new tools, most workplace communication still occurs through face-to-face conversations, phone calls, and email. Admittedly, some newer options have gained traction. For example, 61% of survey respondents reported using work instant messaging daily, and 53% said they participate in virtual meetings more than once a week. However, these media simply replicate the private, one-on-one and small-group conversations enabled by previous technologies while doing little to bring new voices into mix, increase traceability, and facilitate knowledge reuse. To improve the efficiency and quality of workplace collaboration, employees need to transition at least some of the interactions taking place privately in meetings, phone calls, and email to open forums such as communities of practice, enterprise social networks, and collaboration spaces.


Hackers Hide Cyberattacks in Social Media Posts

“Most people don’t think twice when they are posting on social media. They don’t think about people using the information against them maliciously,” Mr. Kaplan said. “They also don’t assume people on their network might be attackers.” According to a 2016 report by Verizon, roughly 30 percent of spear phishing emails are opened by their targets. But research published by the cybersecurity firm ZeroFOX showed that 66 percent of spear phishing messages sent through social media sites were opened by their intended victims. In the Defense Department attack, for example, 7,000 employees took the first step toward being compromised by clicking on a link, said Evan Blair, a co-founder of ZeroFOX. “The attacks are so much more successful because they use your personal timeline and the content you engaged with to target the message to you,” Mr. Blair said.



Quote for the day:


"You will face your greatest opposition when you are closest to your biggest miracle." -- Shannon L. Alder


Daily Tech Digest - May 30, 2017

8 Most Overlooked Security Threats

There's always a new security threat to worry about, whether it's from the latest breach headline or a cyberattack on your business. It's almost impossible to keep track of every factor putting an organization at risk. There is no avoiding the reality that cybercrime, or cyber espionage, will hit. Attackers are employing methods across the spectrum to deliver malware and steal credentials, from old vectors like malvertising, to new ones like appliances connected to the Internet of Things. Every security expert has a different perspective on which threats should be top of mind, and which ones businesses aren't paying enough attention to. Here a few security pros weigh in on the threats they thing are flying under the enterprise security radar.


Being a ‘Digital Bank’ Goes Beyond a Pretty App

Becoming a digital bank can transform a traditional banking organization from being a reactive product provider to being a proactive financial advisor. By developing a digital stack that operates in real-time, with the contextual engagement and the interests of the customer placed at the forefront, financial organizations can combine home grown services with those offered by outside organizations. By definition, digital banks will be more agile and instantly responsive, increasing revenue opportunities and decreasing costs. According to the Temenos report, Digital Banking, “A digital bank offers customers contextualized, seamless experiences that transform the customer journey. And becoming a digital bank means delivering a compelling and relevant customer experience through an open, integrated and flexible architecture.” In short, Temenos believes a digital banking solution provides:


11 Interesting Examples of How to Use Chatbots

Millions of people already get it. They're using chatbots to contact retailers, get recommendations, complete purchases, and much more. Adoption of chatbots is increasing. People are discovering the benefits of chatbots. All of this is good news for entrepreneurs and businesses because pretty much any website or app can be turned into a bot. Now is the perfect time to hop on the bandwagon. Even I've jumped on the bandwagon with my new startup. ... Many consumers know they want to buy some shoes, but might not have a particular item in mind. You can use chatbots to offer product suggestions based on what they want (color, style, brand, etc.) It's not just shoes. You can replace "shoes" with any other item. It could be clothes, groceries, flowers, a book, or a movie. Basically, any product you can think of. For example, tell H&M's Kik chatbot about a piece of clothing you have and they'll build an outfit for you.


'Proof of value' -- not proof of concept -- key to RPA technology

“RPA is a transformational tool, not a desktop macro builder. Look for pain points within the organization and identify what needs to change. This isn’t just a cost play; rather, it has to do with mitigating the challenges of growing in a linear fashion by increasing the number of full-time employees. For some, it is about improving speed and quality to differentiate in the market. Others are attracted by the insight and analytics that come from consolidating all transactional data into one database for real-time visibility.” ... “The next step is to analyze the business and map processes at keystroke level. To do so, use experts in RPA, as it is important to drill into the areas where configuration will be complex. Standard operating procedures, training materials and system manuals will be great inputs, but not enough by themselves.”


Philipp Jovanovic on NORX, IoT Security and Blockchain

Although the situation seems to be grim, there is hope nonetheless. Just to give an example: a while ago IKEA released its Trådfri smart lighting platform which apparently has a fairly decent security architecture. At a first glance it might come as a surprise that of all companies, it is IKEA that points the way of the importance to invest in good security design for IoT products. On a second thought, however, IKEA's decision becomes easily comprehensible: by not squeezing the last bit of revenue out of their IoT product, IKEA reduces the risk of their devices being hacked on a large scale which could force the company to do a costly product recall and might damage its image substantially. Thanks to this decision, the world is likely spared from experiencing a Trådfri-botnet with a gazillion IoT light bulbs against which the Mirai-botnet would be a bad joke.


10 best practices for master data management

Unfortunately, a common mistake that some organizations make is to treat MDM as a technical issue. While this approach helps an organization quick start its MDM initiative, it leaves most critical problems unattended, and dilutes the overall benefits of the MDM program. A technology-driven approach decreases business confidence in MDM, making it difficult to sustain the solution, thus causing the premature death of the global MDM program. However, a technical solution well integrated with business processes, along with a strong governance program, is the right way to start an MDM program. A business driven approach can ensure the success of MDM program and enable a path for further expansion.


Is DDoS Protection Right For You?

What is the actual cost to your business during a DDoS attack? Is it services deferred or services diverted? That is, are you in a market position where people will come back later to avail of the services? Or will they simply go elsewhere? If you’re in the former position, the “cost” of a DDoS attack is significantly lower than that of the latter case. Be wary of the “reputational harm” hype. It is hard to quantify. Take some time to understand what it means to you. For instance, if you’re a gaming site and you’re hit by DDoS attacks, it could mean the end of your business. If you’re a niche site that caters to ham radio operators in Austria, perhaps not so much. Be cautious of vendors who say the correct answer is to expand your DDoS protection services. That may not be the right answer. Determined attackers clearly have the ability to point more IoT devices at you than most reasonable DDoS protection services can handle.


Securing IoT Devices Requires a Change in Thinking

For the present, and for many years to come, detection and mitigation will remain essential, but they are costly. The more attack surfaces a device has, the more expensive it is to manage. Operating systems such as Windows and Linux offer a large attack surface to the opposition because their function is to be as flexible as possible. As a result, even the Linux kernel contains 15.9 million lines of code (v3.6). Almost all of it is written in C or C++ and, thus, is vulnerable to buffer overrun attacks. We are currently at the point of maximum IoT vulnerability. Five years ago, most embedded systems controllers were built around 8- or 16-bit CPUs, which rarely offered more than a few thousand bytes of RAM. Systems had to be simple, as programmers were forced to make every byte count. Today, a 32-bit CPU with a couple of gigabytes of memory costs only a few pennies more.


Internet of Things: Complexity breeds risk

First, not all organizations have the capability to fully test IoT devices. The onus is on the manufacturer to keep them secure. With devices having highly customized firmware, updates are difficult and often tied to the firmware. Therefore, service level agreements on security patching have to undergo strict scrutiny before committing your organizations to these devices. If the manufacturer abandons you, you have lost your investment. Second, this also means that there is a need to treat IoT devices the same way we treat personal devices in the enterprise: with caution and away from corporate networks. Deployment of IoT devices necessitate that they are segmented from the corporate network. Additionally, manufacturers need to talk about implementing security by design to all IoT devices as well as the creation of security standards against which we can measure IoT devices.


How CISCO Combats Fast-Maturing Cybercrime Networks

We will see others adapting and modifying the technique to bring new threats. That’s really part of what I think has changed in doing cybersecurity. Five to 10 years ago, we had people wanting to make a statement and disrupting services. We had hobbyist doing things to see what they could do, and we had nation state actors. Today, while they still exist, I think most organizations can defend from the hobbyist and many of the people wanting to make a statement. It’s very hard to protect yourself from a nation state as an individual company. The cybercrime network has matured and developed very quickly. Much like normal companies that are figuring out how to deliver their services at scale using web technologies, the cybercriminals around the world are doing the same thing, and they’ve built a supply chain that’s very effective.



Quote for the day:


"Most people live with pleasant illusions, but leaders must deal with hard realities." -- Orrin Woodward


Daily Tech Digest - May 29, 2017

Google will soon find you a job as the tech giant refines its mastery over AI

Not to be confused with reaching and including people at grassroots level, here we are talking about Google being inclusive of first world citizens and Apple fans. The most compelling use case of AI to make an average users' life better is through Google Assistant. The chatty, natural language assistant that aims to help us in real world was launched during io16 for Google Home and subsequently introduced for Pixel phones, it is now available for iPhone. On both Android and iPhone, Google Assistant will now work in French, German, Brazilian Portuguese and Japanese. And coming soon are Italian, Spanish and Korean But that's not all. Google just opened the Assistant SDK for developers and OEM of any apps and electronic appliances to be Google Assistant compatible.


Cybersecurity RoI: Still a Tough Sell

At some point, panelists agreed, cyber insurance providers will get better at estimating the value of breaches. But that component of the industry is still in its infancy compared to decades covering property and vehicles. “They just don't have the data yet,” Stanley said. The reality, said Jim Cupps, senior director at Liberty Mutual, is that there is a long way to go. “I don’t think interactions between boards and CISOs have become a value proposition,” he said. That, Porter said, will require more education. “Cybersecurity is viewed as the CISO’s problem,” he said. “But ultimately it’s an enterprise problem. My job is to educate them about that.” Stanley agreed that is, “a difficult task, but it is getting better. Boards are learning. They need to know, and as it becomes more of a regulatory issue, they want to know,” he said. “Wise CISOs can educate the board and then get the budget they need to do the job.”


How Google’s cloud is ushering in a new era of SQL databases

The market for these new flavors of databases is still emerging. ... A handful of other newer companies offer NewSQL databases, including NuoDB, H-Store, Clusterix, VoltDB, MemSQL and others. Amazon Web Services offers Amazon Aurora, which supports MySQL and PostreSQL, which some consider NewSQL. One of the advantages of NewSQL databases is they support applications that run on traditional SQL databases, such as Oracle’s line of databases. Aslett and Pavlo point out, however that workloads running on those traditional databases are typically core applications that enterprises may be more reluctant to move to new databases unless there is a strong need to do so. NoSQL databases, on the other hand, excel at scalability and are typically used in new applications revolving around social, mobile and Internet of Things applications.


4 of the biggest IT project stressors and how to fix them

Take ample time to understand exactly what technologies or other tools are needed to help you to do your job better. Identify any time and cost savings or how it will improve the quality of any deliverables. If you don't know this answer, it's almost impossible to get management to approve it. Be prepared to outline how any expenditure is an investment in the future of an IT project. Companies seldom want to spend money on technologies or resources unless they can see a fairly quick recapture of costs or justify it through an ongoing need. This becomes particularly important for smaller companies with limited funds or larger organizations that have already invested large capital into existing technologies.


Why Cloud Security Needs Visibility-As-A-Service?

Public clouds need to handle hyperscale deployments, resource pooling, and continuous configuration changes based on demand, which brings unique challenges to ensuring visibility, security, and compliance. In February of this year, we surveyed over 220 senior IT staff at enterprise organizations on their cloud security concerns, and 76% of respondents were ‘very concerned’ or ‘concerned’ about security in their cloud environment. The top security concern with cloud adoption was ‘loss of control over network data’  and being able to achieve full visibility across their networks. The limitation is in traditional visibility architectures. They cannot deliver the agility and insight required to ensure proper operation and security of cloud workloads. On-premises solutions depend on physical hardware, taps, and the fact that the organization’s network deployment is unlikely to grow or shrink dramatically overnight.


How Can CIOs Take Control of App Sprawl?

From an IT perspective, this results in higher costs, more time required to administer systems, security and regulatory challenges, and, in the end, diminished productivity. "It's not unusual for an organization to wind up spending double, triple or even four times as much as necessary because people are using applications that already exist within the enterprise," Evolutionary IT's Guarino reports. "Too often, departments and employees make independent decisions outside the scope of IT. Many of these applications also introduce regulatory compliance and security concerns." Mobile apps add to the challenge. It's not uncommon for different divisions, groups and departments to develop mobile apps separately, or to offer different consumer-facing mobile apps for different customer segments. Such a scattershot approach can confuse users, diffuse an enterprise strategy, and lead to highly inefficient and often redundant development practices.


No-code/low-code project management best practices

When an engineering team begins work on a new feature, a set of guidelines is followed to ensure that all product changes have been made safely, and to the standard set forth by the organization. No-code/low-code products are no different. Things like quality assurance, version management, and efficiency should all be addressed and managed continuously. No-code/low-code or not, one of the most important parts of product development is establishing documented, repeatable processes that the whole team can follow. This can be doubly important when working with non-development staff who might have less experience with the product development lifecycle. Working directly with the product development team will help non-technical staff build effective applications and services in a timely and efficient manner.


Here's how MobiKwik hopes to survive the death of mobile wallets

“MobiKwik’s opportunity might lie in its relatively focused and cautious approach in building a payments business,” says Shubhankar Bhattacharya, venture partner at Kae Capital. “While Paytm has chosen to enter the banking space, MobiKwik might benefit from adding complements to its core offering, while staying true to its identity as a payments solution.” ... Doesn’t the new business model look similar to that of a slew of fintech startups that are already into lending and other financial services? Singh says there are enough differentiations. Take, for instance, the decision not to convert into a marketplace, where one can get a comparison of different kinds of financial products and lending rates. While there are different models in the fintech ecosystem, what would help MobiKwik is forging a stronger relationship with the customer, he adds.


Caught In The Breach - What To Do First

James Lugabihl, director, execution assurance at ADP, agreed that the key to limiting the damage of a breach is, “how quickly can you respond and stop it.” He said it is also crucial not to react without complete information. “It’s almost like a disaster scenario you see on the news,” he said. “It takes a lot of patience not to react too quickly. A lot of my information may be incomplete, and it’s important to get everybody staged. It isn’t a sprint, it’s a marathon. You need time to recognize data so you’re not reacting to information that’s incomplete.” With the right information, he said, it is possible to “track and eradicate” malicious intruders, plus see what their intentions were. Both panelists said legal notification requirements can vary by country, or even by state, and if it is not a mandate, notifying law enforcement is something they will sometimes try to avoid.


Calculating the Operations Cost of Software You Haven't Developed

We need to move to a model where projects request different budgets for different phases of their lifecycle, experiment vs exploit etc. Using microservices and the approach I discuss allows teams to use empirical data to estimate the operations costs for this budget. The "Sunk cost fallacy" does exist and can be more complicated that just misunderstanding. There needs to be a no blame culture so people are happy to raise "sunk cost" issues without recrimination, otherwise politics will prevent them for being surfaced. ... Although the approach is called DevOps, I feel if anything it is finally aligning the goals of the business with IT. Maybe it should be called BusIt! You honestly can't say that either organisational or technological change is more important than the other.



Quote for the day:


"Success is finding satisfaction in giving a little more than you take." -- Christopher Reeve


Daily Tech Digest - May 28, 2017

Biometrics: Authentication Silver Bullet or Skeleton Key?

"We do need to understand how we're going to use them and what the problems are," he says. "We need to mitigate against those problems, the same as we'd do with any other system." Biometric systems become stronger in context, and that's where big data can help. Location data or knowing a pattern of when someone uses biometric authentication can help the systems make a better judgment on whether to open access. "You need to make sure the biometric system you are using isn't a single factor because it's essentially useless," Jamieson says. "It needs to be coupled with something else." That risk can be judged according to the situation. In some cases, a partial fingerprint alone may be fine. But for other transactions with higher risks, the authentication can be escalated, requiring or calling on other information.


A Roadmap to the Programmable World

Today's development methods, languages, and tools-or at least those that are in widespread use-are poorly suited to the emergence of millions of programmable things in our surroundings. We highlight issues and technical challenges that deserve deeper study beyond those IoT topics that receive the most attention today. Because this article is forwardlooking, our roadmap is somewhat subjective. Our viewpoints stem from our own projects and collaborations in the IoT domain2-5, as well as from our experience predicting and partaking in mobile and web computing's evolution over the past 20 years. For instance, the emergence of virtual machines in mobile phones in the late 1990s wasn't a dramatic technical achievement per se. However, it opened up mobile phones for the vast masses of developers, creating today's multibillion-dollar mobile-app industry. 


How Women Will Disrupt Cybersecurity

The element of emotional connection in facilitating a strong security culture will be key going forward as organizations shift their focus from technologies to internal employees in an effort to combat the massive amounts of breaches taking place on a daily basis. And as highlighted in the Harvard Business Review, “the higher up you go in an organization, the less important your technical skills become and the more your interpersonal skills matter”. So what is the solution for creating the norm of emotional connectedness in the workplace and enhancing the security culture? ... With the research clearly demonstrating that emotional connection is essential in fostering a strong security culture, and women outperforming men in the measurement of emotional intelligence, we can conclude that the creation of more strategic security communication roles in leadership positions will enhance organizational security culture, create a platform for women to excel in the space


We Still Know Very Little About How AI Thinks

It is important to understand how these systems work, as they are already being applied to industries including medicine, cars, finance, and recruitment: areas that have fundamental impacts on our lives. To give this massive power to something we don’t understand could be a foolhardy exercise in trust. This is, of course, providing that the AI is honest, and does not suffer from the lapses in truth and perception that humans do. At the heart of the problem with trying to understand the machines is a tension. If we could predict them perfectly, it would rob AI of the autonomous intelligence that characterizes it. We must remember that we don’t know how humans make these decisions either; consciousness remains a mystery, and the world remains an interesting place because of it.


How chatbots can settle an insurance claim in 3 seconds

As chatbots become more commonplace, they are making their way into behind-the-scenes claims processes as well. Tableau’s prototype chat software, Eviza, has a voice interface so users can drill into its signature data visualizations simply by asking questions out loud. Clara Analytics offers askClara, a chatbot the company bills as a “24/7 personal assistant to the claims handler.” Like customer-facing chatbots, it can answer routine questions about a given set of claims. Insurance companies are sitting on a trove of the one thing AI requires to be successful — data. And AI technologies like machine learning have the ability to make that data actionable. Machine learning can look at data in a number of different ways. It can rank information, putting what it thinks you are looking for at the top of a list; classify information like images; make recommendations; and associate something with a numerical value. 


Are data lakes the answer to privacy regulations, competition in healthcare?

“Arguably, for the first time, we finally have the deep, rich, clinical data that we’ve needed to do analytics with, [and] big data processing power, the Internet of Things and all of the rich sources of new data that we can learn new things about how to treat patients better. And then the final component is … the financial incentives are finally aligned,” Cramer stated. What he finds most exciting about all the changes is by having the ability to analyze data it enables organizations and practitioners to measure the quality and outcomes of their work by removing inefficiencies that were prevalent in the past and providing value. With all the conversations over the years on theCUBE, when it comes to digital transformation there is a pattern emerging, according to Furrier: how to run an organization, how to take care of the users and giving the customer or patient a great experience.


Information Architecture. Basics for Designers.

Information architecture aims at organizing content so that users would easily adjust to the functionality of the product and could find everything they need without big effort. The content structure depends on various factors. First of all, IA experts consider the specifics of the target audience needs because IA puts user satisfaction as a priority. Also, the structure depends on the type of the product and the offers companies have. For example, if we compare a retail website and a blog, we’ll see two absolutely different structures both efficient for accomplishing certain objectives. Information architecture has become the fundamental study in many spheres including design and software development.


Five DevOps principles to apply to enterprise architecture

At the most basic level, DevOps means that software developers and IT operations engineers (also known as system administrators) work together on software production. By facilitating collaboration between the programmers who write software and the administrators who manage it in production, implementing strong DevOps principles eliminates communication barriers that could lead to software design mishaps, bugs going unnoticed until they are too costly to fix and other software delivery issues. An important practice that DevOps promotes is continuous delivery of software. Under the continuous delivery model, small changes to a software program are designed, written, tested and placed into production at a constant pace. For continuous delivery to work, however, all members of the organization who play a role in software production need to be in constant communication.


MeitY Requires Government Departments to Have a CISO

Some security experts, however, say there aren't enough qualified officials to take over the role of CISO in each department. "A senior person in government doesn't necessarily guarantee the right skills required for a CISO," says J Prasanna, director at the Cyber Security & Privacy Foundation Pte Ltd. "At the senior level, you may have someone who commands respect, but he should also understand security process." Given the criticality of the role, government departments should consider hiring outside experts to serve as CISO, rather than selecting someone already on the staff, as MeitY is requiring, says Sivakumar Krishnan, former head of IT at M Power Microfinance. Shashidhar adds that each department "should appoint industry experts and empower them as CISOs in the short term. ..."


Introducing Socks Shop: A Cloud Native Reference Application

This project began as a small demo application for DockerCon to show off some new services developed by Weave Works. As a company which focuses on building products and tooling for microservice and container based applications, they needed an actual application on which to demo their services. In two weeks, we built an “aggressively microserviced” application, throwing in a variety of technologies, programming languages, and datastores. After its initial run, we saw benefits in keeping the project alive. It turned out to be quite useful, both as a testbed for container and microservice focused tools, as well as reference application for what a Cloud Native system should look like. Over the course of the next few months, we worked to convert this demo application to be production ready.



Quote for the day:


"The minute you settle for less than you deserve, you get even less than you settled for." -- Maureen Dowd


Daily Tech Digest - May 27, 2017

Who owns the data from the IoT?

It turns out that data by itself is not protectable under the American intellectual property regime; however, data title rights are similar to the rights afforded by a copyright. Data title includes a bundle of usage rights that allow the titleholder to copy, distribute and create derivative works. Data within a database is like the words and images that compose a copyrighted book. The usage rights and title to the book are separable. The author of the novel retains title to the words and pictures that comprise the novel. The author also owns the ability to authorize a publisher to publish books and distribute them. However, he or she does not control each reader's usage rights of the content once they are accessed by readers. Similarly, an entity that holds title to data or a database holds the associated data ownership rights. If the data set is copied and transmitted elsewhere, the author relinquishes the usage rights.


Russian researchers develop 'quantum-safe' blockchain

Current solutions are not entirely secure as they will eventually be broken as hacking algorithms advance. For example, post-quantum cryptography organizes digital signatures in a unique way that makes it more complex to hack them. However, they are still vulnerable to the development of new algorithms and it is only a matter of time until someone creates a way to hack them. The quantum-safe blockchain developed by the Russian Quantum Center secures the blockchain by combining quantum key distribution (QKD) with post-quantum cryptography so that it is essentially un-hackable. The technology creates special blocks which are signed by quantum keys rather than the traditional digital signatures. These quantum keys are generated by a QKD network, which guarantees the privacy of the key using the laws of physics.


5 lessons from IoT leaders creating sustainable, smart cities

Infrastructure, Acosta said, "is what cities do. Cities need to start with their infrastructure to make sure they're ready to create alternative energy paths." The role of city officials, she said, is "making sure that their communities are prepared for this crazy scary new world we are entering. You have to create safe ways for them to be actually be able to engage. Not only by saving money, but we have to create a world where they are 'prosumers' not just consumers. If we can create a world where energy is created by an individual and sold on the market, which we're doing in California by creating the CCA's [Community Choice Aggregation], which are competitors to our incumbent utilities, we believe we can accelerate that world." Jain said there are three essential components to the infrastructure of a city that can survive throughout the centuries, and that is having the ability to provide emergency services, essential services and entertainment.


Fintech's decentralized nature challenges regulators as industry transforms banking

Banks' responses to fintech have not been uniform, however, in terms of how much investment they were willing to make and the level of integration they want between the new digital activities and their traditional operations. Some banks have adopted a "low integration" strategy, that is, an arms-length approach where they rely on contracting with fintech companies or investing in them. Others have taken a bolder "high integration" approach through partnership arrangements –- such as the small-business lending deal between JPMorgan Chase and OnDeck -- and integrating new technologies into their loan-application and decision-making processes. Less common among banks are those that choose to develop their own systems. This typically involves a more significant investment to automate underwriting processes, synchronize bank proprietary account data with new algorithms, and create a more customer-friendly design.


Machine Learning Techniques for Predictive Maintenance

Predictive maintenance avoids both the extremes and maximizes the use of its resources. Predictive maintenance will detect the anomalies and failure patterns and provide early warnings. These warnings can enable efficient maintenance of those components. In this article we will explore how we can build a machine learning model to do predictive maintenance. The next section discusses machine learning techniques, while the following discusses a NASA data set that we will use as an example. Sections four and five discuss how to train the machine learning model. The Section “Running the Model with WSO2 CEP” covers how to use the model with real world data streams. To do predictive maintenance, first we add sensors to the system that will monitor and collect data about its operations. Data for predictive maintenance is time series data.


The Importance of Project Closeout and Review in Project Management.

The most direct reason that Project Closeout phase is neglected is lack of resources, time and budget. Even though most of project-based organizations have a review process formally planned, most of the times “given the pressure of work, project team member found themselves being assigned to new projects as soon as a current project is completed” (Newell, 2004). Moreover, the senior management often considers the cost of project closeout unnecessary. Sowards (2005) implies this added cost as an effort “in planning, holding and documenting effective post project reviews”. He draws a parallel between reviews and investments because both require a start-up expenditure but they can also pay dividends in the future. Human nature avoids accountability for serious defects. Therefore, members of project teams and especially the project manager who has the overall responsibility, will unsurprisingly avoid such a critique of their work if they can.


Why we need to create AI that thinks in ways that we can’t even imagine

Humans have no real definition of our own intelligence, in part because we didn’t need one. But one thing we’ve learned is that, even with the most powerful minds, one mind cannot do all mindful things perfectly well. A particular species of mind will be better in certain dimensions, but at a cost of lesser abilities in other dimensions. In the same way, the smartness that guides a self-driving truck will be a different species than the one that evaluates mortgages. The superbrain that predicts the weather accurately will be in a completely different kingdom of mind from the intelligence woven into your clothes. In my list I include only those kinds of minds that we might consider superior to us, and I’ve omitted the thousands of species of mild machine smartness, like the brains in a calculator, that will cognify the bulk of the Internet of Things.


A Data Engineer's Guide To Non-Traditional Data Storages

For data engineers, the most important aspects of data storages are how they index, shard, and aggregate data. To compare these technologies, we’ll examine how they index, shard, and aggregate data. Each data indexing strategy improves certain queries while hindering others. Knowing which queries are used most often can influence which data store to adopt. Sharding, a methodology by which databases divide its data into chunks, determines how the infrastructure will grow as more data is ingested. Choosing one that matches our growth plan and budget is critical. Finally, these technologies each aggregate its data very differently. When we are dealing with gigabytes and terabytes of data, the wrong aggregation strategy can limit the types and performances of reports we can generate. As data engineers, we must consider all three aspects when evaluating different data storages.


Descriptive Statistics Key Terms, Explained

Statistics, though a central set of tools for data science, are often overlooked in favor of more solidly technical skills like programming. Even machine learning learning algorithms, with their reliance on mathematical concepts such as algebra and calculus -- not to mention statistics! -- are often treated at a higher level than is required to appreciate the underlying math, leading, perhaps, to "data scientists" who lack a fundamental understanding of one of the key aspects of their profession. This post won't resolve the discrepancy between knowing and not knowing the absolute basics of statistics. However, if you are unable to fully understand the basic descriptive statistics terminology included herein, you are definitely lacking foundational knowledge that is needed to build a whole series of much more robust and useful professional concepts on top of.


Enterprises Have Extremely High Hopes For Blockchain Technology

Many of the surveyed executives are counting on blockchain to deliver competitive advantage -- along with developing a platform approach to innovation. As the study's authors put it: "Blockchains aren’t just new; they’re likely to radically change how organizations operate, generate revenues and respond to customers, partners and competitors alike. The new business models that result can evolve in unexpected ways." As anyone who has delved into such adventures knows, creating new platform business models is not for the faint of heart. In this survey, six in 10 executives admit they aren’t yet ready to build blockchain platforms that connect customers and partners across an ecosystem. The IBM authors suggest the new modes of disruptive thinking that can help realize the value of blockchain:



Quote for the day:


"Management is about arranging and telling. Leadership is about nurturing and enhancing." -- Tom Peters