Daily Tech Digest - December 21, 2017

AI Bot
In essence, AI has made it possible for customer service teams to focus more squarely on addressing and resolving customer needs through the automation of information gathering and other simple processes. ... The time savings alone means they can help more customers get the answers they need. That’s the ultimate end goal. Here’s something else to think about – and this goes against the beliefs of skeptics suggesting that AI will eventually replace humans altogether (which is just not reality). As intelligent as machine learning can be, it serves a very specific purpose today: to make humans more effective. AI is not and, in my humble opinion, will never be a full replacement for humans within a brand’s business, customer service operations, or otherwise. There are just certain things that humans can do that technology can’t. For all the efficiencies that AI and bots bring to the digital customer experience, there’s nothing that can ever replace a real “human touch,” especially in high-stress or complex situations.


 Technical Capacity Is The Biggest Challenge for Building Smart Cities


Elaborating further on the technology side of the whole story of Smart Cities, Kunal Kumar, Commissioner, Pune Municipal Corporation said, “The more advanced technologies like AI and machine learning are the tech capabilities which need to be enhanced. I believe that we should urgently come up with a Smart Cities academy where engineers and officers are trained to think and work on completely different paradigms.”  Kumar goes on to include that Innovation hubs are also required in every state and city where local entrepreneurs, startups and other industry partners get to come and experience what is required by these cities. "innovation hubs for entrepreneurs and industry partners can help them start rolling out their research and development accordingly. It is very important that we do this virtually as well as it is already performed on physical platforms."


Six Cybersecurity Predictions for The Year Ahead


In the year ahead, we’ll continue to see a distinct lack of in-house cloud expertise resulting in security troubles for many organizations. While cloud providers offer adequately secure platforms, users still have a responsibility to ensure they are doing their part toward securing their data in the cloud. This includes monitoring for security threats within the cloud environment, and equally ensuring cloud environments are properly configured. But, many IT and security professionals aren’t aware of their role in cloud security, or are aware but don’t know the best way to execute on their responsibilities. There have been countless cases in 2017 whereby enterprises have left private information publicly exposed, which has resulted in huge breaches. While most resulted from a failure to properly secure Amazon Web Services buckets, this is not the only cloud vulnerability. For example, many people also found that their information was shared publicly via Microsoft’s docs.com service.


Fintech Disruptors Warn: ‘You Can’t Use Past Solutions to Fix Future Problems’

The biggest challenge may be “how do we avoid using past solutions to solve future problems?” So, when we designed our solution, we really didn’t pull in any lenders. We didn’t want their perspective, because we knew we had to innovate something that wasn’t in the marketplace, and so we had to set ourselves up for success and just say “let’s not create any barriers or boundaries on how we want to deliver this.” We just had to understand the market need, and what was being delivered out there today, and make sure whatever we did surpassed that. ... We are a cloud solution provider, and that was somewhat challenging at the beginning – working with FIs that were not necessarily comfortable with the cloud. From the early stages, we decided to take on security and have been PCI certified for seven years. I think the industry has seen a shift, where financial institutions are now recognizing the benefits in working with cloud providers.


Frugal Innovation: Doing More With Less


Frugal innovation is at its core a mindset and hence can be, and should be, applied to each stage and various practices in the SDLC. In my firm, The Cobalt Partners, we work primarily in Africa, with clients who are often doing work where their customers earn and live on less than $1 a day, or where our clients simply have very limited budgets. We ask and answer the hard questions to develop a skinny form of the SDLC we’ve typically used in the developed world. How do we do this without pair-programming (!) since human resources are one of the most expensive? How do we reuse open source components? How do we effectively understand the context … is our design thinking phase well-executed? Who has to maintain this software afterwards? In fact, we provide hosting services in addition to software engineering services for over half our clients since many of our clients do not have staff who can provide or adequately advise them on local and cost-effective hosting solutions.


Financial Markets Regulatory Outlook 2018

Our first theme examines industry’s efforts to “get over the line” in terms of compliance. Our second theme is Brexit, and we set out what industry will need to do against a backdrop of political and regulatory uncertainty. Third, we look at the business model challenges posed by the macro-economic environment, competition initiatives, and regulatory change. Fourth, we examine whether and how industry efforts to utilise customer data in novel ways can be reconciled with new data protection rules and supervisory expectations of the fair treatment of customers. Fifth, we observe significantly higher supervisory expectations and approaches regarding the treatment of vulnerable customers. Sixth, we consider the ever-present threat posed by cyber attacks, and the increasing supervisory emphasis on cyber resilience. Last, but not least, we assess the evolving landscape for model risk management in an environment in which a large proportion of assets in the financial system


Ransomware of IoT will become a new security nightmare in 2018

Ransomware of IoT will become a new security nightmare in 2018
The impact of ransomware on smart devices extends well beyond a criminal simply preventing a user from being able to access the data on their devices – it could also interfere with the functionality of the device itself, a situation that can have real, and potentially dangerous, physical implications. For example, ransomware that infects a smart thermostat could potentially turn up the heating to full in the middle of summer, or turn it off completely in the winter unless a ransom is paid. While this might be only an annoyance for most people, it could prove harmful to some vulnerable victims. An infected smart lock could lock people in or out of their houses, or remain permanently open, allowing full access to a victim’s home and belongings. Infection of smart fridges, smart bulbs, or any number of smart devices in a home, could also cause disruption.


Why Cisco, McAfee Say Security Vendors Must Share Threat Intel to Beat the Baddies

Why Cisco, McAfee Say Security Vendors Must Share Threat Intel to Beat the Baddies
It differentiates the group from traditional Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations (ISAOs), said CTA President Michael Daniel. Prior to joining the CTA he served as special assistant to President Obama and cybersecurity coordinator on the National Security Council. Traditional threat sharing groups usually have low participation rates. They also don’t share information on a real-time basis or provide context. The CTA, on the other hand, requires members to submit a daily minimum. It uses a scoring algorithm to reward quantity, quality, and speed of submission. “We say you have to submit on average 10,000 points worth of intelligence per day,” Daniel said. “We weigh context and timeliness very highly. Don’t just tell me this is a bad binary, tell me what malware family it’s part of, what stage in the kill chain you think this belongs to, do you think this is a criminal or a nation state?”


Juniper brings AI bots to intent-based networks

Juniper brings AI bots to intent-based networks
It’s fair to say that all the great advancements the industry has seen in networking over the past few years — which includes the shift to software, increased adoption of white boxes, new operating systems, and the shift to software models — have enabled us to do so much more with our networks. But they have also increased the complexity of running a network. The shift to the cloud has also raised the importance of the network, as we are now literally connecting everything to the network. Businesses have had to hire more people with new skill sets just to maintain the status quo. Automation is something that network professionals seem more open to today than they did just a few years ago, but what to automate and how remains somewhat of a mystery. At the event, Juniper provided a data point from its research that found 43 percent of respondents said a lack of internal education and skills are preventing the use of network automation.


Security Worries? Let Policies Automate the Right Thing

In fact, most security breaches and system failures are the result of people not operating systems correctly. They forget to do something or give themselves permission to do an action, then leave that permission open so that bad actors can take advantage of it. These missteps could be avoided by a security approach that automatically directs, guides, or encourages system operators to do the right thing or blocks them from doing bad things. It is an enlightened security leader who prioritizes and budgets for this kind of security policy enforcement; without active and automated enforcement of policy, the breaches keep coming, costs keep rising, and heads keep rolling. To draw an analogy from the parenting world, the dominant security model today is the equivalent of raising kids only by punishing them when they do bad. A more effective approach is to encourage kids when they do the right thing — thereby building a decision-making framework in their frontal cortex that will override bad behavior. 



Quote for the day:


"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." -- Marcus Aurelius


Daily Tech Digest - December 20, 2017

With the price of virtual currency bitcoin hitting new highs every other day and money raised from “initial coin offerings” for new cryptocurrency projects surpassing that of early-stage venture funding, venture investors are scrambling to develop a cryptocurrency strategy. Most firms can’t—or won’t—buy digital currency like bitcoin directly. But they’re high on the potential value of the underlying blockchain technology, and finding creative ways to pour money into the sector. David Pakman, a partner at Venrock, says he is exploring investments in apps that will run on the nascent crypto networks, much as smartphone apps run on either iOS or Android. His firm is also seeking investment opportunities in services around the cryptocurrency ecosystem, including institutional custody for cryptocurrencies, security, app distribution, and blockchain-based distributed file storage.


Convergence of Big Data, IoT And Cloud Computing For Better Future


Demand for big data is calling for the adoption of both IoT and cloud platforms. With IoT, the amount of big data will obviously increase. The adoption of IoT and big data compels a move towards cloud technology. According to IDC, “Within the next five years, more than 90 percent of all Internet of Things data will be hosted on service provider platforms as cloud computing reduces the complexity of supporting the Internet of Things ‘data blending.’” So, a company looking to transform the IoT data and utilize its potential first needs to fully embrace cloud-based systems. The number of IoT devices is expected to grow to 20 billion by 2020 whereas the big data industry is expected to have a worth of US$66.8 billion by 2021. These are the fastest growing sectors in IT and both are very much necessary for any technological innovation.


Do You Really Have Big Data, Or Just Too Much Data?

(Image: Peter Howell/iStockphoto)
There is more data available to organizations today than ever before. In 2015 alone, customers, employees, and other users created about 7.9 zettabytes of data globally -- and that number is expected to reach 35 zettabytes in 2020. The type of information companies are collecting is also multiplying -- from traditional sources such as customer mailing addresses and phone numbers to more advanced demographics, web histories, shopping preferences, and even biometric data. Advances in technology, computer power, and analytics mean companies can collect and process data in almost real-time. This may lead executives to believe that the more data they have, the greater their advantage. However, collecting a virtually unlimited amount of data can create a serious threat for organizations, because the amount collected often outstrips the ability to protect it. ... If a company does have a data breach containing certain types of sensitive personal information, such as social security numbers or health records, it can trigger additional burdensome legal duties and invite increased regulatory scrutiny, not to mention potential reputational damage.


CPG Industry Levels Playing Field with Power of One

Figure 1: "Power of One" to Understand and Monetize Individual Customer Insights
Digital Twins is a concept that exploits the “Power of One.” Picked by Gartner as one of the top 10 strategic technology trends in 2018, Digital Twins couples virtual and physical worlds to facilitate analysis of data and monitoring of systems in order to avert problems, prevent downtime, develop new opportunities and support planning via simulations But the Digital Twin concept isn’t new. The concept of a digital twin was originally developed by NASA in order to help manage unexpected “situations” that might occur during space travel. NASA grappled with the challenge of designing things that travel so far away, beyond the ability to immediately see, monitor or modify. NASA’s innovation was a Digital Twin of the physical system, a complete digital model that can be used to operate, simulate and analyze an underlying system governed by physics. This Digital Twin concept is being embraced throughout the Industrial Internet of Things (IIOT) world.


IT pros will need a diverse skill set to be employed in 2020

evgenyatamanenkoistock-670117904.jpg
"The ability of an IT professional to work effectively on project teams for many different types of projects and, even better, be able to manage those projects, is already a critical skill and is only going to become more in demand," Peskay said. Some of that management will extend to finding and utilizing outside resources to solve business problems. IT professionals may be tasked with managing in-house personnel, as well as contractors, crowdsource platforms, cloud services, and other external resources. "An IT professional who is both familiar with and can engage successfully with all of these resource types will have a huge advantage in the marketplace," he said. The shifting IT landscape also means that IT professionals will need to acclimate to the ongoing changes. Soft skills such as emotional intelligence and cognitive flexibility will help them adapt to both the marketplace and the constant fluctuations within the industry, said Holly Benson, vice president and organizational transformation consulting expert at Infosys.


The artificial intelligence computing stack

Technology stack
In the past decade, the computational demands of AI put a strain on CPUs, unable to shake off physical limits in clock speed and heat dissipation. Luckily, the computations that AI requires only need linear algebra operations, the same linear algebra you learned about in high school mathematics. It turns out the best hardware for AI speaks linear algebra natively, and graphics processing units (GPUs) are pretty good at that, so we used GPUs to make great strides in AI. While GPUs are good at linear algebra, their lead is being challenged by dozens of Chinese and American companies creating chips designed from the ground up for linear algebra computations. Some call their chips “tensor processing units” (TPUs), others call them “tensor cores.” It is no surprise these products even compete on the word “tensor”: it is a core concept from linear algebra used heavily in AI. All of these companies support running the TensorFlow software library, released by Google in November 2015.


Who's who in the cybersecurity market? The inside scoop for 2018

Who's who in the cybersecurity market? The inside scoop for 2018
Predictions, schmedictions. The media is chock-full of them this time of year. So, we'll spare CSO readers from another look into the crystal ball. Instead here's some reality on how the cybersecurity industry looks as we enter the next calendar year. In a nutshell, big tech goes big cyber in 2018. Just about every major technology brand has advanced their position in cyber during 2017 — via product and service innovation, merger and acquisition activity, or simply reprioritizing the importance of security to its overall mix. Cybersecurity has long been a cottage industry composed of small point product companies, regional and national service providers, and a short list of unicorns ... Recent estimates by Cybersecurity Ventures puts global spending on cybersecurity at $1 trillion cumulatively over the five-year period from 2017 to 2021. The cyber crime epidemic — which is expected to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015 — is fueling the market for cyber defense solutions. 


Leaders who don’t internalize the changes and make them part of the ecosystem will find obstacles at every turn, Siobhan points out. “The minute they try to push it into business, or ask finance for more money, the whole machine comes to a grinding halt,” she explains. “I’m a big fan of asking, ‘What was that internal moment you realized this big digital transformation meant you, as a manager, were also involved?’” As an example she describes the process when she worked with the American Automobile Association (AAA), where the goal was to change the compensation plan for tow truck drivers. Despite having “really smart consultants and lots of data, we had the hardest time, they resisted, people were unhappy.” Eventually, Siobhan took it upon herself to learn how to drive a tow truck to understand just how hard these people’s jobs were. “You’ve got to do the work you’re asking of others.”
always connected pc zoom
Qualcomm executives said they expect Snapdragon PCs will be manufactured by traditional smartphone vendors as well. In some sense, that’s already happened, said Asus chief executive Jerry Shen. “Asus has a history of designing beautiful devices for both the PC and smartphone,” he said. “We are well positioned to bring to life the benefits of LTE.” Terry Myerson, executive vice president of the Windows and Devices Group at Microsoft, recalled how he didn’t plug in a Snapdragon-powered PC for a week. “I’m seamlessly connected wherever I am: at work, commuting, visiting a customer at a hotel, at the airport—I’m always connected,” he said. “It feels like the natural way to work with all of my team, all of my partners.” Given its attendance at the Qualcomm event, Microsoft seems to view always-connected PCs as a sort of target of opportunity: More PCs mean more Windows licenses, and potentially more revenue.


Five mental shifts we must make to achieve security beyond perimeters

There was a time when keeping an eye on your network perimeter was sufficient to catch most threats. Today, that’s not the case. The 2017 Threat Landscape Survey from SANS found that endpoints and end users are now the front line of the battle against online threats. These are the most frequent targets for attackers who want to weasel into your organization’s network. Among the most common threats this past year were phishing and ransomware, both of which can often skirt traditional perimeter-based security solutions like firewalls and antivirus. Zero-day exploits, while less common, are a good example of how the most advanced threats laugh in the face of perimeter-based security. In light of this reality, understanding how the landscape has changed (and how it will continue to change) is the first key to better protecting your organization against the modern threat landscape.



Quote for the day:


Honor bespeaks worth. Confidence begets trust. Service brings satisfaction. Cooperation proves the quality of leadership. -- James Cash Penney


Daily Tech Digest - December 19, 2017

Big changes coming for the application delivery controller market

Big changes ahead for the application delivery controller market
Application delivery controllers (ADCs) have long been a critical piece of infrastructure. They sit between applications and infrastructure and are the only piece of technology that can speak the language of both applications and networks. I have often characterized the ADC as the “Rosetta Stone” of the data center, as it’s the key to being able to translate application speak to the network and vice versa. IT is undergoing a rapid modernization process, and things such as software-defined everything, the cloud, containers and other initiatives are having a profound impact on infrastructure.  To understand how these trends are impacting ADCs, I recently conducted an Application Delivery Controller Survey to get a pulse of IT professionals who work with ADCs. The demographics of the survey were 100 U.S.-based respondents across a variety of industry verticals and company sizes and is an accurate representation of the current opinions of ADCs with respect to IT modernization.



Why incident response is the best cybersecurity ROI

Why incident response is the best cybersecurity ROI
“In the event of a breach, companies that aren’t prepared for an attack and don’t have a well-defined incident response plan and/or budget may end up far outspending those who do,” says Payton. “First, it takes time to assess the issue, plan, find capable people, etc. The more time it takes to respond to an incident, the more room hackers will have to commandeer what they’d like. Second, if companies haven’t clearly defined how they will respond and who will take charge, staff will likely be taken away from their core duties, which in turn costs the company money,” she says. Payton agrees with Microsoft’s assertion that most organizations will suffer a hack. “Candidly, companies can't afford NOT to have an incident response plan in place. The reality we live in is that breaches are more of a 'when' scenario than an 'if,'" she says.


Russia-Based Kaspersky Lab Sues Trump Administration For Banning Its Software

"Kaspersky anti-virus products and solutions provide broad access to files and elevated privileges on the computers on which the software is installed, which can be exploited by malicious cyber actors to compromise those information systems," said the Department of Homeland Security's September statement. "The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies." The DHS's directive gave government agencies 30 days to identify any presence of Kaspersky products, 60 days to develop plans to remove them, and 90 days to execute the plans. President Trump signed the ban into law last week as part of a broad defense policy bill. "There are concerns on record and some that suggest there has been direct collaboration with certain officials from Kaspersky and from the FSB, which is of course the successor to the KGB," Sen. Jean Shaheen, D-N.H., told NPR.


Build Out or Partner in Cybersecurity? The Debate Continues

Partnering
It’s a first pass litmus test that can be used to determine the risks and challenges associated with various business options. MSPs and solution providers should pledge themselves to that process before building out advanced cybersecurity practices. While tech companies can theoretically offer every available tool and provide a comprehensive portfolio of assessments and consulting services, that usually doesn’t make sense. Most channel firms have financial and resource utilization limitations. In other words, they can’t be all things to all people ̶ even in the cybersecurity space. Data and network protection is no longer a matter of installing and updating the right tools. An effective cybersecurity strategy now includes policy and procedure development, comprehensive and periodic network assessments, and advanced testing. Compliance with government regulations and industry standards adds to the complexity, with third-party evaluation requirements and other stipulations.


Next-gen automotive cybersecurity with software-defined perimeter and blockchain


In order to deliver cybersecurity technologies to address these specific questions for connected and autonomous vehicles, a number of factors must be considered, such as scaling globally to a massive number of vehicles, detecting software tampering and malware, support an array of telematics, information and safety applications, enabling precision access control to vehicle software suppliers, and meeting regional safety, privacy and driving regulations.Fortunately, there are two new emerging technologies, software-defined perimeter (SDP) and blockchain, that offer a path forward. SDP enables the provisioning of secure communications between the software process within the vehicle and cloud-hosted applications, while blockchain enables secure messaging. By combining the any-to-any connectivity of the SDP with the scale of the blockchain, an efficient cybersecurity model for connected and autonomous vehicles can be created.


U.S. Accuses North Korea of Mounting WannaCry Cyberattack

The conclusion was not by itself a surprise: The New York Times reported in May that North Korea was the leading suspect in the attack, which encrypted hard drives on hundreds of thousands of computers and demanded the payment of ransom to unlock the data. Later, British officials reported that their forensic evidence and intelligence pointed to Pyongyang, and Mr. Bossert wrote that in recent days, Microsoft and other companies that track major threats have closed pathways that the North’s army of hackers could use for similar breaches. Still, the assertion by the administration, which officials said would be supported at a White House news conference on Tuesday, was notable for three reasons. It came almost three years to the week since President Barack Obama, appearing in the White House press room, accused North Korea’s leadership of mounting a similarly sophisticated cyberattack on Sony Pictures Entertainment.


Disruption as a service: Where the tech industry will pounce in 2018

iot-cloud-to-edge.png
In a plot twist that only a data center hardware vendor could have written, compute, networking and storage gear is going to need more horsepower. Suddenly servers sitting near the edge of Internet of things devices are going to be pretty cool. Why? The cloud is critical to the Internet of things, but it's costly to shuttle data back and forth when analytics is needed on the fly. Dell Technologies, Hewlett-Packard Enterprise and other vendors are aligning to this IoT to the edge theme. ... "Data will be at the core at what we do. Most of the U.S. is in our database," said Hofmann. Indeed, Home Depot is modeling more than 1 trillion data points a week. Some of this data is transactional and a lot of it is tailored to location. As a result, Home Depot can understand communities, neighborhoods and businesses at scale. Home Depot can also see macro themes develop.


Let no endpoint go dark

self-healing endpoint visibility
If your workforce is using desktops, laptops, smartphones and tablets by Dell, Lenovo, HP, Asus, Microsoft, Samsung and dozens of other hardware manufacturers, Persistence is already built in at the factory, waiting to be activated via Absolute’s cloud-based platform. (The company offers Apple add-on support that isn’t embedded at the factory.) After Absolute Persistence is activated, it can’t be deactivated by anyone except the customer. Persistence lives up to its name, checking on endpoint controls and making sure they are present and healthy. If it detects that the control has been removed – whether accidentally or on purpose – it will automatically repair and reinstall it. In fact, there is no way for rogue employees, thieves or other attackers to prevent this “self-healing” process, as it can’t be thwarted by things like a replaced hard drive, flashed firmware, device re-imaging, or a smartphone/tablet clean wipe to factory settings.


Loapi malware capable of destroying Android phones

Loapi malware capable of destroying Android phones
One Loapi module is for spamming advertisements, opening various URLs, including pages in popular social networks such as Facebook or Instagram, as well as for displaying videos ads and banners. ... Another module is focused on manipulating text messages, using SMS messages to communicate with the attackers’ Command and Control (C&C) server. It also deletes text messages from the inbox and sent folder to keep the user in the dark about the information received from the C&C server. Yet another module is related to a web crawler, using hidden JavaScript to subscribe users to various services. If the subscription requires a text message confirmation, Loapi takes care of that, too. The researchers noted, “This module, together with the advertisement module, tried to open about 28,000 unique URLs on one device during our 24-hour experiment.”


Could blockchains rattle ECM?

Blockchains are distributed, crowd-validated ledgers which use internet-connected computers and open source software all over the world to verify transactions. One of their major benefits in financial transactions is their immunity to tampering, thanks to the built-in consensus mechanism. In theory, this could also make blockchain a secure, verifiable and permanent solution for exchanges of any kind – for managing records, for instance. Sweden’s land registry authority is currently exploring blockchains’ potential as a mechanism for recording property deals. In this context, the blockchain would confirm and save each step in the contract process between buyers and sellers, while making each deal’s information transparent to all parties such as banks and local governments. But how far could this go, and what does it mean for ECM as we know it? To assess the potential and any limitations we must consider what sets blockchains’ approach apart.



Quote for the day:


"Keep your fears to yourself, but share your courage with others." -- Robert Louis Stevenson


Daily Tech Digest - December 18, 2017

Best health and fitness gifts of 2017

gadgets primary pcw 2
Chances are your friends and family are going to stuff themselves silly with unfathomable calories between now and 2018. ... Not all of the gear below is geared toward weight loss and exercise, but everything isdesigned for general health and wellness, and I have direct experience with every single product. ... The home system comes with a foam pad that anchors the straps to a door frame, but I bought the optional steel anchor point that bolts into ceiling lumber. It’s an extremely versatile (and challenging) workout tool. So what makes this high-tech? It’s the TRX mobile app, which includes a wide variety of targeted workout routines, complete with video demos that illustrate exactly how to do each exercise. The mobile app can also elegantly balance the audio volume from your phone’s music player with workout instructions from the app. The TRX app hooks into various heart rate monitor too, but Fitbit and Garmin devices aren’t supported.



“Hybrid Cloud Serves As An Ideal Foundation To Build A Digital Enterprise”

Definitely. From cost containment to hybrid strategies, CIOs are getting more creative in taking advantage of the latest offerings and the cloud’s economies of scale. This is being fueled by the need for enterprises to scale their resources to serve their customers better. The adoption of hybrid cloud has multiple benefits and serves as an ideal foundation to build a digital enterprise. It provides interoperability and helps a company’s systems become far more compatible with other systems.  One of the key benefits of a hybrid cloud is provisioning at a lower cost and high speed (as and when required functionality of the public cloud component). A properly configured hybrid cloud solution changes the conversation between IT and the business as it shortens timeframes and expands possibilities. Hybrid cloud helps companies get a combination of the private and the public model and enables them to innovate and iterate faster at a lower cost.


Mastering the three top tenets of digital transformation


Suddenly the definition of Content has been broadened as a “center of everything,” to be identified, accessed, re-purposed and distributed. The practice of managing content will effectively help organizations take operational control of their data and intellectual property in order to deliver a business’s growth potential. Strategy in a digital world needs to be intentional and grounded in good design that strives to adhere to business requirements and provides an organized solution for those it impacts. But what exactly is this transformation, what does it impact upon, and, as importantly, how is it done? The new strategy for success is built around customers, your data and your content. At face value this may sound daunting, but ensuring harmony and an uninterrupted cycle of ongoing transformation is what every business needs to excel in this new age of digital. Success is within reach if your organization can honor and embrace the following tenets


What To Expect in 2018: Our Top Predictions For the New Year

What To Expect in 2018: Our Top Predictions For the New Year
In 2018, expect at least one data analytics vendor to open source its middleware (i.e. services layer) and encourage competitors and others to plug into it. The data analytics middleware will have a robust SQL and programmatic interface (API) that serves as a universal semantic layer for both analytics capabilities on the front-end and data assembly, integration, and preparation functions on the back-end. Customers have long wanted vendor-agnostic middleware for data analytics, and the time is right for one or more courageous vendors to step forward and open up the crown jewels. Data Engineering becomes the new in-demand skill as companies seek top talent to design and build data pipelines and data services. Data engineering will be recognized as a multi-disciplinary skill that spans database architecture, microservices architecture, data modeling, programming, Hadoop technologies, NoSQL databases, and data stream processing.


Finding Growth in the Face of Disruption

Mike Schwartz—a blockchain expert and partner at BCG Digital Ventures—began his talk by asking how many people in the room were from companies that act as intermediaries. He then proceeded to describe how blockchain can “cut out the middleman.” He sketched out ways that blockchain can be leveraged to create industry and sector platforms that offer radical transparency and traceability of, for instance, supply chains and transaction histories. Schwartz also predicted that many of blockchain’s current technical limitations related to speed and cost are on the cusp of resolution—as early as 2018. As a consequence, executives need to carefully assess what blockchain could mean to their businesses and rethink their strategies in that context. Brooks CEO Stephen Schwartz said that a study of who was citing the company’s patents revealed that the company had a key capability for controlling motion in a range of cryogenic application environments and opened management’s eyes to the opportunity in the storage and transfer of biological samples.


What to know before you get started with TensorFlow machine learning

What to know before you get started with TensorFlow machine learning
“Unless you already know about machine learning and how to bring it to production, you probably don’t understand the complexities that you are about to add to your company’s life cycle. On the other hand, if you have done this before, well-done machine learning can definitely be a really surprisingly large differentiator,” Dunning says. Open source projects like TensorFlow can dramatically improve an enterprise’s chances of machine learning success. TensorFlow “has made it possible for people without advanced mathematical training to build complex—and sometimes useful—models.” That’s a big deal, and points to TensorFlow, or other similar projects, as the best on-ramp to machine learning for most organizations. ... A successful dataops team involves complicated lines of communication and a multipronged development process. Couple those complexities with the reality that machine learning systems “can easily have hidden and very subtle dependencies,” and you have a perfect form for things going awry.


Digital trends that will shape 2018

When it comes to consumer VR, the technology remains expensive and gaming dominates the landscape. Consumers today need to buy expensive, dedicated hardware to get a true VR experience. Prices of this equipment are likely to fall in 2018, while smartphone VR headsets will also get cheaper and better. Apps will become more diverse—we’ll see a healthy mix of educational, simulation, virtual tourism and entertainment applications come to market. AR captures the world through a mobile device camera and puts a digital overlay on the video and image the user sees on the display. Applications are numerous—from seeing how furniture you’re browsing on a retailer’s website might look in your lounge to providing labels and information about the parts in your car when you’re trying to find out why it won’t start in the morning.


How The Chief Information Risk Officer Brings A Strategic Opportunity For Business


How the Chief Information Risk Officer brings a strategic opportunity for business


In order to address this constant shift, organizations must realign and reorganize. The focus of the leader has now shifted from protecting data to managing the risks associated with data as well as analyzing and reducing vulnerabilities associated with cyber security risks. With this shift, has emerged a new role: The Chief Information Risk Officer (CIRO). The CIRO role brings a new and strategic opportunity for security leaders. The main job of Chief Information Security Officer (CISO) and chief information officer (CIO) has been to implement security technologies, protect data, and keep assets secure. However, the role of a CIRO goes beyond it. It extends beyond security to managing information risk as well as providing a unified risk perspective to the Board of Directors. It must involve defining a risk appetite and setting up right controls to maintain cyber resilience and manage the threat landscape of the organization.


2017 cognitive technologies survey

cognitive technology survey
With all the talk about cognitive and artificial intelligence (AI) technologies in business circles today, it's natural to wonder whether these capabilities are having any measurable impact. So we asked some of the most aggressive adopters of cognitive technologies how they have fared to date, focusing on 250 "cognitive-aware" leaders within "cognitive-active" companies. Why this group in particular? Not only can early-phase signals from such early adopters provide a view from the front lines of these important developments, but many other executives are simply not yet sufficiently knowledgeable about cognitive technologies. So what did these leaders tell us? When these technologies are effectively integrated into workflows, they can directly influence how organizations accomplish tasks, make decisions, create engaging interactions, and generate stronger business outcomes.


Bitcoin's illiquidity is going to be a huge problem when the bubble bursts

Imagine how bad this is going to get on the day some negative news hits the wires and the really significant holders of bitcoin decide, "I've had enough of this. I've made my money. I am bailing." The majority of bitcoins are held by a tiny percentage of the market. 40% are held by 1,000 people . Those few major holders can crash the market whenever they want.  As anyone who remembers the market crashes of 2000 and 2008 knows, these things happen fast. Billions get wiped off the market in minutes. People who need to cash out now, but who are an hour or so behind the news, can lose their shirts. It is brutal. And blockchain just isn't equipped to deal with it. Part of the increase in transaction time has, no doubt, been caused by the recent arrival of new, less knowledgeable investors who are coming into the market only because they have seen the headlines about the price of bitcoin going up, up, up.



Quote for the day:


"If you care enough for a result, you will most certainly attain it." -- William James


Daily Tech Digest - December 17, 2017

With 2018 upon us, the worlds of both business and personal software are ramping up to make the next few years something of an artificial intelligence arms race. On the consumer side of things, machine learning and AI make our lives easier in small ways. Case in point: many of us now have a smart speaker like an Amazon Echo or Google Home sitting on our countertops. While these kinds of AI applications are helpful and entertaining, their self-learning capabilities are limited, to say the least. In the world of business, there’s more immediate potential for self-learning software. “We are drowning in information,” says Vita Vasylyeva of Artsyl Technologies. “The biggest bottlenecks in any business process involve the handling of documents and manual input of data from those documents. At the heart of those bottlenecks is the transformation of unstructured content into structured data.”


A Review on Business Intelligence and Big Data

Technological advancements of IT have led to storing more data at lower cost and drastically  increased transmitting rates. Parallel computing has increased computing power as well by processing multiple cores simultaneously. It is hard to find any device that doesn’t generate data like sensors, plane engines, online transactions, emails, videos, audios, images, click streams, logs, posts, search queries, health records, social networking interactions, science data, and mobile phones. All of these and their applications have begun to generate huge volume data at high velocity and variety which is impossible to store and process with classical technologies and programming paradigms. This kind of data is called big data. International Data Corporation (IDC) reports that digital universe will continuously expand, be complex and interesting. The volume of data is expected to be 8 ZB by 2020. Data generation speed is also increasing exponentially. 


Deep learning is currently one of the main focuses of machine learning. It has led to many speculative comments about A.I. and its possible impact on the future. Although deep learning garners much attention, people fail to realize that deep learning has inherent restrictions which limit its application and effectiveness in many industries and fields. Deep learning requires human expertise and significant time to design and train. Deep learning algorithms lack interpretability as they are not able to explain their decision-making. In mission critical applications, such as medical diagnosis, airlines, and security, people must feel confident in the reasoning behind the program, and it is difficult to trust systems that does not explain or justify their conclusions. Another limitation is minimal changes can induce big errors. For example, in vision classification, slightly changing an image which was once correctly classified in a way that is imperceptible to the human eye can cause a deep neural network to label the image as something else entirely. 


The day when the computer becomes a data scientist

The data scientist usually starts every project by digging into the data (using charts, scatter plots, histograms and other visual tools), then cleaning it by dropping irrelevant variables (and adding missing data) – AKA preprocessing. The next step is choosing the right classifier / regression method followed by picking the right features in the data in order to get the most accurate prediction. In between, the data scientist tests different combinations of classifiers parameters for obtaining the most optimal and efficient prediction mechanism. All the mentioned steps and methods demand high analytical and comprehension skills from the person who apply them, and right now, it doesn't look like a computer can do all of these steps better than a human being. Nevertheless, the computer plays an important role in many parts of the data scientist's projects. A good example for this - is the Cross Validation in the Model Selection module where an algorithm 'finds' best classifier or the best classifier parameters. 


Why telcos will soon be betting on Artificial Intelligence to build their networks
“As more reliable and affordable bandwidth is enabled, it unleashes a plethora of opportunities that can traverse over telecom networks. So, a convergence at network level becomes possible. This is then value enhanced by adding dynamism and intelligence in to the systems through AI which makes the solution intuitive, proactive as well as reactive to the situations,” said Faisal Kawoosa, Lead Analyst, CyberMedia Research. ... One may not see the telecom the way we look at it presently, meaning a different set of revenue streams as well. “AI is expected to have an impact in a multitude of areas – the most important being traffic classification, anomaly detection and prediction, resource utilization and network optimization, along with network orchestration. Further, it will also assist the mobile devices with virtual assistants and bots,” said Arjun Vishwanathan, Associate Director, Emerging Technologies, IDC


2018: The Year Central Banks Begin Buying Cryptocurrency

In 2018, G7 central banks will witness bitcoin and other cryptocurrencies becoming the biggest international currency by market capitalization. This event, together with the global nature of cryptocurrencies with 24/7 trading access, will make it intuitive to own cryptocurrencies as they become a de-facto investment as part of a central banks investment tranche. Cryptocurrencies will also fulfil a new requirement as digital gold. Furthermore, foreign reserves are used to facilitate international trade. This means holding reserves in a trading partner's currency makes trading simpler. In 2018, cryptocurrencies like bitcoin will be utilized for international trade on a moderate basis because the high returns as an investment will encourage a ‘hold’ strategy for G7 countries. Foreign reserves are also used as monetary policy tool. Central banks may pursue the option to sell and buy foreign exchange currencies to control exchange rates.


Bluetooth 5 – the Biggest Breakthrough in the IoT in 20 Years

bluetooth 5 with IoT
The capabilities of the Bluetooth 5 were nothing short of remarkable. The new devices were twice as fast, had four times the range and over nine times the broadband messaging capacity as their predecessor, the Bluetooth 4. These new devices are leading to new IoT applications that we didn’t envision a year ago. Keyinsight predicted that the new IoT devices would be used in every industry from agriculture to transportation. These predictions will finally come to fruition due to advances in Bluetooth technology. ... When Bluetooth first hit the market, it was one of the first IoT devices available. People could use their Bluetooth to connect to automobile CD players, radios and other devices. It was an unprecedented level of connectivity between previously segregated devices. It was only the first major breakthrough with the IoT, but it wouldn’t be the last. Nearly 20 years later, Bluetooth is still a pioneer in the IoT.


The lesson behind 2017’s biggest enterprise security story


For one, security teams are overwhelmed. The average security team typically examines less than 5 percent of the alerts flowing into them every day (and in many cases, much less than that). Ironically, some attempts to improve this efficacy may backfire. Automation is clearly required to help security teams prioritize their work and defend their environments, but many systems prioritize alerts based on measures of the severity and impact of the threat itself rather than measuring its potential impact within the context of the business. In other words, while a human analyst may understand that a “simple” exploit of an unpatched vulnerability on a server that houses your crown jewels is a higher priority than a sophisticated zero-day attack targeting the machine housing the cafeteria menu, automated tools may mistakenly believe otherwise.


Why do Decision Trees Work?

Decision trees are a type of recursive partitioning algorithm. Decision trees are built up of two types of nodes: decision nodes, and leaves. The decision tree starts with a node called the root. If the root is a leaf then the decision tree is trivial or degenerate and the same classification is made for all data. For decision nodes we examine a single variable and move to another node based on the outcome of a comparison. The recursion is repeated until we reach a leaf node. At a leaf node we return the majority value of training data routed to the leaf node as a classification decision, or return the mean-value of outcomes as a regression estimate. ... For true conditions we move down and left, for falsified conditions we move down and right. The leaves are labeled with the predicted probability of account cancellation. The tree is orderly and all nodes are in estimated probability units because Practical Data Science with R used a technique similar to y-aware scaling


Q&A With Eberhard Wolff On the Book “A Practical Guide to Continuous Delivery”

The obvious and original goal of CD is to improve time to market for new features and thereby to get better business results. But there is more to CD: Constantly testing the software with reproducible results and a high degree of automation improves the quality of the software. Deploying more often and automating deployment decreases the risk of the deployment. This has a positive impact on software development and IT. These benefits might be reason enough to implement CD. How far you can go with CD depends on the buy-in from business as well as software development, operations, and QA. With limited buy-in from business you won’t be able to get better time-to-market. With limited buy-in from Ops you won’t be able to extend the automated pipeline to go directly into production. Still even a limited implementation of CD will be worth it and of course it can always grow. The early adopters were looking for a more agile way to work.



Quote for the day:


“If you’re not a risk taker, you should get the hell out of business.” -- Ray Kroc


Daily Tech Digest - December 16, 2017

Will augmented reality make lying obsolete?

eyedetect
The future of lie detection is A.I. A.I. can take various “signals,” such as eye movements, facial gestures, body movements, voice intonations and others, to estimate the truthfulness of a person’s statements. In fact, lie detection is just one of the many uses for emotion or mood detection generally. When A.I. can tell when a person is happy or sad or mad or stressed, it can generally detect changes during conversation and figure out that some of those changes are caused by lie-induced mental activity or stress. Because lie-detection A.I. is currently being developed by numerous companies, universities and governments, it’s inevitable that the capability will become available broadly and inexpensively to businesses and consumers over the next two years. In fact, lie-detection A.I. is already on the market. ... EyeDetect is already in use for hiring and bank fraud, as well as by police departments as an alternative to the polygraph.


Designing human-shaped artificial intelligence

artificial intelligence
Designing for conversational interfaces involves a whole host of new challenges, including personality design. Artificial intelligence with human-like personality makes for more natural interaction, so the approach to personality design must continually be developed to explore how brands translate into AI personalities. ... In addition to building tools, it is important to supplement this with informed conversations about the needs and opportunities which AI brings to practice. The best products, services, systems and spaces are those that are designed to help real people live easier, smarter, enjoyable and more meaningful lives. It is entirely possible to create a human-shaped world where everything is designed to meet real human needs. Getting there requires all contributing innovators to answer complex problems with simple, focused solutions. When designing human-shaped AI, as with any design process, it is easy to over-complicate.



Making Regulation Machine Readable

fintech
Much progress has been made to automate these processes, but offering international services remains a challenge as each country has its own complex regulatory requirements. To offer scalable solutions across multiple markets, regulatory advice as provided by legal and compliance experts today, must also be digitized. I believe an automated solution, a “digital compliance officer”, is the key to enabling digital services such as Robo Advisors. Therefore, by applying machine-learning techniques, we today cluster regulatory requirements country by country and transform them into digital rule-sets. These rule-sets are always up-to-date and verified, allow for a transparent audit trail on past and current rules, and provide our clients with a sophisticated regulatory risk management framework. To ensure consistency, applications such as eBanking, CRM and Robo Advisors communicate via APIs with our solution.


8 Steps for Building an IT Security Career Path Program

Conduct a Needs Assessment

Before a career path can be chartered for current or prospective employees, you first need to know where you currently stand with your cybersecurity workforce.

'Define the type of work you want done, so you can create a career path and path for learning,' says Andrew Smallwood, cyber human capital specialist with Booz Allen Hamilton.

Jason Hite, founder of Daoine Centric and industry co-chair for the National Initiative on Cybersecurity Education (NICE) and a member of the NICE workforce sub-group, agrees. 

He notes that the ISO/IEC 27001 is one resource organizations can use to develop their security posture. It's an international standard that government agencies and companies use to manage the security of their assets.

Image Source: Shahril KHMD via Shutterstock
Cybersecurity professionals are in steep demand, given the projected shortfall of 1.8 million workers by 2022. ...A majority of companies don't provide such a program for their cybersecurity team, according to IT security career experts. But it's a key tool to keep in-house security talent fulfilled and challenged in their jobs, and to help recruit additional talent. "The number one reason people leave their jobs today is their company doesn't take security seriously. What this means is that they don't have a plan, which includes a career path plan too," says Deidre Diamond, founder and CEO of Cyber Security Networks. Career path programs show existing employees the role they currently hold within the organization and potential positions they may later ascend into through promotions or other moves, depending upon their interests, say cybersecurity career experts. It also gives prospective employees a view of their security career opportunities at an organization.


Putting Industrial Cyber Security at the Top of the CEO Agenda

Study reveals low adoption of cyber security capabilities and technology among industrial companies despite the increasing number of global industrial attacks and changing threat landscape. The study was conducted by LNS Research with strategic decision makers from industrial companies on their approach to the Industrial Internet of Things (IIoT) and use of industrial cyber security technologies and practices. Among the findings were: The study suggests that cyber security must be part of a CEO’s agenda to ensure the fast and effective long-term deployment of strategies and technologies. It also recommends three immediate actions. Honeywell’s industrial cyber security technologies and expertise addresses many of the issues identified in the LNS Research study.


How Taking the Time to Verify Your Network Could Save You Millions


More advanced technologies have given rise to modern artificial intelligence and automation tools. One emerging in the business world is related to network verification. It utilizes a series of statistics and data, performance information and predictive analytics to help business goals match reality, or more specifically to guarantee your network can handle incoming loads. It’s not just about handling a known or predicted performance requirement, however. It’s also about the fluctuation of said patterns. Frequent change happens in the world of technology, your network and the resources it needs to operate. ... Verification is often confused with testing. However, they are not synonymous. When you verify, you follow through a series of checks and balances to ensure things are as they seem and you’re prepared for the future. This is not quite the same as testing, is it? Testing checks the performance and capabilities of a system. You already know the capabilities of your network, you understand what resources it needs, and you know how it’s going to be used.


We need to talk about mathematical backdoors in encryption algorithms


Security researchers regularly set out to find implementation problems in cryptographic algorithms, but not enough effort is going towards the search for mathematical backdoors, two cryptography professors have argued. Governments and intelligence agencies strive to control and bypass or circumvent cryptographic protection of data and communications. Backdooring encryption algorithms is considered as the best way to enforce cryptographic control. In defence of cryptography, researchers have set out to validate technology that underpins the secure exchange of information and e-commerce. Eric Filiol, head of research at ESIEA, the operational cryptology and virology lab, argued that only implementation backdoors (at the protocol/implementation/management level) are generally considered. Not enough effort is being put into looking for mathematical backdoors or by-design backdoors, he maintains.


Denmark considers blockchain a new weapon in the fight for human rights

"The use of blockchain and cryptocurrency is merely some of the technologies which can give us new tools in the development cooperation toolbox," Danish Minister for Development Cooperation Ulla Tørnæs said. "It is clear that if we are to succeed in relation to the sustainable development goals we need digital and technological solutions and some of these we do not know of, but we will help find them." A report published by the ministry, alongside think tank Sustainia and blockchain currency platform Coinify, investigates how blockchain technology might solve problems in providing development aid, noting that by using cryptocurrency, money can be transferred faster and safer, and without a middleman or fees. In addition, contracts and other legal papers can be digitalised to combat corruption and ensure a more effective development aid and better protection of the rights of marginalised groups, the report, Hack the Future of Development Aid, explains.


The AI mindset: designing the workforce of the future

7 artificial intelligence
The AI mindset prioritizes imagination and creativity over tasks and execution. If we are going to reinvent half of the jobs that are out there, what we are looking at in the next decade is a talent revolution. Because AI for business is all about reinforcing decision-making and capabilities, supported by data and models, it is still ultimately about humans at the end of the day– human innovation. Organizing teams around a goal begins by looking at how you hire your individual players. It is much easier to teach skills than to teach a mindset. Nurturing talent to dig deep into our human capabilities to become better facilitators, collaborators, presenters, and persuaders–this is where innovation happens. Those who embody the AI mindset will help accelerate how AI serves businesses.


The next wave? Modular component malware against industrial control safety systems

malware cybersecurity skull crossbone
The modules used with the associated malware are specifically designed to disrupt Triconex safety controllers, which are used widely in critical infrastructure. The malware requires the key switch to be in the “PROGRAM” mode in order to deliver its payload. Among others, the reported malware has the capability to scan and map the industrial control system environment to provide reconnaissance and issue commands directly to Tricon safety controllers. A DHS statement mentioned, “This marks the first report of a safety system breach at an industrial plant by hackers, who have in recent years placed increasing attention on hacking into utilities, factories and other types of critical infrastructure. Such attacks could allow hackers to shut down safety systems in advance of attacking an industrial plant, which could prevent plants from identifying and halting destructive attacks on those facilities.”



Quote for the day:


"A good leader leads the people from above them. A great leader leads the people from within them." -- M.D. Arnold