Daily Tech Digest - December 23, 2017

What Metrics Should You Evaluate When Looking at Hyperconverged Infrastructure?


When it comes to hyperconverged infrastructure, some in the IT industry view the merits of hyperconverged infrastructure through the storage lens. This seems logical because hyperconverged technology offers many benefits on how we provision, consolidate, and manage storage. But the metrics that those select few look at are too focused on storage-specific features, such as the number of nodes or terabytes, rather than VM-related measurements commonly used for other software-defined infrastructures such as the cloud. Since hyperconverged infrastructure shifts the paradigm from managing infrastructure components to managing VMs, there should also be a shift in the metrics used to measure it. But with bias present among the vendors, how will customers find the true hyperconverged metrics that matter?



5 Sectors Blockchain Is Disrupting That Are Not Cryptocurrency

5 Sectors Blockchain Is Disrupting That Are Not Cryptocurrency
For a few years now, "blockchain" and "cryptocurrency" have gone hand-in-hand. The blockchain concept is complicated, and involves constant-growth record lists linked together and secured through cryptography (think of the Cryptex from The Da Vinci Code). Each block of the chain envelops a hash pointer relating to the previous block, as well as transaction data and a timestamp. The idea of a blockchain isn't relegated to the infant-era cryptocurrency revolution. Massive worldwide corporations are beginning to incorporate blockchain technology into their systems. The technology behind the blockchain is far more valuable on a global scale than any market capitalization of cryptocurrencies. Here are five large sectors currently being disrupted by the potential of this technology


Europe Unveils Its Vision for a Quantum Future

The commission clearly expects large-scale quantum processing using one or more of these technologies within five to 10 years. Whether this will be done in Europe first is much less clear. Quantum simulation is the third area of investment. Simulating complex quantum properties on an ordinary computer is close to impossible. But quantum systems can be made to simulate aspects of other quantum systems more or less perfectly. Physicists are toying with various ways of doing this. The basic idea is to find a quantum system that is well understood, and easy to manipulate and measure, and then use that to simulate a system that is hard to manipulate and measure. The well-understood systems include ultra-cold atoms and molecules, ions trapped in magnetic fields, and superconducting circuits.


Events, Flows and Long-Running Services: A Modern Approach to Workflow Automation


The idea is backed by the Domain-Driven Design (DDD) community, by providing the nuts and bolts for leveraging domain events and by showing how they change the way we think about systems. Although we are generally supportive of event orientation, we asked ourselves what risks arise if we use them without further reflection. To answer this question we reviewed three common hypotheses:
Events decrease coupling; Central control needs to be avoided; and Workflow engines are painful. ... A more sensible approach to tackle this flow is to implement it in a dedicated service. This service can act as a coordinator, and send commands to the others -- for example, to initiate the payment. This is often a more natural approach, as in this case we would generally not consider this a good design if the Payment service had knowledge about all of its consumers by subscribing to manyfold business events triggering payment retrieval.


Here's What Two Millennial Blockchain Founders Have To Say About Cryptocurrency

With so many different reports, it can be hard to make sense of the cryptocurrency landscape. One thing’s for certain—Bitcoin is just the tip of the iceberg. There are so many promising blockchain projects sprouting up with millennials leading the way. From 24-year-old Vitalik Buterin who founded Ethereum, now the world’s second largest cryptocurrency to 26-year-old Justin Sun, who seeks to reinvent how digital creators get paid for their online content with TRON. ... “We don’t think you even need to hold dollars or pounds in the future we think people will literally be spending with their Mona Lisa tokens or with their gold or with their Apple stock, only what they want to hold not what they think they need to hold simply because it’s the only thing that’s accepted. People will literally be able to walk into McDonalds and pay with their Mona Lisa tokens and that’s why we created this company,” Gelderman says


Can RegTech Really Save Banks Billions Each Year?


The global investment banking industry is worth a few hundred billion dollars annually, as are both the audit and legal professions. And since the last decade or so, increased regulation has forced banks to devote around 10% of their salary costs to employing an army of compliance controllers to ensure that their transactions and processes meet the standards required by the law. And the stakes are high. Rogue traders, breaches of confidentiality, and reckless financial positions can expose financial institutions to fines, cripplingly negative publicity, and even prison sentences, not to mention huge financial losses. These stakes are what make banks the earliest adopters of many technological innovations. Banks are turning to Regulatory Technology (RegTech), chiefly Artificial Intelligence (AI) and Augmented Intelligence (IA) but also other developments in computing like blockchain


While Bitcoin Price Soars, Technological Advancements Continue in the Background

While Bitcoin Price Soars, Technological Advancements Continue in the Background
As such, it helps to assimilate any new or additional information in the context to help make more sense of it in comparison to other experiences. For example, imagine your buddy invites you to "catch some waves" and to your surprise, after two hours on the road you finally pull up to an indoor resort water park where they have one of those cool new "wave pools;" the waves are generated mechanically and are meant to impress, but not utterly frighten well-meaning vacationers. This is not the same as a trip to the beach right. The same can be said of traditional investment vehicles vs. cryptocurrencies and assets. Some key interactions with each are very familiar; however, the context of operating within a purely virtual universe where the data is publicly distributed and infrastructure is community owned is very important to how you choose to engage.


Our top 7 cyber security predictions for 2018

predictions crystalball
The Equifax and Anthem breaches were wake-up calls for many consumers, who are now asking questions about the safety of their online accounts. Most still have no idea about password alternatives or enhancements like multi-factor authentication (MFA) or risk-based authentication, but they are more aware that passwords alone no longer are enough. In fact, research done by Bitdefender shows that U.S. citizens are more concerned about stolen identities (79 percent) than email hacking (70 percent) or home break-ins (63 percent). This is important, because companies often cite a lack of demand for stronger authentication as a reason for not offering it. ... State-sponsored attacks might also spur countries to form alliances to fight them. “Increased attacks on critical infrastructure will drive countries to begin discussing cybersecurity alliances. Establishing these alliances will provide mutual defense for all countries involved and it will allow for the sharing of intelligence in the face of attributed nation-state attacks, not to mention agreements to not attack each other,” says Eddie Habibi, CEO of PAS Global.


Agile for Marketing and Communication

Agile ensures movement, flexibility, and connection, and ensures that the right people are involved in communication. It also provides communication professionals with tools to keep a grip on the development of communication and the use of resources within the field of internal stakeholders. This way you can cope better with change and be more in control of the project schedule and state. It also provides self-organizing teams that take their own responsibility and add value to the product that’s being delivered. Therefore, it helps to finish assignments in a short period of time by focusing and making prior choices. During the preparation of the event RIVM Kennisparade for example, I only interfered one time with the progress when I was asked by the product owner. Because we’ve directly involved users, stakeholders and the necessary other organizational disciplines in the process, we have ensured support during the whole organization of the event. And that is a very good way to add value to our products.


The internet is broken

The internet was built on decades-old technology. Today, the internet comprises billions of devices, every one of which is more powerful than those upon which the internet and the web were built. Storage is exponentially cheaper and wireless technologies mean that countries are developing web infrastructures that aren't built on undersea cables. Our phones can scan our fingerprints and faces, making payments secure. Emerging technologies such as the blockchain enable experiments in new models for file sharing and value exchange. So let's consider a thought experiment: if we were to reset the internet - shut everything down and start again, using 30 or so years of experience - would it still look the same? Or would we design something different… even better?



Quote for the day:


"The sign of a beautiful person is that they always see beauty in others." -- Omar Suleiman


Daily Tech Digest - December 22, 2017

New Year’s resolutions for CISOs

New Year’s resolutions for CISOs
CISOs should focus on rationalizing, consolidating and integrating security technologies in 2018 with the goal of building a security operations and analytics platform architecture (SOAPA) that can collect, normalize, process, analyze and act upon the growing amount of security telemetry.  At the same time, organizations should research, test, pilot and deploy selective security tools offering artificial intelligence. Based upon ESG research, CISOs can get the biggest bang for their buck by applying machine learning algorithms to existing security tools such as endpoint security software, network security analytics, threat intelligence platforms and DLP. This can help improve security efficacy of installed technologies without adding complex new projects. Make a commitment to automate and orchestrate manual processes.In cybersecurity, whatever can be automated should be automated. This includes gathering data, analyzing suspicious files 


Be a More Effective CISO by Aligning Security to the Business

A key to building cooperation is to develop the skill of empathetic listening to engage your ears before you start hammering a message into people. You listen with the goal of understanding the other person’s point of view and acknowledging how they feel about the situation. Listen to people’s complaints. Users work in different contexts than IT and security. They have work that needs to get done that has nothing to do with your security policy. Listen carefully to their problems and then, once they’ve had their say, you can connect their jobs to the security mission.... To break down barriers and silos, you’ll need to align users’ daily practices with security. Hopefully your examination of organizational processes and goals provides the information you needed for this. It also is useful for framing your security messages in the language of the organization’s culture, not in terms of security culture.


Google slips Chrome stub into Microsoft's app store

browser wars shields with logos at battle
Sources familiar with Google's plans said that the maneuver was meant to stifle the Chrome copycats the company thinks mislead Microsoft Store patrons into downloading worthless apps. Yet that left unexplained the real purpose Google had - Chrome wannabes have not overwhelmed the store - or why the company thought the applet would pass muster and make it into the store, or getting that far, that it would remain unnoticed by Microsoft for any amount of time. One motivation was forwarded by a Google software engineer, Chris Blume, who tweeted, "Microsoft denies Chrome the tools it needs to protect users when installed from the Windows Store.  So, we made a mini-app to help users get the full, safe version of Chrome. It was pulled." Later, after others asked him what Microsoft withheld from Google that prevented the latter's developers from crafting a UWP Chrome app, Blume replied, "Multiple processes is one example."


IT/OT Convergence and the Digital Supply Chain

Whatever the phraseology, the principle is the same. Advances in the manufacture of computer chips have enabled tiny-form sensors with a capacity to gather, receive and send information to be developed. They are applied to plant equipment, goods in transit, warehousing or other industrial assets, and embed both intelligence and connectivity into equipment. Now connected with each other and other systems, these assets can send and receive data about performance or any other parameter. Secure cloud technology then allows for seamless but flexible data handling and storage, as well as the compute power needed to perform advanced analytics that extract valuable insights into parts of the supply chain that were previously unavailable from the raw data. That analysis can open up a whole series of new possibilities through the development of new applications and APIs to derive even greater value from the original data.


Directors on-board the cyber security train
Criminals have discovered the immense power of social engineering-based email attacks, which have become one of the most prominent types of cyber threats to many organisations. However, research suggests that current social engineering methods are nowhere near as effective as they could be. Recent developments suggest an impending watershed moment among Internet criminals, in which their yields can be doubled by use of sophisticated multi-factor social engineering techniques. One example involves the use of legitimate functionality or infrastructure – such as traditional password reset – in combination with deceptive email messages. By sending a reset code to an intended victim, then immediately following up with a deceptive email request for that code, criminals are able to harvest reset codes on a significantly larger scale. This gives them direct access to user accounts without setting off alarm bells by requesting that the intended victim enter a password.


Why Network Visibility Is Critical to Removing Security Blind Spots

In the client-server era, all traffic went from a computer, into the data center, to the core, and back. This is known as north-south traffic. Securing this type of traffic flow means putting big firewalls and other tools in the core of the network where traffic would be inspected as it passed through. Over time the folks at VMware figured out a way to virtualize workloads and send traffic between them, even if they are in another location of the data center. This is known as east-west traffic. The challenge in securing east-west traffic is that it never passes through the core, so it bypasses all your traditional (and expensive) tools, as well as new ones such as behavioral analysis. Organizations could try to deploy security tools at every possible east-west junction, but that would be ridiculously expensive and complicated. Network visibility tools allow security managers to see every east-west flow and then individually direct them to specific security tools instead of sending all traffic to all tools.


Your Top Five Challenges Moving in to the IoT Space


When you’re on the path towards a digital transformation, you end up with more connected … things. This newfound focus on software and digital experiences means that deploying software into more places. Integrating assets and data into existing infrastructure and systems are arguably what IoT is all about. Vendors such as Microsoft, Amazon and IBM are making massive investments in their respective cloud platform to align with their customers’ demands for IoT-type solutions. Traditional technology vendors such as Schneider, Mitsubishi and Siemens are also on their toes, eager to be part of the new ecosystem. I’ve been involved in many IoT projects over the years and have come to realize that there is a big gap between what customers need and what these vendors provide. Not saying they should or even could solve all problems, but I’ll try to emphasize some of the areas organizations need focusing on.



Security platform or best of breed? There’s only one answer

saas
Michael Cook, a senior security consultant at Indianapolis-based advisory Pondurance, says all-in-one platforms are generally made up of “about 15 applications or modules around that platform.” Each module addresses a different need, such as securing that API gateway. Cook cautions that not every module is equally strong and that with a single platform you risk a Jack of all trades, master of none scenario. Say, for example, the platform you use offers gateway security but isn’t great at it. Good luck getting management to approve a Forum Systems purchase. “When you’re using a platform versus best of breed, if there’s something you don’t like in one of the modules in the platform you’re kind of, ‘Well, we’ve gotta use it because we bought the whole thing,’” he says. Of course, just because a specialized tool might work better doesn’t mean all-in-one doesn’t offer any protection at all. The module is there.


The case for securing the SD-WAN

network security primary2
Enterprises can resolve this new spate of security challenges by moving their inspection and enforcement points away from the data center to either the branch or the cloud. Specifically, security administrators need to assess if they require security layers that consist of more than just encryption and general stateful firewall services. Then they need to ask whether there’s more risk in either the branch or the cloud, which will help determine what layers of security they will require. By nature, SD-WAN provides embedded security because of its native support for encryption end-to-end and segmentation on a per application or organizational level. However, the delivery of a comprehensive enterprise grade security solution is not wholly supported natively in numerous SD-WAN providers. So, how and what do you use to secure the branch that simultaneously serves as a direct pipeline for a maelstrom of malware and other threats?


Unsupervised Machine Learning Demonstrated On Quantum Computer

Rigetti announced that it was able to demonstrate unsupervised machine learning on its new 19-qubit quantum computer. Unsupervised machine learning refers to the neural networks being able to train on raw data without any pre-labeling of that data. The company achieved this with a quantum/classical hybrid algorithm for clustering data. Clustering analysis is one of the most common ways to do unsupervised machine learning in order to find hidden patterns within the analyzed data. It's often used in advertising, credit scoring, and image segmentation. This means that Rigetti’s quantum computer and its approach to hybrid quantum/classical algorithms could soon find uses in the real world. However, Rigetti warned that they still need more qubits in order to show that this solution is faster and more effective than purely classical approaches. This could be achieved once quantum supremacy is reached.



Quote for the day:


"Never stop learning, because life never stops teaching." -- Unknown


Daily Tech Digest - December 21, 2017

AI Bot
In essence, AI has made it possible for customer service teams to focus more squarely on addressing and resolving customer needs through the automation of information gathering and other simple processes. ... The time savings alone means they can help more customers get the answers they need. That’s the ultimate end goal. Here’s something else to think about – and this goes against the beliefs of skeptics suggesting that AI will eventually replace humans altogether (which is just not reality). As intelligent as machine learning can be, it serves a very specific purpose today: to make humans more effective. AI is not and, in my humble opinion, will never be a full replacement for humans within a brand’s business, customer service operations, or otherwise. There are just certain things that humans can do that technology can’t. For all the efficiencies that AI and bots bring to the digital customer experience, there’s nothing that can ever replace a real “human touch,” especially in high-stress or complex situations.


 Technical Capacity Is The Biggest Challenge for Building Smart Cities


Elaborating further on the technology side of the whole story of Smart Cities, Kunal Kumar, Commissioner, Pune Municipal Corporation said, “The more advanced technologies like AI and machine learning are the tech capabilities which need to be enhanced. I believe that we should urgently come up with a Smart Cities academy where engineers and officers are trained to think and work on completely different paradigms.”  Kumar goes on to include that Innovation hubs are also required in every state and city where local entrepreneurs, startups and other industry partners get to come and experience what is required by these cities. "innovation hubs for entrepreneurs and industry partners can help them start rolling out their research and development accordingly. It is very important that we do this virtually as well as it is already performed on physical platforms."


Six Cybersecurity Predictions for The Year Ahead


In the year ahead, we’ll continue to see a distinct lack of in-house cloud expertise resulting in security troubles for many organizations. While cloud providers offer adequately secure platforms, users still have a responsibility to ensure they are doing their part toward securing their data in the cloud. This includes monitoring for security threats within the cloud environment, and equally ensuring cloud environments are properly configured. But, many IT and security professionals aren’t aware of their role in cloud security, or are aware but don’t know the best way to execute on their responsibilities. There have been countless cases in 2017 whereby enterprises have left private information publicly exposed, which has resulted in huge breaches. While most resulted from a failure to properly secure Amazon Web Services buckets, this is not the only cloud vulnerability. For example, many people also found that their information was shared publicly via Microsoft’s docs.com service.


Fintech Disruptors Warn: ‘You Can’t Use Past Solutions to Fix Future Problems’

The biggest challenge may be “how do we avoid using past solutions to solve future problems?” So, when we designed our solution, we really didn’t pull in any lenders. We didn’t want their perspective, because we knew we had to innovate something that wasn’t in the marketplace, and so we had to set ourselves up for success and just say “let’s not create any barriers or boundaries on how we want to deliver this.” We just had to understand the market need, and what was being delivered out there today, and make sure whatever we did surpassed that. ... We are a cloud solution provider, and that was somewhat challenging at the beginning – working with FIs that were not necessarily comfortable with the cloud. From the early stages, we decided to take on security and have been PCI certified for seven years. I think the industry has seen a shift, where financial institutions are now recognizing the benefits in working with cloud providers.


Frugal Innovation: Doing More With Less


Frugal innovation is at its core a mindset and hence can be, and should be, applied to each stage and various practices in the SDLC. In my firm, The Cobalt Partners, we work primarily in Africa, with clients who are often doing work where their customers earn and live on less than $1 a day, or where our clients simply have very limited budgets. We ask and answer the hard questions to develop a skinny form of the SDLC we’ve typically used in the developed world. How do we do this without pair-programming (!) since human resources are one of the most expensive? How do we reuse open source components? How do we effectively understand the context … is our design thinking phase well-executed? Who has to maintain this software afterwards? In fact, we provide hosting services in addition to software engineering services for over half our clients since many of our clients do not have staff who can provide or adequately advise them on local and cost-effective hosting solutions.


Financial Markets Regulatory Outlook 2018

Our first theme examines industry’s efforts to “get over the line” in terms of compliance. Our second theme is Brexit, and we set out what industry will need to do against a backdrop of political and regulatory uncertainty. Third, we look at the business model challenges posed by the macro-economic environment, competition initiatives, and regulatory change. Fourth, we examine whether and how industry efforts to utilise customer data in novel ways can be reconciled with new data protection rules and supervisory expectations of the fair treatment of customers. Fifth, we observe significantly higher supervisory expectations and approaches regarding the treatment of vulnerable customers. Sixth, we consider the ever-present threat posed by cyber attacks, and the increasing supervisory emphasis on cyber resilience. Last, but not least, we assess the evolving landscape for model risk management in an environment in which a large proportion of assets in the financial system


Ransomware of IoT will become a new security nightmare in 2018

Ransomware of IoT will become a new security nightmare in 2018
The impact of ransomware on smart devices extends well beyond a criminal simply preventing a user from being able to access the data on their devices – it could also interfere with the functionality of the device itself, a situation that can have real, and potentially dangerous, physical implications. For example, ransomware that infects a smart thermostat could potentially turn up the heating to full in the middle of summer, or turn it off completely in the winter unless a ransom is paid. While this might be only an annoyance for most people, it could prove harmful to some vulnerable victims. An infected smart lock could lock people in or out of their houses, or remain permanently open, allowing full access to a victim’s home and belongings. Infection of smart fridges, smart bulbs, or any number of smart devices in a home, could also cause disruption.


Why Cisco, McAfee Say Security Vendors Must Share Threat Intel to Beat the Baddies

Why Cisco, McAfee Say Security Vendors Must Share Threat Intel to Beat the Baddies
It differentiates the group from traditional Information Sharing and Analysis Centers (ISACs) or Information Sharing and Analysis Organizations (ISAOs), said CTA President Michael Daniel. Prior to joining the CTA he served as special assistant to President Obama and cybersecurity coordinator on the National Security Council. Traditional threat sharing groups usually have low participation rates. They also don’t share information on a real-time basis or provide context. The CTA, on the other hand, requires members to submit a daily minimum. It uses a scoring algorithm to reward quantity, quality, and speed of submission. “We say you have to submit on average 10,000 points worth of intelligence per day,” Daniel said. “We weigh context and timeliness very highly. Don’t just tell me this is a bad binary, tell me what malware family it’s part of, what stage in the kill chain you think this belongs to, do you think this is a criminal or a nation state?”


Juniper brings AI bots to intent-based networks

Juniper brings AI bots to intent-based networks
It’s fair to say that all the great advancements the industry has seen in networking over the past few years — which includes the shift to software, increased adoption of white boxes, new operating systems, and the shift to software models — have enabled us to do so much more with our networks. But they have also increased the complexity of running a network. The shift to the cloud has also raised the importance of the network, as we are now literally connecting everything to the network. Businesses have had to hire more people with new skill sets just to maintain the status quo. Automation is something that network professionals seem more open to today than they did just a few years ago, but what to automate and how remains somewhat of a mystery. At the event, Juniper provided a data point from its research that found 43 percent of respondents said a lack of internal education and skills are preventing the use of network automation.


Security Worries? Let Policies Automate the Right Thing

In fact, most security breaches and system failures are the result of people not operating systems correctly. They forget to do something or give themselves permission to do an action, then leave that permission open so that bad actors can take advantage of it. These missteps could be avoided by a security approach that automatically directs, guides, or encourages system operators to do the right thing or blocks them from doing bad things. It is an enlightened security leader who prioritizes and budgets for this kind of security policy enforcement; without active and automated enforcement of policy, the breaches keep coming, costs keep rising, and heads keep rolling. To draw an analogy from the parenting world, the dominant security model today is the equivalent of raising kids only by punishing them when they do bad. A more effective approach is to encourage kids when they do the right thing — thereby building a decision-making framework in their frontal cortex that will override bad behavior. 



Quote for the day:


"Everything we hear is an opinion, not a fact. Everything we see is a perspective, not the truth." -- Marcus Aurelius


Daily Tech Digest - December 20, 2017

With the price of virtual currency bitcoin hitting new highs every other day and money raised from “initial coin offerings” for new cryptocurrency projects surpassing that of early-stage venture funding, venture investors are scrambling to develop a cryptocurrency strategy. Most firms can’t—or won’t—buy digital currency like bitcoin directly. But they’re high on the potential value of the underlying blockchain technology, and finding creative ways to pour money into the sector. David Pakman, a partner at Venrock, says he is exploring investments in apps that will run on the nascent crypto networks, much as smartphone apps run on either iOS or Android. His firm is also seeking investment opportunities in services around the cryptocurrency ecosystem, including institutional custody for cryptocurrencies, security, app distribution, and blockchain-based distributed file storage.


Convergence of Big Data, IoT And Cloud Computing For Better Future


Demand for big data is calling for the adoption of both IoT and cloud platforms. With IoT, the amount of big data will obviously increase. The adoption of IoT and big data compels a move towards cloud technology. According to IDC, “Within the next five years, more than 90 percent of all Internet of Things data will be hosted on service provider platforms as cloud computing reduces the complexity of supporting the Internet of Things ‘data blending.’” So, a company looking to transform the IoT data and utilize its potential first needs to fully embrace cloud-based systems. The number of IoT devices is expected to grow to 20 billion by 2020 whereas the big data industry is expected to have a worth of US$66.8 billion by 2021. These are the fastest growing sectors in IT and both are very much necessary for any technological innovation.


Do You Really Have Big Data, Or Just Too Much Data?

(Image: Peter Howell/iStockphoto)
There is more data available to organizations today than ever before. In 2015 alone, customers, employees, and other users created about 7.9 zettabytes of data globally -- and that number is expected to reach 35 zettabytes in 2020. The type of information companies are collecting is also multiplying -- from traditional sources such as customer mailing addresses and phone numbers to more advanced demographics, web histories, shopping preferences, and even biometric data. Advances in technology, computer power, and analytics mean companies can collect and process data in almost real-time. This may lead executives to believe that the more data they have, the greater their advantage. However, collecting a virtually unlimited amount of data can create a serious threat for organizations, because the amount collected often outstrips the ability to protect it. ... If a company does have a data breach containing certain types of sensitive personal information, such as social security numbers or health records, it can trigger additional burdensome legal duties and invite increased regulatory scrutiny, not to mention potential reputational damage.


CPG Industry Levels Playing Field with Power of One

Figure 1: "Power of One" to Understand and Monetize Individual Customer Insights
Digital Twins is a concept that exploits the “Power of One.” Picked by Gartner as one of the top 10 strategic technology trends in 2018, Digital Twins couples virtual and physical worlds to facilitate analysis of data and monitoring of systems in order to avert problems, prevent downtime, develop new opportunities and support planning via simulations But the Digital Twin concept isn’t new. The concept of a digital twin was originally developed by NASA in order to help manage unexpected “situations” that might occur during space travel. NASA grappled with the challenge of designing things that travel so far away, beyond the ability to immediately see, monitor or modify. NASA’s innovation was a Digital Twin of the physical system, a complete digital model that can be used to operate, simulate and analyze an underlying system governed by physics. This Digital Twin concept is being embraced throughout the Industrial Internet of Things (IIOT) world.


IT pros will need a diverse skill set to be employed in 2020

evgenyatamanenkoistock-670117904.jpg
"The ability of an IT professional to work effectively on project teams for many different types of projects and, even better, be able to manage those projects, is already a critical skill and is only going to become more in demand," Peskay said. Some of that management will extend to finding and utilizing outside resources to solve business problems. IT professionals may be tasked with managing in-house personnel, as well as contractors, crowdsource platforms, cloud services, and other external resources. "An IT professional who is both familiar with and can engage successfully with all of these resource types will have a huge advantage in the marketplace," he said. The shifting IT landscape also means that IT professionals will need to acclimate to the ongoing changes. Soft skills such as emotional intelligence and cognitive flexibility will help them adapt to both the marketplace and the constant fluctuations within the industry, said Holly Benson, vice president and organizational transformation consulting expert at Infosys.


The artificial intelligence computing stack

Technology stack
In the past decade, the computational demands of AI put a strain on CPUs, unable to shake off physical limits in clock speed and heat dissipation. Luckily, the computations that AI requires only need linear algebra operations, the same linear algebra you learned about in high school mathematics. It turns out the best hardware for AI speaks linear algebra natively, and graphics processing units (GPUs) are pretty good at that, so we used GPUs to make great strides in AI. While GPUs are good at linear algebra, their lead is being challenged by dozens of Chinese and American companies creating chips designed from the ground up for linear algebra computations. Some call their chips “tensor processing units” (TPUs), others call them “tensor cores.” It is no surprise these products even compete on the word “tensor”: it is a core concept from linear algebra used heavily in AI. All of these companies support running the TensorFlow software library, released by Google in November 2015.


Who's who in the cybersecurity market? The inside scoop for 2018

Who's who in the cybersecurity market? The inside scoop for 2018
Predictions, schmedictions. The media is chock-full of them this time of year. So, we'll spare CSO readers from another look into the crystal ball. Instead here's some reality on how the cybersecurity industry looks as we enter the next calendar year. In a nutshell, big tech goes big cyber in 2018. Just about every major technology brand has advanced their position in cyber during 2017 — via product and service innovation, merger and acquisition activity, or simply reprioritizing the importance of security to its overall mix. Cybersecurity has long been a cottage industry composed of small point product companies, regional and national service providers, and a short list of unicorns ... Recent estimates by Cybersecurity Ventures puts global spending on cybersecurity at $1 trillion cumulatively over the five-year period from 2017 to 2021. The cyber crime epidemic — which is expected to cost the world $6 trillion annually by 2021, up from $3 trillion in 2015 — is fueling the market for cyber defense solutions. 


Leaders who don’t internalize the changes and make them part of the ecosystem will find obstacles at every turn, Siobhan points out. “The minute they try to push it into business, or ask finance for more money, the whole machine comes to a grinding halt,” she explains. “I’m a big fan of asking, ‘What was that internal moment you realized this big digital transformation meant you, as a manager, were also involved?’” As an example she describes the process when she worked with the American Automobile Association (AAA), where the goal was to change the compensation plan for tow truck drivers. Despite having “really smart consultants and lots of data, we had the hardest time, they resisted, people were unhappy.” Eventually, Siobhan took it upon herself to learn how to drive a tow truck to understand just how hard these people’s jobs were. “You’ve got to do the work you’re asking of others.”
always connected pc zoom
Qualcomm executives said they expect Snapdragon PCs will be manufactured by traditional smartphone vendors as well. In some sense, that’s already happened, said Asus chief executive Jerry Shen. “Asus has a history of designing beautiful devices for both the PC and smartphone,” he said. “We are well positioned to bring to life the benefits of LTE.” Terry Myerson, executive vice president of the Windows and Devices Group at Microsoft, recalled how he didn’t plug in a Snapdragon-powered PC for a week. “I’m seamlessly connected wherever I am: at work, commuting, visiting a customer at a hotel, at the airport—I’m always connected,” he said. “It feels like the natural way to work with all of my team, all of my partners.” Given its attendance at the Qualcomm event, Microsoft seems to view always-connected PCs as a sort of target of opportunity: More PCs mean more Windows licenses, and potentially more revenue.


Five mental shifts we must make to achieve security beyond perimeters

There was a time when keeping an eye on your network perimeter was sufficient to catch most threats. Today, that’s not the case. The 2017 Threat Landscape Survey from SANS found that endpoints and end users are now the front line of the battle against online threats. These are the most frequent targets for attackers who want to weasel into your organization’s network. Among the most common threats this past year were phishing and ransomware, both of which can often skirt traditional perimeter-based security solutions like firewalls and antivirus. Zero-day exploits, while less common, are a good example of how the most advanced threats laugh in the face of perimeter-based security. In light of this reality, understanding how the landscape has changed (and how it will continue to change) is the first key to better protecting your organization against the modern threat landscape.



Quote for the day:


Honor bespeaks worth. Confidence begets trust. Service brings satisfaction. Cooperation proves the quality of leadership. -- James Cash Penney


Daily Tech Digest - December 19, 2017

Big changes coming for the application delivery controller market

Big changes ahead for the application delivery controller market
Application delivery controllers (ADCs) have long been a critical piece of infrastructure. They sit between applications and infrastructure and are the only piece of technology that can speak the language of both applications and networks. I have often characterized the ADC as the “Rosetta Stone” of the data center, as it’s the key to being able to translate application speak to the network and vice versa. IT is undergoing a rapid modernization process, and things such as software-defined everything, the cloud, containers and other initiatives are having a profound impact on infrastructure.  To understand how these trends are impacting ADCs, I recently conducted an Application Delivery Controller Survey to get a pulse of IT professionals who work with ADCs. The demographics of the survey were 100 U.S.-based respondents across a variety of industry verticals and company sizes and is an accurate representation of the current opinions of ADCs with respect to IT modernization.



Why incident response is the best cybersecurity ROI

Why incident response is the best cybersecurity ROI
“In the event of a breach, companies that aren’t prepared for an attack and don’t have a well-defined incident response plan and/or budget may end up far outspending those who do,” says Payton. “First, it takes time to assess the issue, plan, find capable people, etc. The more time it takes to respond to an incident, the more room hackers will have to commandeer what they’d like. Second, if companies haven’t clearly defined how they will respond and who will take charge, staff will likely be taken away from their core duties, which in turn costs the company money,” she says. Payton agrees with Microsoft’s assertion that most organizations will suffer a hack. “Candidly, companies can't afford NOT to have an incident response plan in place. The reality we live in is that breaches are more of a 'when' scenario than an 'if,'" she says.


Russia-Based Kaspersky Lab Sues Trump Administration For Banning Its Software

"Kaspersky anti-virus products and solutions provide broad access to files and elevated privileges on the computers on which the software is installed, which can be exploited by malicious cyber actors to compromise those information systems," said the Department of Homeland Security's September statement. "The Department is concerned about the ties between certain Kaspersky officials and Russian intelligence and other government agencies." The DHS's directive gave government agencies 30 days to identify any presence of Kaspersky products, 60 days to develop plans to remove them, and 90 days to execute the plans. President Trump signed the ban into law last week as part of a broad defense policy bill. "There are concerns on record and some that suggest there has been direct collaboration with certain officials from Kaspersky and from the FSB, which is of course the successor to the KGB," Sen. Jean Shaheen, D-N.H., told NPR.


Build Out or Partner in Cybersecurity? The Debate Continues

Partnering
It’s a first pass litmus test that can be used to determine the risks and challenges associated with various business options. MSPs and solution providers should pledge themselves to that process before building out advanced cybersecurity practices. While tech companies can theoretically offer every available tool and provide a comprehensive portfolio of assessments and consulting services, that usually doesn’t make sense. Most channel firms have financial and resource utilization limitations. In other words, they can’t be all things to all people ̶ even in the cybersecurity space. Data and network protection is no longer a matter of installing and updating the right tools. An effective cybersecurity strategy now includes policy and procedure development, comprehensive and periodic network assessments, and advanced testing. Compliance with government regulations and industry standards adds to the complexity, with third-party evaluation requirements and other stipulations.


Next-gen automotive cybersecurity with software-defined perimeter and blockchain


In order to deliver cybersecurity technologies to address these specific questions for connected and autonomous vehicles, a number of factors must be considered, such as scaling globally to a massive number of vehicles, detecting software tampering and malware, support an array of telematics, information and safety applications, enabling precision access control to vehicle software suppliers, and meeting regional safety, privacy and driving regulations.Fortunately, there are two new emerging technologies, software-defined perimeter (SDP) and blockchain, that offer a path forward. SDP enables the provisioning of secure communications between the software process within the vehicle and cloud-hosted applications, while blockchain enables secure messaging. By combining the any-to-any connectivity of the SDP with the scale of the blockchain, an efficient cybersecurity model for connected and autonomous vehicles can be created.


U.S. Accuses North Korea of Mounting WannaCry Cyberattack

The conclusion was not by itself a surprise: The New York Times reported in May that North Korea was the leading suspect in the attack, which encrypted hard drives on hundreds of thousands of computers and demanded the payment of ransom to unlock the data. Later, British officials reported that their forensic evidence and intelligence pointed to Pyongyang, and Mr. Bossert wrote that in recent days, Microsoft and other companies that track major threats have closed pathways that the North’s army of hackers could use for similar breaches. Still, the assertion by the administration, which officials said would be supported at a White House news conference on Tuesday, was notable for three reasons. It came almost three years to the week since President Barack Obama, appearing in the White House press room, accused North Korea’s leadership of mounting a similarly sophisticated cyberattack on Sony Pictures Entertainment.


Disruption as a service: Where the tech industry will pounce in 2018

iot-cloud-to-edge.png
In a plot twist that only a data center hardware vendor could have written, compute, networking and storage gear is going to need more horsepower. Suddenly servers sitting near the edge of Internet of things devices are going to be pretty cool. Why? The cloud is critical to the Internet of things, but it's costly to shuttle data back and forth when analytics is needed on the fly. Dell Technologies, Hewlett-Packard Enterprise and other vendors are aligning to this IoT to the edge theme. ... "Data will be at the core at what we do. Most of the U.S. is in our database," said Hofmann. Indeed, Home Depot is modeling more than 1 trillion data points a week. Some of this data is transactional and a lot of it is tailored to location. As a result, Home Depot can understand communities, neighborhoods and businesses at scale. Home Depot can also see macro themes develop.


Let no endpoint go dark

self-healing endpoint visibility
If your workforce is using desktops, laptops, smartphones and tablets by Dell, Lenovo, HP, Asus, Microsoft, Samsung and dozens of other hardware manufacturers, Persistence is already built in at the factory, waiting to be activated via Absolute’s cloud-based platform. (The company offers Apple add-on support that isn’t embedded at the factory.) After Absolute Persistence is activated, it can’t be deactivated by anyone except the customer. Persistence lives up to its name, checking on endpoint controls and making sure they are present and healthy. If it detects that the control has been removed – whether accidentally or on purpose – it will automatically repair and reinstall it. In fact, there is no way for rogue employees, thieves or other attackers to prevent this “self-healing” process, as it can’t be thwarted by things like a replaced hard drive, flashed firmware, device re-imaging, or a smartphone/tablet clean wipe to factory settings.


Loapi malware capable of destroying Android phones

Loapi malware capable of destroying Android phones
One Loapi module is for spamming advertisements, opening various URLs, including pages in popular social networks such as Facebook or Instagram, as well as for displaying videos ads and banners. ... Another module is focused on manipulating text messages, using SMS messages to communicate with the attackers’ Command and Control (C&C) server. It also deletes text messages from the inbox and sent folder to keep the user in the dark about the information received from the C&C server. Yet another module is related to a web crawler, using hidden JavaScript to subscribe users to various services. If the subscription requires a text message confirmation, Loapi takes care of that, too. The researchers noted, “This module, together with the advertisement module, tried to open about 28,000 unique URLs on one device during our 24-hour experiment.”


Could blockchains rattle ECM?

Blockchains are distributed, crowd-validated ledgers which use internet-connected computers and open source software all over the world to verify transactions. One of their major benefits in financial transactions is their immunity to tampering, thanks to the built-in consensus mechanism. In theory, this could also make blockchain a secure, verifiable and permanent solution for exchanges of any kind – for managing records, for instance. Sweden’s land registry authority is currently exploring blockchains’ potential as a mechanism for recording property deals. In this context, the blockchain would confirm and save each step in the contract process between buyers and sellers, while making each deal’s information transparent to all parties such as banks and local governments. But how far could this go, and what does it mean for ECM as we know it? To assess the potential and any limitations we must consider what sets blockchains’ approach apart.



Quote for the day:


"Keep your fears to yourself, but share your courage with others." -- Robert Louis Stevenson


Daily Tech Digest - December 18, 2017

Best health and fitness gifts of 2017

gadgets primary pcw 2
Chances are your friends and family are going to stuff themselves silly with unfathomable calories between now and 2018. ... Not all of the gear below is geared toward weight loss and exercise, but everything isdesigned for general health and wellness, and I have direct experience with every single product. ... The home system comes with a foam pad that anchors the straps to a door frame, but I bought the optional steel anchor point that bolts into ceiling lumber. It’s an extremely versatile (and challenging) workout tool. So what makes this high-tech? It’s the TRX mobile app, which includes a wide variety of targeted workout routines, complete with video demos that illustrate exactly how to do each exercise. The mobile app can also elegantly balance the audio volume from your phone’s music player with workout instructions from the app. The TRX app hooks into various heart rate monitor too, but Fitbit and Garmin devices aren’t supported.



“Hybrid Cloud Serves As An Ideal Foundation To Build A Digital Enterprise”

Definitely. From cost containment to hybrid strategies, CIOs are getting more creative in taking advantage of the latest offerings and the cloud’s economies of scale. This is being fueled by the need for enterprises to scale their resources to serve their customers better. The adoption of hybrid cloud has multiple benefits and serves as an ideal foundation to build a digital enterprise. It provides interoperability and helps a company’s systems become far more compatible with other systems.  One of the key benefits of a hybrid cloud is provisioning at a lower cost and high speed (as and when required functionality of the public cloud component). A properly configured hybrid cloud solution changes the conversation between IT and the business as it shortens timeframes and expands possibilities. Hybrid cloud helps companies get a combination of the private and the public model and enables them to innovate and iterate faster at a lower cost.


Mastering the three top tenets of digital transformation


Suddenly the definition of Content has been broadened as a “center of everything,” to be identified, accessed, re-purposed and distributed. The practice of managing content will effectively help organizations take operational control of their data and intellectual property in order to deliver a business’s growth potential. Strategy in a digital world needs to be intentional and grounded in good design that strives to adhere to business requirements and provides an organized solution for those it impacts. But what exactly is this transformation, what does it impact upon, and, as importantly, how is it done? The new strategy for success is built around customers, your data and your content. At face value this may sound daunting, but ensuring harmony and an uninterrupted cycle of ongoing transformation is what every business needs to excel in this new age of digital. Success is within reach if your organization can honor and embrace the following tenets


What To Expect in 2018: Our Top Predictions For the New Year

What To Expect in 2018: Our Top Predictions For the New Year
In 2018, expect at least one data analytics vendor to open source its middleware (i.e. services layer) and encourage competitors and others to plug into it. The data analytics middleware will have a robust SQL and programmatic interface (API) that serves as a universal semantic layer for both analytics capabilities on the front-end and data assembly, integration, and preparation functions on the back-end. Customers have long wanted vendor-agnostic middleware for data analytics, and the time is right for one or more courageous vendors to step forward and open up the crown jewels. Data Engineering becomes the new in-demand skill as companies seek top talent to design and build data pipelines and data services. Data engineering will be recognized as a multi-disciplinary skill that spans database architecture, microservices architecture, data modeling, programming, Hadoop technologies, NoSQL databases, and data stream processing.


Finding Growth in the Face of Disruption

Mike Schwartz—a blockchain expert and partner at BCG Digital Ventures—began his talk by asking how many people in the room were from companies that act as intermediaries. He then proceeded to describe how blockchain can “cut out the middleman.” He sketched out ways that blockchain can be leveraged to create industry and sector platforms that offer radical transparency and traceability of, for instance, supply chains and transaction histories. Schwartz also predicted that many of blockchain’s current technical limitations related to speed and cost are on the cusp of resolution—as early as 2018. As a consequence, executives need to carefully assess what blockchain could mean to their businesses and rethink their strategies in that context. Brooks CEO Stephen Schwartz said that a study of who was citing the company’s patents revealed that the company had a key capability for controlling motion in a range of cryogenic application environments and opened management’s eyes to the opportunity in the storage and transfer of biological samples.


What to know before you get started with TensorFlow machine learning

What to know before you get started with TensorFlow machine learning
“Unless you already know about machine learning and how to bring it to production, you probably don’t understand the complexities that you are about to add to your company’s life cycle. On the other hand, if you have done this before, well-done machine learning can definitely be a really surprisingly large differentiator,” Dunning says. Open source projects like TensorFlow can dramatically improve an enterprise’s chances of machine learning success. TensorFlow “has made it possible for people without advanced mathematical training to build complex—and sometimes useful—models.” That’s a big deal, and points to TensorFlow, or other similar projects, as the best on-ramp to machine learning for most organizations. ... A successful dataops team involves complicated lines of communication and a multipronged development process. Couple those complexities with the reality that machine learning systems “can easily have hidden and very subtle dependencies,” and you have a perfect form for things going awry.


Digital trends that will shape 2018

When it comes to consumer VR, the technology remains expensive and gaming dominates the landscape. Consumers today need to buy expensive, dedicated hardware to get a true VR experience. Prices of this equipment are likely to fall in 2018, while smartphone VR headsets will also get cheaper and better. Apps will become more diverse—we’ll see a healthy mix of educational, simulation, virtual tourism and entertainment applications come to market. AR captures the world through a mobile device camera and puts a digital overlay on the video and image the user sees on the display. Applications are numerous—from seeing how furniture you’re browsing on a retailer’s website might look in your lounge to providing labels and information about the parts in your car when you’re trying to find out why it won’t start in the morning.


How The Chief Information Risk Officer Brings A Strategic Opportunity For Business


How the Chief Information Risk Officer brings a strategic opportunity for business


In order to address this constant shift, organizations must realign and reorganize. The focus of the leader has now shifted from protecting data to managing the risks associated with data as well as analyzing and reducing vulnerabilities associated with cyber security risks. With this shift, has emerged a new role: The Chief Information Risk Officer (CIRO). The CIRO role brings a new and strategic opportunity for security leaders. The main job of Chief Information Security Officer (CISO) and chief information officer (CIO) has been to implement security technologies, protect data, and keep assets secure. However, the role of a CIRO goes beyond it. It extends beyond security to managing information risk as well as providing a unified risk perspective to the Board of Directors. It must involve defining a risk appetite and setting up right controls to maintain cyber resilience and manage the threat landscape of the organization.


2017 cognitive technologies survey

cognitive technology survey
With all the talk about cognitive and artificial intelligence (AI) technologies in business circles today, it's natural to wonder whether these capabilities are having any measurable impact. So we asked some of the most aggressive adopters of cognitive technologies how they have fared to date, focusing on 250 "cognitive-aware" leaders within "cognitive-active" companies. Why this group in particular? Not only can early-phase signals from such early adopters provide a view from the front lines of these important developments, but many other executives are simply not yet sufficiently knowledgeable about cognitive technologies. So what did these leaders tell us? When these technologies are effectively integrated into workflows, they can directly influence how organizations accomplish tasks, make decisions, create engaging interactions, and generate stronger business outcomes.


Bitcoin's illiquidity is going to be a huge problem when the bubble bursts

Imagine how bad this is going to get on the day some negative news hits the wires and the really significant holders of bitcoin decide, "I've had enough of this. I've made my money. I am bailing." The majority of bitcoins are held by a tiny percentage of the market. 40% are held by 1,000 people . Those few major holders can crash the market whenever they want.  As anyone who remembers the market crashes of 2000 and 2008 knows, these things happen fast. Billions get wiped off the market in minutes. People who need to cash out now, but who are an hour or so behind the news, can lose their shirts. It is brutal. And blockchain just isn't equipped to deal with it. Part of the increase in transaction time has, no doubt, been caused by the recent arrival of new, less knowledgeable investors who are coming into the market only because they have seen the headlines about the price of bitcoin going up, up, up.



Quote for the day:


"If you care enough for a result, you will most certainly attain it." -- William James