Daily Tech Digest - April 03, 2018

connection network blockchain artificial intelligence ai
At Nvidia's GPU Technology Conference (GTC), Pure Storage announced a turnkey solution to simplify the deployment of AI infrastructure. The product, known as AIRI (AI Ready Infrastructure), is a validated, optimized solution that includes Pure Storage’s FlashBlade, 100 Gig-E switches from Arista, four DGX-1 servers from Nvidia, and all the software required to operationalize AI at scale. The product is supported by the Nvidia GPU Cloud deep learning stack and Pure Storage AIRI Scaling Toolkit, enabling data scientists to get to work in a few hours instead of months. The product is similar to other converged infrastructure products, such as Cisco’s FlexPod and Dell-EMCs VxBlock, that offer a turnkey way for businesses to stand up a private cloud in under a day. I’ve talked to customers of both products, and they told me that the converged products take all the complexity out of the deployment so companies can start using the infrastructure immediately. Converged infrastructure was huge leap forward for private clouds, and I expect it to have a similar impact on AI.


How To Disaster Proof Your Business IT

Ransomware has become a major risk in the past few years. It scrambles the data on computers and backups and then demands a payment for the code to restore the files. Making the payment doesn’t always get the mangled files back. Most small businesses have no disaster recovery plan. Nationwide Insurance reports that only 18 percent of companies in the United States with fewer than 50 employees have such a plan. The report estimates that 25 percent of businesses don’t reopen after a major disaster. Small businesses are at greater risk, since the loss of one server won’t wipe out a huge enterprise but could ruin a small shop. Having a plan significantly improves the chances of survival. Insurance can cover the replacement cost of lost physical assets, but money won’t get back lost data. Replacing a computer requires setting it up with the software and data from the old machine, and this is very hard if you’re caught unprepared. The good news is that there are cost-effective ways for small businesses to protect their data from catastrophic loss and get running again quickly.


Smart cities need the cloud—and vice versa

Smart cities need the cloud—and vice versa
The real advantage of using mostly public clouds to create and run smart cities is not the capabilities of the various clouds to host basic compute and storage in support of city automation. It’s the ability to reuse common smart city services across cities, services that will be sold and managed by the public cloud providers.The fundamental larger role of public cloud providers is to create sets of cloud services that will deliver best practices via services to all cities that want to become smart cities. The public cloud providers will essentially be the vehicle for sharing this technology. And they need cities to help define those services. The larger piece of the puzzle is cost reduction. There is no real reason to become a smart city unless it’s going to reduce city operations costs, as well as deliver citizen services better than you did before. In other words, it’s not enough to become “smart”; you need to spend tax dollars in more effective ways. Some cities are now successfully evolving into smart cities, paving the way for other city governments to follow.


Is Security Accelerating Your Business?

Small, departmental SaaS footprints expanded enterprise-wide and eventually evolved into cross-functional application and services platforms. To a certain degree, shortcomings and delays in application deployments also gave rise to "shadow IT" — a complete circumvention of the security process. This trend of embracing simplicity and speed has progressed into the consumerization of the infrastructure, as shown by the continued growth of infrastructure-as-a-service (IaaS) offerings such as Amazon Web Services and Microsoft Azure. With the increased adoption and simplicity of cloud deployment, the barrier to entry to spin up and deploy services has dropped dramatically, and this has increased the security gap in visibility and controls for these types of deployments. A recent survey from RightScale on cloud adoption revealed that less than half of application or business owners plan to delegate authority to central IT for the selection of public cloud services, which supports the notion that business leaders are opting for the easiest path forward when it comes to application deployment.


SD-WAN best path to virtualized networks of the future


As the virtualized network strategy with the most going for it, SD-WAN has the most fundamental role in virtualization and the broadest base of interested parties, not SDN or NFV. SD-WAN could be the transformational strategy of the current age. Not only does it disconnect service from the details of infrastructure, SD-WAN opens the door for infrastructure to change by adopting other virtualization technologies, including SDN and NFV. Because SD-WAN runs above infrastructure, and because it can be deployed by enterprises, network operators and managed services providers, fear of change or high levels of legacy infrastructure cost can't stall it out. Ten years from now, most business services probably will be SD-WAN-based, and cloud service delivery will be dominated by SD-WAN, too. Over the next decade, SD-WAN will both pave the way to change and define how network changes are matched to consumer and business services.


Are legacy technologies a threat to EU’s telecom infrastructure?

Mobile networks worldwide are still depending on SS7 and Diameter for controlling communications as well as on sets of protocols that were designed decades ago without giving adequate effect to modern day security implications. In this respect, the interconnected environment has become perilous. As today’s society is becoming more and more digital, such vulnerabilities might inhibit the proper functioning of the mobile networks, thereby impacting the operation of the digital markets. A full range of new services is being developed or is relying on the primary infrastructure offered by electronic communication providers  “In this context, ENISA has developed a study, which has examined a critical area of electronic communications: the security of interconnections in electronic communications, also known as signalling security. An EU level assessment of the current situation has been developed, so that we better understand the threat level, measures in place and possible next steps to be taken,” said Udo Helmbrecht, ENISA’s Executive Director.


Microsoft Announces 'Windows ML' Platform for AI-Assisted Windows 10 Apps


Microsoft today said Windows 10 developers will soon be able to more easily infuse artificial intelligence (AI) functionality into their apps with the help of a new machine learning platform coming in the next update of the OS. The announcement was made at today's Windows Developers Day event. Further information was provided in a post titled "AI Platform for Windows Developers," in which the company said the AI expertise it developed in products like Cortana and Bing Search will be made available to Windows app coders. "With the next major update to Windows 10, we begin to deliver the advances that have been built into our apps and services as part of the Windows 10 platform," Microsoft said. "Every developer that builds apps on Windows 10 will be able to use AI to deliver more powerful and engaging experiences." Initially, the AI functionality will focus on machine learning, as different partners like Qualcomm Technologies and AMD will help out with the "Windows ML" platform.


Microsoft wants you on Edge, even if it has to trick you

microsoft edge browser logo
Is Microsoft doing something to address one of the browser’s biggest problems, a paucity of extensions compared to competing browsers? Once again, the answer is no. As I write this, a total of 99 extensions are available for Edge, compared to many thousands for Chrome and Firefox. So what is Microsoft’s grand plan for convincing you and millions of others to switch from your current browser to Edge? It’s this: In the fall update to Window 10, Windows’ built-in email app will open all links in Edge rather than the browser you’ve set as your default. So you may want to use Chrome, for example, but if you use Windows Mail to open a link, you’ll use Edge whether you like it or not. And clearly, given Edge’s dismal market share, you won’t like it. Microsoft is currently testing this feature in the latest version of the public preview of the Windows 10 update that will be released in the fall. And if you believe the company, Microsoft isn’t doing it because it wants you to switch to Edge.


How Integrative Thinking Promotes Innovative Problem-Solving

Note on cork board: freethinkers wanted
The most successful organizational leaders I’ve encountered, including the one in the case study, are relentless about seeking out the counter-intuitive approach to their business challenges. They resist the rush to choose between traditional tactics and instead strive to reframe difficult situations as, “What if?” type opportunities. In every circumstance where I’ve observed the application of integrative thinking, it didn’t happen without the individual silencing the reflexive, pattern-matching portion of the brain and creating opportunities for new ideas to flood the system. The GM in the case study indicated to me that she would never have conceived of the idea without breaking the habit of asking customers about their satisfaction with her unit’s products. Instead, she and her team members stepped back and just observed. What they saw convinced them the customers had much bigger fish to fry than worrying about her unit’s offerings. While her unit was focused on creating the next version, running the latest price promotion, or building a new, low-cost product, the customers were barely treading water trying to tie systems together and use the data to serve their customers.


Automation and gamification key to cyber security

By pairing human intelligence with automated tasks and putting human-machine teaming into practice, the report said automated programs handle basic security protocols while practitioners have their time freed up to proactively address unknown threats. Most respondents (81%) believe their organisation’s cyber security would be stronger if it implemented greater automation, a quarter said that automation frees up time to focus on innovation and value-added work, while nearly a third (32 percent) of those not investing in automation say it is due to lack of in-house skills Gamification, the concept of applying elements of game-playing to non-game activities, is growing in importance as a tool to help drive a higher performing cyber security organisation, the survey found. Within organisations that hold gamification exercises, hackathons, capture-the-flag, red team-blue team or bug bounty programs are the most common, and almost all (96%) of those that use gamification in the workplace report seeing benefits.



Quote for the day:



"Data is the oil of the 21st century. But oil is just useless thick goop until you refine it into fuel." -- @ValaAfshar


Daily Tech Digest - April 02, 2018

Augmented reality, outer space and emerging technology

USA TODAY 321 Launch
The publishing industry is in an interesting place. Monetization has been a challenge since the dawn of digital and Facebook’s recent algorithm change, prioritizing posts from your actual friends, demonstrates just how much publishers need to look beyond ad revenue. While many try to figure out how to create subscription models, USA TODAY is doing something anomalous for the industry: investing in emerging technology. Last week, USA TODAY debuted an augmented reality (AR) app called 321 Launch. ... “We didn’t do this just so we can say we’re doing AR,” says Ray Soto, the USA TODAY NETWORK’s Director of Emerging Technologies. “When you consider the future of what AR could be, it’s taking these building blocks and leveraging location-based data to really change storytelling.” 321 Launch is the result of a partnership between USA TODAY and the network’s Florida Today newspaper, which is based in Brevard County, home of Cape Canaveral. USA TODAY had been wanting to experiment with AR anyway and Florida Today reached out with an idea about collaborating around space rocket launches.



Main Street Cybersecurity: Can Email Be Safe?

Can email be safe? Yes, but it will require new thinking across the board. Processes and technologies will continue to improve their ability to identify malicious emails, but attackers will improve their delivery methods and capabilities as well. For Main Street, the most affected recipients of potentially malicious emails, better education on how to discern good from bad emails (on their own) may be their first and best defense. What follows is an initial checklist for people on Main Street who read email to keep in mind before opening that next unknown email attachment. If you have questions or comment regarding this article please connect with us on twitter @Release2I. Keeping all your software and operating systems up to date is one of the easiest things that can be done to protect your computers. Almost all current operating systems have the ability to automatically download and apply patches on a regular basis- enable this capability. Malware delivered by email often attempts to exploit OS vulnerabilities, so if your system is “up to date” patch wise, you are less exposed.


The Invisible Hand Of Financial Services


Like most industries, banking changed dramatically due to rapid globalization and digitalization. The scale of banks grew and matured into what we see now: the modern global financial-services industry—a dynamic, interwoven system of global capital movement and interdependent technologies. With increased regulatory pressure and capital requirements, the number of global financial institutions has fallen dramatically. For example, the number of banks in the United States went from 14,400 in first-quarter 1984 to 4,938 in third-quarter 2017. This increased industry consolidation coupled with enterprise expansion has resulted in more efficient institutions, but only a handful of banks dominate nearly every geographic market. This is not necessarily good for financial customers. Large publicly traded financial-services firms have suffered from short-term thinking and strategies driven by fiscal quarters and financial results. Collective industry decisions around banking solutions dominated purely by a profit motive are rarely in the public interest.


Top 10 Testing Frameworks and Libraries for Java Developers

Testing is one of the disciplines that separates professional developers from amateur ones. It's not about following TDD, BDD, or whatever testing methodologies, but at the very minimum level, you must write code to test your code automatically. Many Java developers write unit tests and integration tests that automatically run during build time, mostly by using continuous integration tools like Jenkins or TeamCity. If some of you are wondering why a programmer should focus on automation testing, then let me tell you that the importance of automation testing is growing exponentially due to more awareness and emergence of DevOps. Companies generally prefer programmers who are good at writing unit tests and show good knowledge of various unit testing frameworks, libraries, and tools e.g. JUnit, Selenium, REST-Assured, Spock framework, etc. As a Java developer, we work on very different areas, starts from writing core Java code to creating JSP pages, writing REST APIs, and sometimes even creating Groovy scripts for build automation.


SD-Branch market expected to reach $3 billion by 2022

SD-Branch market expected to reach $3 billion by 2022
SD-Branch solutions are just reaching the market during 2018 — so spending will remain small this year. Expect SD-Branch adoption to accelerate during 2019-2021 as many suppliers introduce new products and as distributed organizations achieve CAPEX and OPEX benefits. Doyle Research forecasts that worldwide expenditures on SD-Branch solutions will reach $3 billion by 2022. SD-Branch is defined as having SD-WAN, routing, network security, and LAN/Wi-Fi functions all in one platform with integrated, centralized management. Software-based networking technologies such as software-defined networking (SDN), software-defined WAN (SD-WAN), and network functions virtualization (NFV) have abstracted network intelligence from the integrated network appliance (aka black box). The concept of the SD-Branch is to leverage network virtualization to run several discrete functions on a single platform. Advances in silicon from Intel, ARM, and Broadcom enable the network horsepower to run routing, SD-WAN, network security, and Wi-Fi functionality on one hardware platform.


Samsung’s Big Dreams For India

It has been a hard fought battle to win this market. Perceptions, market wars, opportunities, competition — sometimes from their traditional foreign rivals, sometimes from local upstarts, and lately, the Chinese. But every single time Samsung has been able to stave off the threats and hold its ground. It has continued to be the market leader in the television segment for over 12 years and in the mobile business for six years, after it toppled Nokia in 2012. Since then, there has been no looking back. Or so it seemed till now.  Perhaps it is their Korean culture of doggedness to be No. 1, or their pursuit for product excellence as borne out in their bitter rivalry with the Japanese in each business — from electronics to automobiles, that keeps them going. Or is it something else? “There is more to our story and central to that is our consumer-centric approach to whatever we do especially in India. We call it ‘Make for India’,” says Asim Warsi, Senior Vice President, Samsung India, with the exuberance of today’s millennials whom he is out to impress every day to encourage buying Samsung smartphones, TVs and home appliances.


Neuroevolution Will Push AI Development to the Next Level

Image: Shutterstock
Any serious effort to develop “artificial general intelligence” must at some point recapitulate the evolutionary process within which neural networks took shape and became attuned to world around them. Artificial intelligence researchers have been developing more sophisticated “neuroevolution” approaches for many years. Now it would seem that the time is right for these to enter the mainstream of commercialized AI in a big way. As AI becomes the driving force behind robotics, more developers are exploring alternative approaches for training robots to master the near-endless range of environmental tasks for which they’re being designed. There is fresh interest in approaches that can train robots to walk as well as humans, swim like dolphins, swing from trees like gibbons, and maneuver with the aerial agility of bats. As I noted here, the robotics revolution has spurred AI researchers to broaden the scope of intelligence to encompass any innate faculty that enables any entity to explore, exploit, adapt, and survive in some environment.


HPE Aruba launches AI solution for autonomous enterprise networking

According to the tech giant, this new set of partners will "create modern workplaces that uniquely pair end-user mobility, secure connectivity, and location with the sensory context of enterprise IoT," ranging from personalized workspaces to predictive maintenance and fully automated conference rooms. "Companies are reevaluating their real estate strategies to better align with and enable the future of work," said Francisco Acoba, Managing Director of Deloitte Consulting. "The smart digital workplace is now a major point of differentiation for organizations as employers look to attract, retain and grow today's talent." "The future of work will be defined by smart workplace experiences, and corporate real estate leaders along with their IT counterparts should consider embracing how mobility and enterprise IoT will transform the physical office," the executive added. According to research agency Gartner, almost half of CIOs are planning to pilot AI projects in the near future, while four percent are already exploring the potential value of AI-based solutions.


Facial Recognition Tech Moves From Smartphones To Boardroom

facial recognition access identification biotech
"There's a whole lot of data carried in your face: your age, your gender, even your emotional state at the time. And, those are things that could be useful outside of simply authentication," Aley said. Ever AI's software was developed using a massive store of video and images contained in a consumer photo and video cloud storage service, EverAlbum (now simply called Ever). The app, available in the Apple App and Android Play stores, lets users organize their image and video albums from multiple services. Ever AI collected a data set of 13 billion images that were tagged by users – similar to how photos are tagged in Facebook – with the names of those in the photos, Aley said. From that point, on, all future photos of those people are tagged automatically (with the user's permission) so users can find those photos easily. "This creates an 'identity' for those people," Aley said. The data store was used to train facial recognition algorithms, which resulted in a more accurate consumer application; Aley claims the company's enterprise facial recognition software is 99.8% accurate.


The ROI of Being Data-Driven

Every company tries to provide value to their customers. The more value they provide to their customers, the more the value of the company goes up (at least in theory). But one may ask: How do you measure the value of a business? The financial industry has come up with various ways to measure the value of a business. Two of the most common financial measures that people look at are EV(Enterprise Value) and EBITDA (Earnings Before Interest, Taxes, Depreciation, and Amortization). The ratio of EV/EBITDA is commonly used when comparing a firm's fiscal performance. The lower the value of the ratio, the more attractive your company is for private and individual investors. Alternatively, the best way to decrease the value of the fraction is by having a high EBITDA value. Calculating EBITDA for all non-financial purposes is the same as EBIT, which is revenues minus expenses. Therefore, the higher the revenues and lower the expenses, the higher the value of the business, which completely makes sense!



Quote for the day:


"Be The Kind Of Leader You Would Want To Follow." -- Gordon TredGold


Daily Tech Digest - April 01, 2018

Roubini States That Blockchain Is Pure Hype

Roubini States That Blockchain Is Pure Hype
To begin with, blockchain technology is less efficient than existing databases. When someone says that their project is working on blockchain, in reality, as a rule, the operation of a program reproduced on a variety of other devices is implied. In this case, the storage space requirements and processing power are much higher, and the transaction speed is much lower than when using a centralized program. Blockchain with the technologies of proof-of-stake or zero-knowledge require that all transactions be verified cryptographically, and this slows down their work. A blockchain with the technologies of proof-of-work, used in many popular cryptocurrencies, raises another problem as they require huge amounts of energy to ensure their work. That is why operations for the mining of Bitcoins in Iceland this year already can begin to consume more electricity than all Icelandic households put together. Blockchain can make sense only in cases where the exchange of speed for the quality of verification is really needed, but this technology is rarely promoted in this capacity.



Blockchain will make AI smarter by feeding it better data


The current challenge to smaller businesses isn’t the cost of AI systems — they’re increasingly more affordable and accessible. The barrier is gaining access to enough high quality data about customers to adequately power those systems. Few retailers can recognize their customers across multiple channels and devices, and they often rely on third-party, behavioral data that doesn’t give them a complete understanding of what products customers want to buy. Moreover, most retailers handle only a small slice of each of their customer’s purchases, hardly enough to make these AI systems work well. That’s why blockchain technology is so transformative. Its key innovation is to create a database that is open and decentralized, yet with strict controls over privacy. Shoppers could authorize all the stores they patronize to contribute data about their purchases to a blockchain ledger that protects the privacy of both consumers and retailers.



Dividing frontend from backend is an antipattern

Contemporary frontend work has evolved in complexity to the extent that we should no longer separate frontend from backend roles. Frontend engineers now solve the same kinds of problems as their backend counterparts, using the same kinds of solutions, and it is harmful to continue arbitrarily dividing us. To be clear, I’m not saying that we all need to be experts in everything. That would be impossible. Today’s technology stack goes down a long way, so being a genuinely balanced full-stack dev is probably not the most realistic of goals — but staying open-minded is. While it is perfectly valid to dislike a particular technology, such as CSS, the industry's culture of contempt for frontend work feeds into the outdated divide between frontend and backend, and detracts from building fast-moving, competitive teams and companies. Think of yourself as a developer first. Investigate frontend technologies, pair with UI specialists, evangelize your colleagues.


Man vs machine: How each responds to deception defenses

Russian hackers are targeting a number of political organizations.
If you use the same password for multiple systems, this analysis shows you should avoid this practice. Migrate to unique long pass phrases with less rotation and always consider multi-factor authentication when available. In general, human attackers are attracted to files that may contain configuration instructions for an application with a username and password for a specific individual or a shared account. Another popular file example is technical documents such as those providing information on how to use a corporate VPN service. Personal files with confidential information, IT/Corporate files, logs, databases, and reviewing recent files for Windows or Office are popular with human attackers and make good breadcrumbs and traps. Poisoned data within files including fake, planted credentials provides a valuable lure to detect attackers as they reuse them. On the other hand, malware due to its machine automation prefers structured data found in applications. Examples include session apps, web browsers, and uninstall information for applications.


Big Blue Is Finally Getting Serious About Cryptocurrency

Lund breaks down the demand IBM is seeing into three main kinds of tokens: securities tokens that give owners a stake in the issuing company, utility tokens that give users access to a service such as phone minutes and commodities tokens that represent precious metals and other physical assets. "We're actually seeing a move toward the issuance of tokens that have a higher velocity that represent, for example, a claim on a portion of gold bullion sitting in a vault somewhere," he said. Beyond the obvious potential interest in this work from commodities exchanges, Lund said IBM is being approached by retail companies, beverage providers and energy companies looking to tokenize various aspects of their business offerings. A fourth category of companies Lund said is approaching IBM are startups looking to raise capital, though he admits these opportunities have proved less enticing.


Artificial Intelligence: Optimising Your Recruitment & Avoiding Bias

AI diversity recruitment bias
The machine learning technology at the heart of Textio means that the more it is used, the better its analysis becomes. Conclusions drawn from previous job adverts enable the algorithms to give posts a score based on the tone and gendered nature of language used. Textio can predict if a post is likely to attract female or male respondents, and even how long it will take for the position to be filled. It can offer guidance on how to improve writing, enabling businesses to attract better qualified and more diverse talent in less time. It seems to be a win-win for HR. Critics of this kind of system may point out the potentially homogenising effect it could have upon the written word. Will technology like Textio make all job adverts the same? Could it lead to a process of levelling down, where only the most vanilla of workers are able to gain employment? Hesitancy around this technology is understandable: writing is a fundamental part of human expression, and it’s not clear that we want machines to start meddling in it. In fact, job adverts provide a unique opportunity for businesses to convey their ethos to potential employees.


Microsoft inches closer to commercially-viable quantum computing

quantum.jpg
Microsoft is slowly making headway in the race toward commercially-viable quantum computing, tapping into the unique properties of a certain particle to address issues engineers at many tech companies have been struggling with for decades. Alphabet, IBM, and a number of smaller companies are all competing for "quantum supremacy," a disputed term referring to the point at which quantum computers will be able to handle calculations beyond the capacity of the world's best supercomputers. "[Quantum supremacy] is very catchy, but it's a bit confusing and oversells what quantum computers will be able to do," Simon Benjamin, a quantum expert at Oxford University, told MIT's Technology Review. He added that even as the abilities of quantum computers improve, classic computers will still be faster and cheaper. "Using a quantum computer would be like chartering a jumbo jet to cross the road," Benjamin said.


How Nvidia is helping autonomous cars simulate their way to safety

how nvidia is helping autonomous cars simulate their way to safety gtc path billions of miles
To further improve simulations, Nvidia, and some of its partners, are using data from the sensors of autonomous vehicles to build higher definition maps. When autonomous vehicles hit the road, these machines will not only rely on the data that is available through training, but also contribute to data collection by sharing the data that it has captured from its LIDAR, IR, radar, and camera arrays. When this newly captured data is combined through deep learning with existing low-quality data sets, it will make streets and roads look more photo-realistic. Cognata claims that its algorithms can process the data in a way to bring out details in shadows and highlights, much like an HDR photo from your smartphone’s camera, to create a high-quality scene. While simulation is an excellent tool, Atsmon noted it has its own flaws. It’s too simple, and for autonomous driving to be realistic, it must learn from edge cases. Cognata claims that it only takes a few clicks to program in an edge case to validate autonomous vehicles for more unusual driving scenarios.


Disruption vs. Innovation: Defining Success

Disruption vs. Innovation: Defining Success
Innovation or rapid evolutionary innovation, as I define it, is turning your dreams into reality, or manifesting what you envision. Disruptive companies are those whose innovations or innovative processes completely change the market they serve. They might use an innovation to accomplish their goals, but not all innovations are disruptive. In other words, not all innovations cause a business or market to rapidly evolve. I firmly believe that all businesses must evolve over time in order to stay competitive in the marketplace, and that has shown to be true when it comes to disruption. Companies need appreciable time for their services to evolve and react to the needs of the market. Disruption does not happen overnight; neither does success. There are many so-called "overnight successes" that have actually been around for decades before finally reaching the tipping point and having mass appeal or nationwide/worldwide recognition.


5 Things You Should Know About the Cloud, But Were Afraid to Ask

tower disappearing into the clouds
Depending on whom you believe, cloud computing goes back as far as the early 1960s, with J.C.R. Licklider and the introduction of the Advanced Research Projects Agency Network (a.k.a. ARPANET) or as recent as 2006, when former Google CEO Eric Schmidt purportedly coined the term “cloud computing” at an industry conference. Whichever origin story you buy into, the cloud has clearly taken off and with it, business, IT and marketing leaders are clamoring to assess where things are now and where they may be headed. What follows are five fundamental observations about the cloud today (in no particular order). I hope these thoughts from the front line are useful and maybe even a bit of a provocative look at the cloud. ... The good news is the agility that comes with being on the cloud pays off in the intermediate to long-run. What’s more, it’s becoming clear in the urgent communication we see from organizations not yet on the cloud that if you don’t do it, you’ll fall behind — which creates its own kind of costs.



Quote for the day:


"Change is the end result of all true learning." -- Leo Buscaglia


Daily Tech Digest - March 31, 2018

visa.jpg
Under the new proposal, individuals would be required to disclose social media usernames (though not passwords) when applying for a visa to enter the United States, which would affect nearly 15 million people per year, according to the AP report. The proposal would require applicants to disclose five years worth of social media usernames on platforms identified in the application form (Facebook, Twitter, etc.) while providing a separate field for applicants to volunteer the usernames of platforms not specifically identified in the form. Previous implementations of this rule applied only to people individually identified for additional background checks, which the AP report indicates is about 65,000 people annually. The idea of collecting social media information of visa applicants started during the Obama administration following the 2015 San Bernardino attack. 


Everything You Were Afraid to Ask About Crypto Taxes

Many cryptocurrency investors have made a fortune the past several years selling high-flying bitcoin and other cryptocurrencies for cash. Unfortunately, far too many of them in the U.S. did not report this taxable income to the IRS. The agency figures hundreds of thousands of U.S. residents did not report income from sales or exchanges of cryptocurrency and it might be able to collect several billion dollars in back taxes, penalties, and interest. ... The character of the gain or loss generally depends on whether the virtual currency is a capital asset in the hands of the taxpayer. If it is, a taxpayer generally realizes a capital gain or loss on the sale. If not, the taxpayer realizes an ordinary gain or loss. The distinction is more than academic. ... When a taxpayer successfully mines virtual currency, the fair market value of the virtual currency generated as of the date of receipt is includable in gross income.


Don’t get surprised by the cloud’s data-egress fees

Don̢۪t get surprised by the cloud̢۪s data-egress fees
Keep this in mind: Most companies that use public clouds pay these fees for day-to-day transactions, such as moving data from cloud-based storage to on-premises storage. Those just starting out with cloud won’t feel the sting of these fees, but advanced users could end up pushing and pulling terabytes of data from their cloud provider and end up with a significant egress bill.  It’s not major money that will break the budget, but egress fees are often overlooked when doing business planning and when considering the ROI of cloud hosting. Indeed, for at least the next few years, IT organizations will be making their cloud-based applications and data work and play well with on-premises data. That means a lot of data will move back and forth, and that means higher egress fees. My best advice is to put automated cost usage and cost governance tools in place to make sure you understand what’s being charged, and for what services.


Agile’s dark secret? IT has little need for the usual methodologies

Buy-when-you-can/build-when-you-have-to is profoundly different. When IT implements multiple COTS/SaaS packages, existing databases make the job harder, not easier. Each package comes with its own database, and when the software vendors design their databases they don’t take the ones you already have into account because they can’t. They also don’t take the ones other vendors have already designed into account because why would they? So when IT implements a COTS package it has to track down all the existing databases that store the same data the new application manages too — not to take advantage of it, but to figure out how to keep the overlapping data synchronized. When it comes to managing data, internal development and package implementations are completely different.


Cyber threat to energy infrastructure, Kapersky Lab research finds

Cyber threat to energy infrastructure, Kapersky Lab research finds
Cyber security incidents and targeted attacks over the past couple of years, along with regulatory initiatives make a strong case for the power and energy companies to start adopting cyber security products and measures for their operational technology (OT) systems. Moreover, the modern power grid is one of the most extensive systems of interconnected industrial objects, with a large number of computers connected to the network and a relatively high degree of exposure to cyber threats, as demonstrated by Kaspersky Lab ICS CERT statistics. In turn, the high percentage of attacked ICS computers in engineering and ICS Integration businesses is another serious problem given the fact that the supply chain attack vector has been used in some devastating attacks in recent years.


ICS cybersecurity: The missing ingredient in the IoT growth equation

There’s a lot to be gained by adopting connected IoT or IIoT technologies within OT networks and industrial control systems (ICS) environments. By using common internet protocols combined with the cost-savings of using connected terminals, industrial operations can utilize real-time analytics and multisite connectivity to improve efficiencies across numerous industrial verticals. So, why have ICS practitioners and stakeholders not adopted these new technologies? One word: security. As OT networks begin to integrate more intelligence, such as intelligent human-machine interface and cloud SCADA, ICS practitioners are now unable to reconcile the new security risks that have been created as a result. Since OT networks control critical infrastructure and processes, network failure inherently comes at a greater consequence than in typical IT networks. The potential for substantial financial loss, environmental damage and even loss of human life resulting from a security breach is a real possibility in the industrial realm.


Why Blockchain adoption has stalled in financial services and banking

blcokchaimn.jpg
To be sure, there's no shortage of hype and hope about what blockchain could do for banks and other financial services firms. As The Financial Times detailed, banks could use blockchain technology for everything from the recording and updating of customer identities to the clearing and settlement of lands and securities. ... The reality of blockchain, however, is that they aren't. While there are patches of blockchain activity—Northern Trust using a distributed ledger to manage private equity deals in Guernsey, and ING attempting to build a blockchain for agricultural commodities—Penny Crosman, reporting for American Banker, has declared that adoption has "stalled" for a variety of reasons. The first, ironically, is that most banks still don't have a clear business case for using it. Beyond confusion as to why the banks should be using blockchain at all, there are also concerns about security, legal issues, and the immaturity of the technology itself.


Data theft is the foremost threat for an insurance company

For an insurance company the data theft is the major threat. “For example, whenever a policy comes for renewal, the policy holders start receiving the calls from multiple companies, mostly your competitors. Here, despite ensuring all the security measures, the human factor remains the weakest link,” Dhanodkar explains. Its imperative to enrich people including employees, customers & third-party vendors with the adequate awareness on latest threats associated with the digitized economy. Mere Bbasic security awareness will not be effective unless the knowledge is upgraded. Aadhaar Act has also got lot of implementations for security framework and we are planning to have series of workshops on Aadhaar Act compliance requirements s for executives” he said. The CISO’s role demands sound understanding of “Technology and business. Being a CISO I cannot keep blocking everything but must act as an enabler, he added.


Should software developers have a code of ethics?

Should software developers have a code of ethics?
Teaching people to ask the right questions involves understanding what the questions are, says Burton, and that everyone’s values are different; some individuals have no problem working on software that runs nuclear reactors, or developing targeting systems for drones, or smart bombs, or military craft. “The truth is, we’ve been here before, and we’re already making strides toward mitigating risks and unintended consequences. We know we have to be really careful about how we’re using some of these technologies. It’s not even a question of can we build it anymore, because we know the technology and capability is out there to build whatever we can think of. The questions should be around should it be built, what are the fail safes, and what can we do to make sure we’re having the least harmful impact we can?” he says. Burton believes, despite the naysayers, that AI, machine learning and automation can actually help solve these ethical problems by freeing up humans to contemplate more fully the impacts of the technology they’re building.


How utility industries can leverage location data, AI and IoT

Organizations are looking at how AI and IoT can reduce cost, drive efficiencies, and enhance competitive advantage and support emerging business models. It is also clearly observed that some technical innovations from the mainstream of the IT world, or from other industries, are creating opportunities to leverage technology that did not exist previously in the industry. The industry has, in the past, pursued a siloed approach to applications and technologies. This is characterized by the separation of the engineering and operations groups from IT, and the use of stand-alone, best-of-breed applications within the overall scope of IT. As ubiquitous connectivity continues to permeate technology sectors, an increasing need to unite energy technologies, operational technologies (such as sensors and smart devices) and IT (such as big data, advanced analytics and asset performance management [APM]) with consumer technologies is observed in the industry.



Quote for the Day:


"If you're not failing once in a while, it probably means you're not stretching yourself." -- Lewis Pugh


Daily Tech Digest - March 30, 2018

New ways to trade data


IN 2016, according to Cisco, an American technology group, the volume of data flowing through the internet each month passed a zettabyte, enough to fill some 16bn 64GB iPhones. By 2025 it will be many times greater. Immeasurably more data sit outside the public internet on company servers. Most of these data are valuable information, which means that people are keen to trade it. Typically, data deals are at present worked out between someone holding the information and those who want to extract insights from it. For instance, Uber has deals allowing many cities to access data generated by its fleet of drivers. This helps city planners understand traffic flows. ... These new data markets face stiff challenges. Maintaining individual privacy and monitoring questions to prevent corporate leaks will be difficult. The cryptography securing the network needs to be airtight. Perhaps the biggest challenge will be convincing people to use them.



Enterprise Architecture Framework - Non-Functional Attributes

Non-Functional Attributes (NFAs) always exist though their signficance and priority differs when considered with certain other functional or non-functional attribute. It’s particularly important to pay attention and consider them in the inital phase of the EA framework development, as these attributes may have direct or indirect impact on some of the functional attribute of the framework. Considering Non Functional attributes early in the lifecycle is important because NFAs tend to be cross-cutting, and because they tend to drive important aspects of your architecture, they do cause considerable impact on certain important aspects of your test strategy. For example, security requirements will drive the need to support security testing, performance requirements will drive the need for stress and load testing, and so on. These testing needs in turn may drive aspects of your test environments and your testing tool choices.


Hadoop 3.0 and the Decoupling of Hadoop Compute From Storage


In 2018, discussions about big data infrastructure no longer revolve around methods to reduce network traffic through the use of clever data placement algorithms; instead, there are now more discussions about how to reduce the cost of reliable, distributed storage. The Hadoop open-source community has brought this discussion to the forefront with the recent introduction of Apache Hadoop version 3.0. One of the key features of Hadoop 3 is Erasure Coding for the Hadoop Distributed File System (HDFS), as an alternative to the venerable HDFS 3x data replication. Under typical configurations, Erasure Coding reduces HDFS storage cost by ~50% compared with the traditional 3x data replication. Over the past few years, the Hadoop community has discussed the potential storage cost savings that Erasure Coding will bring to HDFS; and many have questioned whether 3x data replication still makes sense, given the advancements in hardware and networks over the last ten years.


Why unemployment isn't the robots' fault, it's ours

Robots work on the production line at AkzoNobel's new paint factory in Ashington, Britain  September 12, 2017. REUTERS/Phil Noble
New technology creates a shift. The inventions of the industrial era led to the decline of blacksmiths, but it did give rise to the steelworker. AI, similarly, has the potential to create such opportunities. The CRO of Business Insider Peter Spande was reported by CNBC as saying that, this year nearly US$ 2 billion has been spent on AI advertising alone. Technology research and analysis company Gartner estimates that by the year 2020 AI field will have created 2.3 million jobs. About this estimate, Svetlana Sicular of Gartner says, “unfortunately, most calamitous warnings of job losses confuse AI with automation — that overshadows the greatest AI benefit — AI augmentation — a combination of human and artificial intelligence, where both complement each other”. There will, in fact, be job losses to the tune of around 1.8 million — mainly mid and low-level positions — but new ones will be created in the highly skilled, management and even entry level. Gartner estimates that by 2022, one in five workers who conduct non-routine tasks will depend on AI to do their job.


dark data and big data analytics
A report from Deloitte titled Dark Analytics: Illuminating Opportunities Hidden Within Unstructured Data Tech Trends 2017 discusses how some medical facilities could use dark data to take more all-encompassing approaches to patient care. For example, during consultations, doctors may take handwritten notes and capture voice recordings, plus make notes in emails or cloud-based applications. Collecting it all and making it accessible could improve treatments and insights, reducing the instances of incorrect diagnoses or interventions that don’t work as well as more appropriate options. People in the health care field are also hopeful that dark data could make it possible to analyze population groups. The previously unused data could potentially make predictions about future needs and illness trends that could ultimately affect individuals’ interactions with health professionals and help local health departments understand the situations their staff members will most likely encounter.


AI in Banking – An Analysis of America’s 7 Top Banks

AI in Banking - An Analysis of America's 6 Top Banks
While tech giants tend to hog the limelight on the cutting-edge of technology, AI in banking and other financial sectors is showing signs of interest and adoption – even among the stodgy banking incumbents. Discussions in the media around the emergence of AI in the banking industry range from the topic of automation and its potential to cut countless jobs to startup acquisitions. ... Through facts and quotes from company executives, this article serves to present a concise look at the implementation of AI by the seven leading commercial banks in the U.S. as ranked by the Federal Reserve. Changes in the banking industry directly impact businesses and commerce, and we sought to provide relevant insights for business leaders and professionals interested in the convergence of AI and financial technology. We’ll explore the applications of each bank one-by-one. The top seven US banks below have been rank-ordered by their size, starting with JPMorgan Chase, the largest.


The Future of Financial Services Using Blockchain Technology Infrastructures

Fintech overview infographic
Financial innovation can be interpreted as common developments happening gradually in the financial services industry. This includes contemporary markets, technologies, instruments, or institutions. Fintech refers to a distinct area of financial innovation where the centre of interest is transformative technology. Fintech is short for financial technology. A great example of fintech is a P2P lending platform called Zopa, which gives people access to loans directly from connected devices. On the other hand, financial innovations may sound like the same thing, however they are different devices and institutions which enable people to use financial services. Existing examples of financial innovations include debit cards, ATMs and traditional banking services. ... Traditional banks have been around for centuries. Fintech is bringing banking into the modern age, however it now threatens to outgrow banking completely. They could become superior to banks because they are able to curate big data and offer flexibility in managing money in ways that banks would need to be redesigned from the ground up to match. 


Robo-Adviser Startups Are Now Going After Wealthy Clientele

Robo-advisers started out by going after people with limited disposable income and little experience with investing. These companies are able to offer wealth management tools at low fees because they rely mostly on automated software, instead of people, to deliver advice. Customers fill out a risk profile by answering questions about their age and goals to receive a customized portfolio made up of exchange-traded funds and other passive investments. Competition has upped the urgency for these startups to add new products. Charles Schwab Corp., Morgan Stanley and Vanguard Group Inc. have all introduced robo-advisers in recent years and have billions of assets under management already. Betterment and Wealthfront have said they each have more than $10 billion in assets. “The industry has come a long way over the past several years, but success has also attracted new competition, including large and established players across the financial services industry,” said Devin Ryan, an analyst at JMP Securities LLC. “Increasing competition within the digital wealth management space appears to be accelerating the pace of innovation.”


Saving lives with big data analytics that predict patient outcomes


Cerner’s EDH helps them understand the most significant risks and opportunities for improvement across a population of people. Cerner computes quality scores for manag­ing a number of chronic conditions, and analysts can see which conditions could gain the most by improving those scores. For instance, Cerner can accurately determine the probability that a person has a bloodstream infection, such as sepsis. Sepsis is an uncontrolled inflammatory response to an infection. It is a complex condition which is difficult for a junior doctor or nurse to recognise. From the time sepsis first takes hold, healthcare professionals have only the initial 6 hours after the diagnosis to deliver a group of interventions to the patient. These interventions require close and rapid interaction between teams in the Emergency Department, in the general ward and in Critical Care. For an individual patient, getting the interventions right at the right time may mean a 20-30% better chance of surviving.



The Fourth dimension on agile leadership

“Agile development can easily stall without agile leadership in place,” says Berthelsen. “Here at Fourth, we don’t lead from the top down – we lead from the bottom up. The leadership team inspires all members of staff to become agents for change. Everyone in the organisation has the personal responsibility, accountability and authority to deliver on our clients’ requirements. Once we’ve agreed on an action, we agree as a business. That open style of leadership makes the life of the product owner and the software engineering teams so much easier, as they’re not in the middle of a conflict of priorities.” As the CTO at Fourth, Berthelsen is also best placed to unpick what the characteristics are of a successful agile leader. “It’s all about openness and collaboration. Agile leaders set the vision and give individuals the freedom to follow that vision. They create an environment for people to push decision making authority down to those closest to the information and they remove barriers so individuals can respond in real-time to unfolding situations.” ... Every stakeholder is trained on what agile is, why we’re doing it, and they participate in it every day.



Quote for the day:


"Leadership appears to be the art of getting others to want to do something you are convinced should be done." -- Vance Packard


Daily Tech Digest - March 29, 2018

8 Things to Consider Before Hopping on the Blockchain Train

Image: Shutterstock
There’s often a financial aspect that confuses some great ideas with how they’ll be monetized. Businesses that need capital to properly develop their blockchain solution often turn to ICOs, or initial coin offerings, to make it happen. With few regulations, countless projects are setting up a smart contract that offers contributors tokens in exchange for their BTC or ETH. Though it’s an easy way to get some liquid funding, launching an ICO comes with extra responsibilities, other than making a solid service or platform. You’ll also be beholden to a large community of speculators who have only one thing in mind: the price of the token. This complicates matters and may distract from the original goal. Companies like Telegram, though already fully funded and successful, have chosen to ICO even in the post-IPO phase, so that they can fund blockchain-specific projects without dipping into their coffers or raising money the traditional way. Smart contracts, which are a central part of most blockchain solutions, allow savvy programmers to create a tokenized ecosystem whereby all users benefit from participating.



4 reasons why 2018 is the year millennials create a flashpoint for the agile revolution

A recent Gallup poll published findings that millennials don’t want bosses-they want coaches and millennials don’t want annual reviews-they want ongoing conversations. In agile settings, frequent coaching conversations and immediate feedback are built into the framework. Indeed, some of the earliest resistance to agile came from senior and middle managers because they were forced to challenge their notion of how they add value and it required them to shift from delivering mandates to coaching and empowering. For example, the practice of retrospectives highlights how agile work teams use feedback and coaching to continuously improve. Millennials crave and respond well to these opportunities to better their performance. To borrow a phrase from Billy Joel, millennials “didn’t start the fire” when it comes to agile, however, they are poised to fan the flames as the framework is adopted in new industries and continues to be an effective means to solve problems, produce new products and meet customer needs.


3 factors CIOs must address to stay at the strategy table


Successful CIOs and CISOs are able to educate and communicate with boards of directors. Are you speaking in their language? I talk to many boards, and while the members are hungry for information about these issues, they struggle with context and practicality. For example, it might be easy to see technology’s role in an email outage, but less clear what role new technologies and information security play in preventing a supply-chain disruption. Directors always understand the financial impact, and the more sophisticated CIOs are adept at translating their team’s work into the financial terms that board members get right away. ... In summary, failing to do these things might not have immediate consequences – and perhaps you’re not doing all of these things right now. But by neglecting these aspects of your leadership role, you will cede that responsibility to someone else. On the other hand, by paying attention to them, you will bolster your credibility in the age of digital business.


Linux on Raspberry Pi: SUSE support turns $35 board into enterprise IoT platform

Today Upton is thrilled because SLES 12 SP3 is the first time a major vendor has offered a full, commercially supported Raspberry Pi image. "Unlike two years ago when they just provided a downloadable image with community support, SUSE can now offer 12 x 5 or 24 x 7 support," writes Upton. "This is all built on the same SUSE Linux that is available on everything from Raspberry Pi to the mainframe." According to SUSE, companies have been using SLES for Arm on Raspberry Pi for monitoring older industrial equipment such as robotic screwdrivers and sending alerts when they malfunction. The new SUSE Raspberry Pi image still targets the Raspberry Pi Model 3 B, although SUSE says it is planning support for the new Raspberry Pi Model 3 B+. The new version also contains a few updates and fixes. According to SUSE, developers have made the new image smaller -- around 630MB -- by trimming compilers and debugging tools while tuning the Arm OS for IoT tasks.


1.4B stolen passwords are free for the taking: What we know now

passwords
Single-factor authentication based on "something you know" (e.g., a password) is no longer an acceptable best practice. "I'm pretty well convinced passwords are a horrible system," Professor Douglas W. Jones of the University of Iowa, says. "If someone knows your old passwords, they can catch onto your system. If you're in the habit of inventing passwords with the name of a place you've lived and the zip code, for example, they could find out where I have lived in the past by mining my Facebook posts or something." Indeed, browsing through third-party password breaches offers glimpses into the things people hold dear — names of spouses and children, prayers, and favorite places or football teams. The passwords may no longer be valid, but that window into people's secret thoughts remains open. These massive dumps of free passwords lower the cost of an attack dramatically. Password reuse or password guessing attacks are script kiddie stuff. Defending your organization against such threats is basic due diligence.


10 Machine Learning Algorithms You Should Know to Become a Data Scientist

Machine learning practitioners have different personalities. While some of them are “I am an expert in X and X can train on any type of data,” where X = some algorithm, others are “right tool for the right job” people. A lot of them also subscribe to a “Jack of all trades, master of one” strategy, where they have one area of deep expertise and know slightly about different fields of machine learning. That said, no one can deny the fact that as practicing data scientists, we have to know basics of some common machine learning algorithms, which would help us engage with a new-domain problem we come across. This is a whirlwind tour of common machine learning algorithms and quick resources about them which can help you get started on them.


11 outsourcing myths debunked

11 outsourcing myths debunked
Third-generation outsourcers may think they know everything there is to know about structuring engagements for success, but the reality is that the fundamentals of value creation from outsourcing have changed significantly. Consumption-based pricing is replacing fixed-price models. Contracts designed for efficiency and cost reduction have given way to deals aligned to business outcomes and growth. “The fundamental mindset needed to succeed is very different, and a contract written for efficiency does not align with a contract that needs to drive growth,” says Jimit Arora, partner in Everest Group’s IT services research practice. “Smart clients recognize the limitations of previous templates and are willing to make changes. Clients that want to simply re-purpose because they think it is ‘old wine in new bottle’ are going to struggle with ineffective contracts.” ... The typical outsourcing deal is built to reduce disruption and risk associated with major change. Indeed, both the buyer and service provider account teams are incentivized to protect the status quo, says Bob Cecil


What is composable infrastructure?

hpe synergy
IT resources are treated as services, and the composable aspect refers to the ability to make those resources available on the fly, depending on the needs of different physical, virtual and containerized applications. A management layer is designed to discover and access the pools of compute and storage, ensuring that the right resources are in the right place at the right time. The goal is to reduce underutilization and overprovisioning while creating a more agile data center, says Ric Lewis, senior vice president and general manager of the software-defined and cloud group at Hewlett Packard Enterprise, which offers the Synergy composable infrastructure platform. “When a customer logs onto a public cloud, they grab a set of resources: compute, storage, fabric. ‘I need this much stuff to be able to run this application. Please give that to me," Lewis says. "I’ll run this application, and when I’m done, I’ll give it back to you and you can use it with somebody else,’” “What we did with composable infrastructure is build that into the platform. We can do the same dynamic resource sharing.”


Facebook cuts ties to data brokers in blow to targeted ads

The world’s largest social media company is under pressure to improve its handling of data after disclosing that information about 50 million Facebook users wrongly ended up in the hands of political consultancy Cambridge Analytica. Facebook adjusted the privacy settings on its service on Wednesday, giving users control over their personal information in fewer taps. Facebook has for years given advertisers the option of targeting their ads based on data collected by companies such as Acxiom Corp and Experian PLC. The tool has been widely used among certain categories of advertisers - such as automakers, luxury goods producers and consumer packaged goods companies - who do not sell directly to consumers and have relatively little information about who their customers are, according to Facebook. “While this is common industry practice, we believe this step, winding down over the next six months, will help improve people’s privacy on Facebook,” Graham Mudd, a Facebook product marketing director, said in a statement.


Sensors and machine learning: How applications can see, hear, feel, smell, and taste

In essence, classifying objects with machine or deep learning is first a matter of “seeing” a lot of instances of a sheep or a cat, including various derivatives (big ones, little ones, furry ones, less-furry ones, skinny ones, fat ones, tailless ones). Then it is a matter of training a model that recognizes all of the variants. While Facebook and Google are clearly putting the most weight into this field, there are other tools like the venerable OpenCV library, a grab-bag of functionality, and OpenFace, which is focused on just facial recognition. There is even Jevois (French for “I see”), a smart camera for Arduino devices that has pretrained models based on open source libraries. ... For speech recognition, you can find open source implementations that use the more traditional Hidden Markov models like CMUSphinx and Kaldi use a neural network. There are other implementations, but the breakdown is between online and offline decoding. “Online” means can you read off a mic; “offline” means you have to wait until you have a .wav file.



Quote for the day:


"You may be good. You may even be better than everyone esle. But without a coach you will never be as good as you could be." -- Andy Stanley