Daily Tech Digest - June 11, 2018

digital twins woman in profile ai mirror duplicate duo pair
The basic definition of a digital twin: it’s a digital representation of a physical object or system. The technology behind digital twins has expanded to include larger items such as buildings, factories and even cities, and some have said people and processes can have digital twins, expanding the concept even further. Digital twins could be used in manufacturing, energy, transportation and construction. Large, complex items such as aircraft engines, trains, offshore platforms and turbines could be designed and tested digitally before being physically produced. These digital twins could also be used to help with maintenance operations. For example, technicians could use a digital twin to test that a proposed fix for a piece of equipment works before applying the fix the physical twin. With the explosion of IoT sensors, digital-twin scenarios can include smaller and less complex objects, giving additional benefits to companies. ... This is similar to the “run the simulation” scenario often seen in science-fiction films, where a possible scenario is proven within the digital environment. With additional software and data analytics, digital twins can often optimize an IoT deployment for maximum efficiency, as well as help designers figure out where things should go or how they operate before they are physically deployed.



Cloud security: The reason hackers have it so easy will infuriate you

Cloud managers are playing catchup to close the door on the critical data left out in the open. Sophisticated new cybersecurity tools designed to securely store these kinds of credentials in a way that legitimate, automated processes can access, and intruders can’t—and to scan files uploaded to cloud storage to make sure passwords and keys aren’t exposed—are turning the tide, experts say. “Everyone knew this was a bad thing to do,” says Armon Dadgar, founder and co-CTO of San Francisco-based software company HashiCorp. “It wasn’t like anyone had an illusion that keeping these credentials in plain text was smart or sane, but no one had a better answer.” HashiCorp offers an open-source tool called Vault that stores sensitive credentials, encrypted themselves, and strictly limits what people, servers and programs can access them. Vault keeps logs of who accesses the secrets when. In some cases, it can also generate temporary credentials that give people permissions to use cloud resources for a limited time. Last month, cloud industry leader Amazon launched AWS Secrets Manager, its own credential management tool.


5 reasons why edge services are critical to your resiliency strategy

number 5 on fire top five five tips
Edge services have become critical to helping organizations provide performance and security features to internal-facing apps like CRM and ERP systems, as well as customer-facing apps. Companies must direct users to the appropriate networks and infrastructure so they can connect to the proper services. Using edge services to move the point of control closer to the user enhances security and helps ensure compliance with regulatory and privacy specifications, where required. In addition, computing at the edge requires less latency and, with IoT devices, does not require constant connectivity, which would not hamper resiliency. More applications today rely on multi-cloud architectures for flexibility, resilience and improved performance at the edge. The analyst study cited business intelligence and reporting applications, IoT apps and marketing automation apps as among those most likely to use multi-cloud architectures. Moreover, multi-cloud in conjunction with edge services such as managed domain name system (DNS) solutions can improve resilience. DNS not only helps with application performance and network resiliency, but also optimizes web app performance and managing traffic across multi- cloud environments.


London's tech startups are booming, but their biggest challenge is just around the corner


UK companies could also find it harder both to attract the talent they need and actually get them into the country, depending on the harshness of the post-Brexit immigration policy. If the UK becomes less welcoming to foreign workers, companies will struggle to find the staff they need to be competitive, which could make them consider relocating. Longer term, the effect of the UK's exit from the European Digital Single market remains to be seen. This aims to remove barriers to consumers and businesses using and selling digital services across Europe, thereby growing the digital economy across the trading bloc. Another Brexit-related worry is the prospect of European cities such as Frankfurt mounting a challenge London as a financial centre, which may weaken its fin-tech status. A recent report from the Institute for Public Policy Research think-tank said that startups had three concerns about Brexit: "first, the uncertainty it has generated around the retention and recruitment of people; second, the possibility of regulatory divergence; and third, future access to finance."


Coinrail cyber heist highlights need for exchange security


The Coinrail heist has further raised concerns about the lack of regulation in the industry and is the latest in a series of heists at cryptocurrency exchanges, which cyber security analysts say is a logical target for cyber criminals whose primary aim is to amass wealth in the easiest ways possible. The Coinrail attack comes just months after Japan’s Coincheck cryptocurrency exchange lost $400m worth of digital currency and South Korea’s Youbit exchange was forced to file for bankruptcy and close after two cyber attacks, while in 2014 MTGox filed for bankruptcy after losing bitcoins worth around $500m. The Bank of England and global policy-makers are calling for greater regulation of cryptocurrencies to protect the financial system and reduce illicit activities. In March 2018, Bank of England governor Mark Carney said the time had come for regulation to hold the crypto-asset ecosystem to the same standards as the rest of the financial system. “A better path would be to regulate elements of the crypto-asset ecosystem to combat illicit activities, promote market integrity, and protect the safety and soundness of the financial system,” he said.


GDPR: UK Privacy Regulator Open to Self-Certification

Organizations in Europe may eventually be able to self-certify that they are compliant with the EU's General Data Protection Regulation, an official at the U.K.'s independent privacy watchdog said. But for now, "if anyone tries to tell you they're GDPR-certified - they're lying," Nigel Houlden, head of technology policy for the U.K. Information Commissioner's Office, said on Wednesday at the Infosecurity Europe conference in London during a panel discussion on GDPR. "There is no such thing as GDPR certification; there is only compliance that you can work toward," Houlden said. But he noted that the ICO is exploring how organizations might eventually be able to self-certify compliance with a list of GDPR requirements to help prove that they have been trying to comply with GDPR, especially if they should later suffer a breach or be reported to the ICO for some reason. The panel discussion, moderated by Brian Honan, head of Dublin-based BH Consulting, focused on how organizations can maintain compliance with GDPR, which became EU law in 2016. But many organizations appear to have been left scrambling to attempt to do something about GDPR since May 25, which is when each EU member state's privacy watchdog began enforcing GDPR compliance


Strong VPN Review: A Good VPN Service For Rookies

strongvpnlogo
First and foremost, StrongVPN was able to access U.S. Netflix in my tests. The company doesn’t advertise the ability to get around Netflix’s regional restrictions, but at the time of this writing StrongVPN obliged. That could change, however, at any time. There is not a lot to StrongVPN in terms of extras, making this a solid choice for beginners or users looking for simplicity. Click the settings cog in the upper right-hand corner of the app, and the options screen opens. Under the Options tab there are some generic options such as “Start when Windows starts,” “Auto reconnect,” and “Connect on launch.” There’s also a kill switch option that kills all internet activity if the VPN connection drops, but at this writing the feature was not active. The only other place in the app to do any tweaking is under the Protocoltab. StrongVPN defaults to the IKEv2 protocol on Windows, but there are also options for OpenVPN, SSTP, and L2TP. The other tabs are just for looking at your account, diagnostics, and app updates.


How to get developer relations right for your company

devrel.jpg
The first order of business is to determine who your developer community includes. According to SlashData estimates, there are roughly 13 million developers, but that doesn't mean there are 13 million developers interested in your company/product. While some companies absolutely need random developers sitting in their garages to write applications to run on their platforms, that likely doesn't describe your need. In my case, our primary developer audience is employed by system integrators or other software vendors. They don't need campfires. They need APIs, documentation, use cases, and sample code to give them a running start on delivering on customer needs. You only learn this, however, if you listen to them. For example, when I took on my role running our developer ecosystem, I assumed what was needed was more developer assets. This was a gap, but the first-order priority was actually fixing the provisioning and authentication process such that a third-party developer could more seamlessly start working with the APIs we provide. As for internal needs, it was nice that I could tell the product teams to put all their documentation in a central repository, but it was better to learn that the reason they weren't doing so was that the system we had in place was too cumbersome.


The Cost of Fear in Organisational Change

Organisations today aim to adapt to a more collaborative, customer-centric, flexible format. Leaders have a genuine intention of creating an Agile organisation where people thrive and are allowed to make mistakes, as long as they learn from their errors. Experimentation will be the new approach. This is the dream, the quest, the purpose. And we have the “status-quo” of hierarchical organisations, annual targets and budgeting. We have all sorts of planning activities. This is our “status-quo”. The art of storytelling, calls the contradiction between the purpose and the status-quo, “creative tension”. As in all of humanity’s history, this “tension longing for change”,, operates also in the business environment. How can we truly step out of the status-quo and create a new (hi)story for the future of the business place? Without trying to answer this completely, let’s take a first step: let’s start by looking at the status quo’s impact on the aspiration to change. Peter Senge says that true tension is born when the theory exposed (what I aspire to) is different from the theory in action (what I actually do). If the tension is acknowledged, learning can occur. Effective alignment between the exposed theory and the theory in action can be achieved.


Why AI is So Brilliant and So Stupid

Image: Shutterstock
"It's all in the data, that's the number one thing to understand, and the feedback loops on truth," said Warren. "You need to know in a real way what's working and not working to do this well." Daniel Morris, director of product management at real estate company Keller Williams agrees. He and his team have created Kelle, a virtual assistant designed for Keller Williams' real estate agents that's available as iPhone and Android apps. Like Alexa, Kelle has been built as a platform so skills can be added to it. For example, Kelle can check calendars and help facilitate referrals between agents. "We're using technology embedded in the devices, but we have to do modifications and manipulations to get things right," said Morris. "Context and meaning are super important." One challenge Morris and his team run into as they add new skills and capabilities is handling longtail queries, such as for lead management, lead nurturing, real estate listings, and Keller Williams' training events. Agents can also ask Kelle for the definitions of terms that are used in the real estate industry or terms that have specific meaning at Keller Williams.



Quote for the day:


"Great listeners don't just hear what was said, they hear what was meant." -- @LeadToday


Daily Tech Digest - June 10, 2018

Why the transportation sector needs data scientists


Connected vehicles are widely discussed as a way forward in the transportation industry. For both fleet management and individual drivers, IoT can revolutionize the way vehicles function, making for a safer driving experience. Real-time analytics offers predictive maintenance, so drivers are alerted to possible problems before a part breaks down. Sensors placed around cities that are then connected to apps can help drivers find parking spots faster, reducing traffic and emissions. About 30 percent of cars circling a city at any given time are looking for a parking spot, which means not only wasted time for drivers but unnecessary emissions for the environment. IoT can help make a better driving experience and help cities reduce traffic and improve the air at the same time. Honeywell’s IoT Connected Aircraft flew around the world last year to showcase how connectivity changes the way we fly. Not only does Wi-Fi provide a more pleasant in-flight experience for passengers, but IoT technologies enhance flight safety and efficiency as well.



Mastering Transformation in the Public Sector

Because public sector entities find it challenging to define the why—that is, to create a vision for a transformation effort and what it should achieve—and bring about concrete results, they too often focus their attention on designing new policies and planning for their implementation. The result is transformation efforts that fail because they lack buy-in from political and administrative leaders, employees, and citizens or because they fail to deliver on their promises. Such failures only fuel the skepticism about government that transformation is intended to overcome and make future successes more difficult to achieve. Further challenges arise from the complexity and enormity of the transformations that pubic sectors must undertake. First, whereas all corporate transformations set profits as the same ultimate goal, the objectives of a public sector transformation can’t be broken down as simply. Second, cities, provinces, and nations must engage a high number of citizens. These populations are of course much larger than a group of factory or division—and even companywide—employees. 


Not Everyone Understands Digital Transformation

New Research: Not Everyone Understands Digital Transformation
With stories about business transformation occurring all around us, we wanted to know exactly what people are thinking about the topic of digital transformation - not just CEOs and executives - but also employees. The results of the Salesforce Digital Transformation Survey highlighted that while 64% of people are aware that the company they work for considers digital transformation a priority, 69% say they wouldn’t be confident explaining the concept to somebody else. While businesses and brands understand digital transformation and talk about it regularly, our results shine a spotlight on a challenge that must be overcome. People know that digital transformation is happening around them, but don’t fully understand what it is. The benefits of digital transformation won’t fully realize until we work to close the “understanding gap” that exists among the general population. ... We have a definite challenge on our hands with approximately half of the respondents (52%) saying that they have little or no engagement with the process of digital transformation. Individuals must realize the purpose of changing the way they work, why they are re-skilling, and how new systems will make their lives easier and more efficient.


The democratization of data science with Dr. Chris White

“Big data,” much like “artificial intelligence,” are terms that are vague. In fact, they don’t mean anything. Neither big nor data. They’re not qualified. Just like artificial intelligence. And so that’s good and bad. You know, it’s good because there’s a movement. That movement has funding and interest from policymakers. It has the need for understanding implications. But that movement is still very large and very vague. And so, I think about big data, really, in terms of publicly accessible information, as a starting point, because that’s something that people are familiar with. They’ve all gone to a search bar. They’ve all issued a bunch of queries. They’ve all had a bunch of browser tabs open and had that familiar feeling of, gah, there’s just like a lot of information out there. How do I find what I need? How do I organize it? And when that problem is a business problem, it’s even bigger. And so, I think of it like that. Sometimes there’s images, like an iceberg, where what you see from a search bar, what you see if you did a Bing search for a product or a celebrity or an event, and you get a list of links and an answer card, they think of that as data interaction. And it’s true, but behind that there’s a lot more.


Blockchain – Can we trust you? What legal and cybersecurity risks lurk behind the hype?

null
The blockchain hype is a core component of the crypto-craze. The technology behind bitcoin is ingenious, and real-world businesses have invested in it order not to be left behind what some fear may be a disruptive technology. Harvard Business School Professors Marco Iansiti and Karim R. Lakhani see blockchain as a ‘foundational technology’, more like TCP/IP or email, which, whilst it will eventually affect most everyone, due to “barriers to adoption” and “sheer complexity”, the question is when. ... Many are pushing hard and we have seen the use-case in scenarios ranging from recording art provenance, to tracking inventory in global supply chains, evidencing the source of diamonds, recording music copyright, and tokenised ownership of natural assets in Siberia. An interesting use-case may come should Amazon issue is own digital currency, enabling customers to buy direct from Amazon (no banks or credit card companies involved at all – rather like store card points but stored on a blockchain), adding a new layer to the internet: a value-transfer layer. Many examples remain small trials, with most of the complexity still to be ironed-out.


Using Domain-Specific Language to Manipulate NoSQL Databases in Java

"A domain-specific language (DSL) is a computer language specialized to a particular application domain." The DSL has several books, and the most famous one from Martin Fowler says, "DSLs are small languages, focused on a particular aspect of a software system." That is often referred to as a fluent interface. In the NoSQL world, we have an issue, as the picture below shows. We have four different document NoSQL databases doing exactly the same thing, however, with different APIs. Does it make sense to have a standard do these habitual behaviors? In this article, we'll cover who does manipulation with Eclipse JNoSQL API. ... To manipulate any entity in all NoSQL types, there is a template interface. The template offers convenience operations to create, update, delete, and query for NoSQL databases and provides a mapping between your domain objects and JNoSQL. That looks like a template method to NoSQL databases, however, no heritage is necessary. There are DocumentTemplate, ColumnTemplate, GraphTemplate, and KeyValueTemplate.


Wysh launches its AI and human-powered concierge service after 2 years in stealth mode


The startup’s answer to the AI problem? Combining artificial intelligence and real intelligence in a single platform and building the solution on blockchain technology to provide transparency. Wysh provides instant communication between users and businesses through AI and blockchain technologies. This isn’t just about allowing businesses to engage with customers, though. The solution will also facilitate payments, which is why the company recently landed $2 million in a round led by Park Capital, a strategic investment firm focused on fintech. Wysh provides its digital concierge as an API to service providers. It combines AI technology with human concierges and customer service teams, recognizing automatically when a customer needs a real person to answer more complex questions than a chatbot alone can solve. “Wysh is B2B in terms of client acquisition strategy,” executive chair Alexander Lopatine told me. “We work with corporate clients to provide them the technology, allowing their customers to access their internal services through a chat interface.”


E-voting and DDoS concerns: The devil’s in the details

As for the misconfiguration of allowing traffic from outside of the Incapsula network to the origin server if the attackers know the IP address of the server, I’m glad this was brought up. This is an important part of proper onboarding to our services (blocking all traffic not coming from Incapsula ranges). Another attack scenario, according to the paper, would be if a malicious attacker injects malicious javascript as part of the javascript injections done by Incapsula. While this is true, it can also be said about any third-party JavaScript being loaded by web applications on the customer website, including a voting website (such as advertisements, analytics, monitoring and framework libraries). That’s why we take precautions to make sure that it doesn’t occur. Our environments are protected and audited, and any configuration change needs to be approved by multiple people in a process that is thoroughly tracked. Consequently, Imperva would know about a JS injection, even if the JS file remained in the same size.


Italian banks test blockchain for interbank reconciliations

Group of arrows with one odd pointing other direction
First previewed in December, the new process will make bilateral channels available through which each counterparty can exchange information via a series of smart contracts providing real-time feedback on transactions passing over the network. ABI Lab is collaborating with NTT Data for development of the application and SIA as provider of the node infrastructure and verification process. SIA in November announced plans to set up a 600 node network for bank clients, government agencies and corporates to connect to blockchain apps developed by the R3 consortium. Banking co-operative Swift has been running its own proof-of-concept trials on the use of distributed ledger technology for nostro account reconciliation via Hyperledger Fabric v1.0 technology. While the PoC proved a resounding success, it threw up a number of significant operational challenges that would need to be addressed in advance of a commercial roll-out. By restricting use to national banks, the Italian experiment could overcome the issues of scale facing a global provider like Swift.


Is Your Product Roadmap Still Meeting Customer Needs?

Most companies diligently follow information about the state of their industry or technology, but the unfortunate reality is that it’s less common for companies to stay as closely attuned to their customers’ needs and experiences. To successfully scale a product, you must ensure that your roadmap isn’t just pointed towards the long-term vision, but that the initiatives and features on the roadmap are tied to your customers’ core needs. By consistently including customer research and validation in your product design and development process, you’ll have the insight, direction, and confidence you need to keep your roadmap flexible, while still driving towards the overarching vision. ... Most companies have no problem collecting quantitative data. It’s relatively quick and easy to implement any number of analytics solutions to give you visibility into what areas of your product customers are using the most, how frequently they’re logging in and what your churn rate is. These are valuable sources of data that can inform important decisions about your product, but these metrics don’t always tell the whole story.



Quote for the day:


"Just when you think it can't get any worse, it can. And just when you think it can't get any better, it can." -- Nicholas Sparks


Daily Tech Digest - June 09, 2018


The old school adopters who firmly believed that all tokens and offerings should be based on a “game-changing” software-based utopian utility platform creating borderless financial technologies and instruments are now bearing witness to more than 50% of those projects being in ruins or reported on as blatant money grabs. Its only funny money, right? Until you lose it. Slick websites, vaporware prototypes and teams that either have no proven track record or were often fake, promising great returns, but without an understandable or executable plan to monetization. Internet Deja Vu all over again, a la 2000 anyone? And just like in 2000, the industry is beginning to shift to real business, with real business plans, with real proven profitable business models backed by verifiable hard assets and being offered as Security Token Offerings (STO).  For the market to continue to mature into an alternative digital economic model for the future, this old school way of thinking “utility only” will need to evolve to be more accepting of asset-backed tokens and offerings. With regulations on the rise and token sales from 2017 literally in shambles, both existing and new investors entering the crypto space are becoming more risk averse



The State of Enterprise Mobility in 2018: Five Key Trends


Samsung recently commissioned Oxford Economics to conduct an in-depth study into the state of enterprise mobility in 2018, focusing in particular on the differences between organizations who have adopted Bring Your Own Device (BYOD) policies and those who have chosen to provide mobile devices to their workforce. The research, based on survey of 500 senior IT and business leaders and in-depth interviews, also quantifies the total investment in mobile-enablement for the enterprise, highlighting areas for cost-efficiency and the strategies that deliver the greatest return on investment. The study turned up some thought-provoking findings and I’d encourage business leaders involved in setting mobile policies to download the full report or register for the webinar with Oxford Economics to learn more. ... Unsurprisingly, most companies that have opted for a BYOD approach have done so because of the perceived cost savings. These savings can be significant when employees pay for their own mobile service plans, but the survey revealed that increasingly enterprises are providing employees a hefty stipend to compensate for personal mobile usage. In many cases, this stipend wipes out the savings achieved.


The Advent of a New Synergy: the Blockchain & Cloud

A Blockchain based Distributed Cloud will guarantee trust, security and transparency, speed up processes, and keep accurate records that can be accessed by the relevant stakeholders via cloud. This will promote the demand for cloud based services in industries such as real estate, healthcare, banking among others. Blockchain based cloud can help real estate agents and homeowners store property information in a central place, so that anyone with interest in buying and selling property can easily access it. This will cut hours of phone calls, paper pushing, prevent fraud and eliminate middlemen. It can also help address medical data integrity and security in terms of patient information, reduction of errors and fraud and promote transparency. It can have significant impact in tracking and protecting personal healthcare information. It can also address the privacy issue of medical billing logs from a financial angle. Thus, it will not only protect clinical data, but also tell transactions costs, making it harder for healthcare institutions and insurance companies to commit fraud or make errors.


Understanding the Varieties of .NET


.NET Standard 2.0, the latest version, has a very broad API coverage, but numerous missing APIs still exist. It pretty much covers .NET Core, but leaves out a fair amount of .NET Framework. Of course, there’s nothing keeping you from targeting those missing APIs, but then you’re targeting .NET Framework, not .NET Standard, and you’re locked into it until you get rid of those API calls. If you’re writing a new set of libraries, I would recommend trying to target .NET Standard. If you do, your libraries will run on .NET Framework, .NET Core, or Xamarin, with no additional effort. You will of course have to create apps targeted for the specific .NET variants, but if you make the apps small enough, including the GUI-based classes that aren’t supported in .NET Standard, and put most of the functionality in the shared libraries, then you should be able to get the benefits of cross-platform support for as much of your code as possible. Migrating existing .NET Framework code again may be more involved due to the lack of certain APIs, but even there you may be able to migrate as much code as possible to .NET Standard libraries and keep the platform-specific code isolated. 



Why Does Artificial Intelligence Scare Us So Much?

Negative feelings about AI can generally be divided into two categories: the idea that AI will become conscious and seek to destroy us, and the notion that immoral people will use AI for evil purposes, Kilian Weinberger, an associate professor in the Department of Computer Science at Cornell University, told Live Science. "One thing that people are afraid of, is that if super-intelligent AI — more intelligent than us — becomes conscious, it could treat us like lower beings, like we treat monkeys," he said. "That would certainly be undesirable." However, fears that AI will develop awareness and overthrow humanity are grounded in misconceptions of what AI is, Weinberger noted. AI operates under very specific limitations defined by the algorithms that dictate its behavior. Some types of problems map well to AI's skill sets, making certain tasks relatively easy for AI to complete. "But most things do not map to that, and they're not applicable," he said. This means that, while AI might be capable of impressive feats within carefully delineated boundaries — playing a master-level chess game or rapidly identifying objects in images, for example — that's where its abilities end. 


Traditional ERP Falls into the Arms of Cloud

(Image: 4x-image/iStockphoto)
"Enterprises have been embarking on a journey of digital transformation for many years," Microsoft Vice President for Azure Girish Bablani wrote in a blog post listing the benefit of SAP's offerings on Microsoft's cloud platform Azure. "For many enterprises, this journey cannot start or gain momentum until core SAP Enterprise Resource Planning landscapes are transformed." Microsoft wants to be the cloud choice of those SAP customers. Bablani noted that SAP customers including Penti, Malaysia Airlines, Guyana Goldfields, Rio Tino, Co-op, and Coats have all migrated to the cloud on Azure. For its part, Microsoft right now looks like the success story of an early technology company that has made the transition to the cloud and the new digital economy. Under a new cloud-minded CEO (who is not a company founder) Microsoft has made some progressive acquisitions including the R company Revolution Analytics, careers social network LinkedIn, and now GitHub. It also operates a successful public cloud and has transitioned its popular Office software into a cloud service as Office 365. 


Could blockchain have solved the mystery of the romaine lettuce E. coli outbreak?

Not long ago, Yiannas, who guards the integrity of food in Walmart’s $280-billion grocery empire, would have brushed off the notion of an instantly “knowable” and verifiable food chain as fantasy. He heard about it two years ago, when Walmart was about to open a food safety institute in China, where 10 years ago a baby formula adulteration scandal sickened 54,000 babies. “Up until that point I only knew that it was the technology behind bitcoin,” Yiannas said. “I will tell you I was a bit of a skeptic, just like many people are about the technology.” Blockchain, for all its cloak-and-dagger associations, is basically a democratized accounting system made possible by advances in data encryption. Rather than storing proprietary data behind traditional security walls, companies contribute encrypted blocks of data to a “distributed” ledger that can be monitored and verified by each farmer, packer, shipper, distributor, wholesaler and retailer of produce. No one can make a change without everyone knowing, and agreeing to it.


The Future Computed: Artificial Intelligence and its role in society

Photo of a stack of books entitled "The Future Computed"
Beyond our personal lives, AI will enable breakthrough advances in areas like healthcare, agriculture, education and transportation. It’s already happening in impressive ways. But as we’ve witnessed over the past 20 years, new technology also inevitably raises complex questions and broad societal concerns. As we look to a future powered by a partnership between computers and humans, it’s important that we address these challenges head on. How do we ensure that AI is designed and used responsibly? How do we establish ethical principles to protect people? How should we govern its use? And how will AI impact employment and jobs? To answer these tough questions, technologists will need to work closely with government, academia, business, civil society and other stakeholders. At Microsoft, we’ve identified six ethical principles – fairness, reliability and safety, privacy and security, inclusivity, transparency, and accountability – to guide the cross-disciplinary development and use of artificial intelligence. The better we understand these or similar issues — and the more technology developers and users can share best practices to address them — the better served the world will be as we contemplate societal rules to govern AI.


Forward Secrecy Configuration
Forward Secrecy’s day has come – for most. The cryptographic technique (sometimes called Perfect Forward Secrecy or PFS), adds an additional layer of confidentiality to an encrypted session, ensuring that only the two endpoints can decrypt the traffic. With forward secrecy, even if a third party were to record an encrypted session, and later gain access to the server private key, they could not use that key to decrypt a session protected by forward secrecy. Neat, huh? Forward secrecy thwarts large-scale passive surveillance (such as might be conducted by a snooping nation state or other well-resourced threat actor) so it is seen a tool that helps preserve freedom of speech, privacy, and other rights-of-the-citizenry. It is supported and preferred by every major browser, most mobile browsers and applications, and nearly 90% of TLS hosts on the Internet, according to a recent TLS Telemetry report (PDF). The crypto community applauds forward secrecy’s broad acceptance today. While forward secrecy foils passive surveillance, it also complicates inspection for nearly every SSL security device currently in existence. 


picture.jpg
Like any digital transformation technology, the biggest driver will come from the need to remain secucompetitive. Blockchain is not only about security, it's also about transparency and eliminating mediators, which translates to cost effectiveness and higher return on investment for both vendors and end users. Those service providers that ignore the technology — and overlook fortifying, enhancing, and accelerating their services with it — will be left behind. ... Tech giants such as SAP and IBM are testing the water, especially the latter with public- and finance-sectorpilot projects. However, blockchain brings a huge opportunity to startups in the CEE region, where government support and advanced skills can offer a fertile ground for things to really happen. DX is about fast progress and agility — the tech giants’ size and legacy is not an advantage here!  ... Blockchain is often confused with the volatility and craziness of cryptocurrency, even among technology professionals and enthusiasts. This is related to the nature of trading and mining those currencies as a product, and not to blockchain as technology. Development and adoption levels for blockchain vary across the CEE region, from initiatives and discussion 




Quote for the day:


"If you don't demonstrate leadership character, your skills and your results will be discounted, if not dismissed." -- Mark Miller


Daily Tech Digest - June 08, 2018

malware skull
More than two-thirds of the open Redis servers contained malicious keys and three-quarters of the servers contained malicious values, suggesting that the server is infected. Also, according to Imperva's honeypot data, the infected servers with “backup” keys were attacked from a medium-sized botnet (610 IPs) located in China (86 percent of IPs). Researchers said that the firm's customers were attacked more than 75k times, by 295 IPs that run publicly available Redis servers. The attacks included SQL injection, cross-site scripting, malicious file uploads, remote code executions etc. Researchers said the numbers suggest that attackers are harnessing vulnerable Redis servers to mount further attacks on the attacker's behalf. Nadav Avital, security research team leader at Imperva, said that the reason why 75 percent of open Redis servers are infected with malware was most likely because they are being directly exposed to the internet. “However, this is highly unrecommended and creates huge security risks. To help protect Redis servers from falling victim to these infections, they should never be connected to the internet and, because Redis does not use encryption and stores data in plain text, no sensitive data should ever be stored on the servers,” said Avital.


Artificial intelligence will improve medical treatments


The potential benefits are great. As Tom Devlin, a stroke neurologist at Erlanger, observes, “We know we lose 2m brain cells every minute the clot is there.” Yet the two therapies that can transform outcomes—clot-busting drugs and an operation called a thrombectomy—are rarely used because, by the time a stroke is diagnosed and a surgical team assembled, too much of a patient’s brain has died. Viz.ai’s technology should improve outcomes by identifying urgent cases, alerting on-call specialists and sending them the scans directly. Another area ripe for AI’s assistance is oncology. In February 2017 Andre Esteva of Stanford University and his colleagues used a set of almost 130,000 images to train some artificial-intelligence software to classify skin lesions. So trained, and tested against the opinions of 21 qualified dermatologists, the software could identify both the most common type of skin cancer, and the deadliest type (malignant melanoma), as successfully as the professionals. That was impressive. But now, as described last month in a paper in the Annals of Oncology, there is an AI skin-cancer-detection system that can do better than most dermatologists. Holger Haenssle of the University of Heidelberg, in Germany, pitted an AI system against 58 dermatologists.


In Transforming Their Companies, CIOs Are Changing, Too


The goal of IT isn’t merely to speed operations and introduce new and shinier ways to do things; it’s also to produce qualitative improvements. When an organization generates greater value for customers, everyone wins. For example, at Alaska Airlines, which operates 1,200 daily flights and accommodates 44 million passengers, the focus is on delivering a consistent experience to passengers, employees, and others. Every technology, process, and service touches this concept, which boosts the odds that the airline delivers a “unique brand experience at every touch point, digital and otherwise,” explained Charu Jain, the airline’s vice president and CIO. She constantly works to align the business plan with the technology, she said. Jain accomplishes this by focusing on a few key areas: identifying strategy and priorities; establishing clearly defined metrics; tapping analytics for constant feedback; ensuring that groups and teams are in lockstep with one another; and taking calculated risks, failing fast, and moving forward. Her goal, she said, is to encourage ownership and accountability across the organization. She reinforces progress by “celebrating the small wins accomplished through an innovative spirit.”


Measuring DevOps Success

Speed without quality is of little value to the organization, so the next set of DevOps metrics are the failure rate (the percentage of releases that have problems) and the number of tickets how many issues a release has). Each organization or team needs to find its appropriate balance between speed and quality. The initial focus on quality numbers should be relative trends, not absolute values, to make sure that the teams are progressing in the right direction. Drilling down into failure causes should identify which steps of the process, such as code review or test coverage, need attention. An important detail from bug reports and trouble tickets is whether they are internal, or user reported. Mature DevOps teams have failure rates less than 10 percent, according to the 2017 Puppet Report, and have an increasing percentage of issues captured by monitoring tools before being reported by users. The metrics that underperforming DevOps organizations often miss are those related to a customer’s experience with the application, their usage (or not) of new features, and the resulting impact to the business. These measurements are outside the realm of traditional development and QA tools, and mean changing mindsets and adopting new tools.


Honda Gets Ready For The 4th Industrial Revolution


With the tremendous amount of data that’s created from a wide variety of sources including sensors on cars, customer surveys, smartphones and social media, Honda’s research and development team uses data analytics tools to comb through data sets in order to gain insights it can incorporate into future auto designs. As the company’s big data maturity has increased, its engineers are learning to work with and leverage data, that had previously been to cumbersome to find meaning, thanks to the assistance of big data technology and analytics tools. There are more than 100 Honda R&D engineers who are now trained in big data analytics. Thanks to the sensors on Honda vehicles and feedback from customers, the team is able to make adjustments to the design of its fleet for things they would have never realized were an issue without the data insight. The analytics tools help Honda “explore big data and ultimately design better, smarter, safer automobiles,” said Kyoka Nakagawa, chief engineer TAC, Honda R&D.


AI at Google: our principles

We recognize that such powerful technology raises equally powerful questions about its use. How AI is developed and used will have a significant impact on society for many years to come. As a leader in AI, we feel a deep responsibility to get this right. So today, we’re announcing seven principles to guide our work going forward. These are not theoretical concepts; they are concrete standards that will actively govern our research and product development and will impact our business decisions. We acknowledge that this area is dynamic and evolving, and we will approach our work with humility, a commitment to internal and external engagement, and a willingness to adapt our approach as we learn over time. ... While this is how we’re choosing to approach AI, we understand there is room for many voices in this conversation. As AI technologies progress, we’ll work with a range of stakeholders to promote thoughtful leadership in this area, drawing on scientifically rigorous and multidisciplinary approaches. And we will continue to share what we’ve learned to improve AI technologies and practices.


What you need to know about the EU Google antitrust case

Android character at MWC 2014 Barcelona
There's no deadline for the Commission to complete its investigation, but indications from Brussels are that it will publish a decision in the Android case before August 2018. In the Google Android case, the Commission could theoretically fine it up to $11 billion, or 10 percent of parent company Alphabet's $110 billion worldwide revenue in 2017 -- but recent antitrust fines have come nowhere near that level. There's a separate investigation ongoing into the company's AdSense online advertising service, looking at the restrictions it places on the ability of third-party websites to display search ads from its competitors. That could expose the company to a similar-size fine. And, of course, the Commission has already hit Google with one antitrust fine, for abusing the dominance of its search engine to promote its own comparison shopping services. That cost it €2.42 billion ($2.7 billion) in June 2017, around 3 percent of its prior-year revenue. Other recent fines for abuse of a dominant market position are in the same ballpark. In January 2018 it fined Qualcomm €997 million ($1.2 billion), or just under 5 percent of annual revenue, while Intel's €1.06 billion ($1.3 billion) fine back in June 2014 represented about 3.8 percent of revenue.


True Digital Banking Solution For Connected Customers

“The banking sector is undergoing a transformation driven by the change in people’s communication habits. The Internet availability created the need for a completely new approach in communicating with clients and in ways to satisfy the expectations of today’s “connected” client. What we want to achieve with our solutions is straightforward communication and convenient banking which is exactly what Halkbank is delivering to its clients. With the Omni-channel platform in place, Halkbank is more adaptable to change and much quicker in delivering product to the market, always ready to answer to high demands of a modern banking customer.”, stated Mr. Milan PiÅ¡talo, Account Executive at NF Innova. “The process of modernization and continuous enhancements of the banking services is constantly present, being a must for the competitive advantage in acquiring new, satisfied clients since both banking and finance sector, on a global level, are particularly dynamic.
People know what to expect from a company, and they precisely know how valuable they are for the company. 


DevOps shops weigh risks of Microsoft-GitHub acquisition


Many developers at Mitchell International have wanted to use GitHub instead of TFS for a long time, Fong said, but whether that enthusiasm persists is unclear. "Microsoft has said it won't disrupt GitHub, but history has shown some influence has to be there," he said. "If it will be a feature of TFS and Visual Studio, some changes will be needed." Dolby Laboratories is accustomed to dealing with Microsoft licensing, but that familiarity has bred contempt, said Thomas Wong, senior director of enterprise applications at the sound system products company in San Francisco. Even if Microsoft doesn't change GitHub's prices or license agreements, "GitHub could become one conversation in an hour versus the whole conversation" in meetings with the vendor's sales reps, Wong said. GitHub already did fine to connect with the broader ecosystem of DevOps tools such as Jenkins for CI/CD, AWS CodeBuild and CodeDeploy automated provisioning, and Atlassian's Jira issue tracker. "That ecosystem is not something I need Microsoft to build for me," Wong said. A large part of GitHub's appeal was that integration with other popular tools, which may now be at risk under Microsoft's ownership, Mitchell International's Fong said.


Network-intelligence platforms, cloud fuel a run on faster Ethernet

20170508 ethernet cabling stock image 1
Of particular interest to most observers is the growing migration to 100G Ethernet. “There was on the order of about 1 million 100G Ethernet ports shipped in 2016, this year we expect somewhere near 12 million to ship,” said Boujelbene. “Hyperscalers certainly drove the market early-on but large enterprises are increasingly looking at that technology for the increased speed, price/performance it brings.” Cisco agreed with that observation. “The requirement for more high-speed ports and more data being driven from the dense edges of the network is driving the upgrade of the backbone,” said Roland Acra, senior vice president and General Manager of Cisco’s Data Center Business Group. “We see the need especially from financial and trade floor customers who need the bandwidth and speed.” While 100G is ramping up so is another level of Ethernet speed – the 25G segment, which saw revenue increase 176 percent year-over-year with port shipments growing 359 percent year over year in 1Q18, according to IDC. The push to 25G is largely due to top-of-rack requirements in dense data-center server access ports.



Quote for the day:


"Uncertainty is a permanent part of the leadership landscape. It never goes away." -- Andy Stanley


Daily Tech Digest - June 07, 2018

Microsoft drops data center into the sea: 'It will keep working for five years'

natickfrance063-768x512.jpg
According to Naval Group, the French defense naval-systems contractor that built Microsoft's pod, the data center has a payload of 12 racks containing 864 servers with a cooling system. After assembly, it was moved by truck to Scotland, from where it was dragged out to sea on a raft and then carefully lowered 117 feet, 35.6 meters, to a rock slab on the seabed. Although the data center is built to last five years, it will remain on the seabed for at least a year as Microsoft observes how it fares. The pod is attached by a cable leading back to the Orkney Islands electricity grid, which supplies 100 percent renewable wind and solar energy to about 10,000 residents. The data center itself needs a quarter of a megawatt. The Natick team also explained the pod's cooling system and how it uses ocean water to cool liquids inside the system. "The interior of the data-center pod consists of standard computer racks with attached heat exchangers, which transfer the heat from the air to some liquid, likely ordinary water," they said.



How to think like a programmer — lessons in problem solving

Do not try to solve one big problem. You will cry. Instead, break it into sub-problems. These sub-problems are much easier to solve. Then, solve each sub-problem one by one. Begin with the simplest. Simplest means you know the answer (or are closer to that answer). After that, simplest means this sub-problem being solved doesn’t depend on others being solved.Once you solved every sub-problem, connect the dots. ... “If I could teach every beginning programmer one problem-solving skill, it would be the ‘reduce the problem technique.’ For example, suppose you’re a new programmer and you’re asked to write a program that reads ten numbers and figures out which number is the third highest. For a brand-new programmer, that can be a tough assignment, even though it only requires basic programming syntax. If you’re stuck, you should reduce the problem to something simpler. Instead of the third-highest number, what about finding the highest overall? Still too tough? What about finding the largest of just three numbers? Or the larger of two? Reduce the problem to the point where you know how to solve it and write the solution. Then expand the problem slightly and rewrite the solution to match, and keep going until you are back where you started.” 


What is pervasive engineering?

Pervasive engineering is physical product (and software) development designed to harness information streams from digitally tracked (typically Internet of Things centric) assets using smart sensors that are connected to an analysis hub of data analytics and management. Pervasive simulation (through the use of digital twins and supporting data analytics) allows (physical product and software) engineers to explore design and product development using real-world conditions. Prototypes can be created to ‘fork’ concepts that skew existing products (or services) while those existing assets remain in working operation, in their core pervasive state. The state of all machine assets is therefore developed continuously, iteratively and pervasively. You can read more here from Ansys on how it positions its approach to this element of design and it is from these pages that we have drawn the above definition. The firm’s SAP partnership embeds Ansys’ pervasive simulation software for digital twins into SAP’s digital supply chain, manufacturing and asset management portfolio. The partnership’s first result is called SAP Predictive Engineering Insights enabled by Ansys and has been built to run on the SAP Cloud Platform.


You’re probably doing your IIoT implementation wrong

You̢۪re probably doing your IIoT implementation wrong
One of the great misconceptions about the IIoT is that it’s a brand-new concept – factory floors and utility stations and other major infrastructure have all been automated to one degree or another for decades. What’s different, however, is the newly interconnected nature of this technology. Steve Hanna, senior principal at Infineon Technologies, said that the security risks of IIoT have grown rapidly of late, thanks to a growing awareness of IIoT attack vectors. A factory that was never designed to be connected to the Internet, with plenty of sensitive legacy equipment that can be 30 years old or older and designed to work via serial cable, can find itself suddenly exposed to the full broadside of remote bad actors, from Anonymous to national governments. “There’s a tool called Shodan that allows you to scan the Internet for connected industrial equipment, and you’d be surprised at the number of positive results that are found with that tool, things like dams and water and sewer systems,” he said. The most common oversights, according to Hanna, are a lack of two-factor identification, allowing hackers to compromise equipment they find via things like Shodan, and direct interconnections between an operational equipment network and the Internet.


Why Microsoft's GitHub Deal Isn't a Sign of the Apocalypse

Image: Pixabay
Despite loud protests and much rending of garments by many in the Minecraft community, the video game sandbox remains as popular as ever. What many GitHub developers fail to realize is that their friendly community was going to be acquired by someone anyway — either that or face eventual liquidation. The private company, CEO-less and still feeling the effects of a workplace discrimination charge, was burning through money with no immediate prospects of additional venture capital funding or launching an IPO. It's just as well that Microsoft stepped forward with piles of cash to make things better. Would GitHub developers feel any more loved in the hands of an Apple, Google or Oracle? Really? Remember, too, that even if Microsoft actually does revert back to its bumbling old days and somehow manages to run GitHub into the ground, the open source coder community is not without viable alternatives. GitLab, a GitHub rival, recently boasted that it has seen a 10-fold increase in the number of developers moving their repositories over to its service. And if GitLab somehow drops the open source ball, it's inevitable all the young stallions will likely find yet another place to hang their backpacks.


What's the difference between low-code and no-code platforms?

istock-846843314.jpg
The difference between no-code and low-code platforms principally comes down to the approachability, ease of use and the level of technical knowledge that the user is assumed to require to have. With a no-code platform like Quick Base, a majority of our customers have no programming skills whatsoever, and they're able to use Quick Base to basically help burn down their backlogs, streamline workflows, and get their work done very quickly. Low-code platforms, on the other hand, also very useful and important, do assume some level of technical sophistication and technical skills in their users, and they're principally aiming at helping those IT developers get a very productive platform for them to be able to build and deliver projects quickly. No-code platforms in particular can help companies drive their digital transformation, by really providing the power of software to many more people in their organization. At Quick Base, what we found time and time again with our customers is that their IT and developer groups are working very hard on the big rock priorities within their organization, and what Quick Base can really help them do is move forward tons and tons of little rocks, little efforts that sort of stack up in a backlog of priorities that central IT


Is explainability enough? Why we need understandable AI

In order to create this human-centric ‘understandable’ AI, a person must be empowered through the AI to make a decision on the algorithmically ambiguous decisions. This means that the AI making the initial decisions about the veracity of a transaction has to also be built in a way that a human reviewing a specific issue can help resolve – without being a data scientist or “algorithmically literate”. Using a non-black box model, the data scientist can identify confidence parameters and inform the UI/UX designer what the nature of these parameters are. The UI/UX designer then creates an AI output that is descriptive rather than prescriptive. That is, it would clearly explain the confidence parameters and enable an end user to provide reasoning for a decision. Do we simply want machines to take over and make decisions for us? Likely not – we’ll instead want to take a more collaborative approach with machines where they augment us to make better decisions but allow us to manage inputs and set guidelines. Therefore, we need not only transparency and explainability but also, understanding.


The game-changing potential of smartphones that can smell

nose
How can a smartphone smell? According to KIT, "the electronic nose only is a few centimeters in size. The nose consists of a sensor chip equipped with nanowires made of tin dioxide on many individual sensors. The chip calculates specific signal patterns from the resistance changes of the individual sensors. These depend on the molecules in ambient air, differ for the different scents and, hence, are characteristic and recognizable. If a specific pattern has been taught to the chip before, the sensor can identify the scent within seconds. To start the process, the researchers use a light-emitting diode that is integrated in the sensor housing and irradiates the nanowires with UV light. As a result, the initially very high electrical resistance of tin dioxide decreases, such that changes of resistance caused by molecules responsible for the smell and attached to the tin dioxide surface can be detected." Clearly, this research has a long way to go before handset manufacturers will be open to including such a mechanism, but who nose? After all, in the ultra-tight packed innards of today's smartphone designs, "a few centimeters" is hardly trivial.


10 ways the enterprise could put blockchain to work

istock-849254008-1.jpg
The distributed ledger technology has the promise to make many operations more efficient and enable new business initiatives. But limitations in the technology itself as well as the business issues that arise with its implementation have curtailed mass adoption, said David Furlonger, vice president and fellow at Gartner. "All firms can do right now is experiment," Furlonger said. "They have to look at multiple offerings in the marketplace and understand the different governance models, data management architectures, security levels, and how it impacts their business." A large number of companies are now inquiring about the technology, said Martha Bennett, principal analyst at Forrester. "Many of the firms I speak with have projects going on, but not always with a firm view on whether to operationalize them," Bennett said. "There are a few highly ambitious projects under way, but these haven't gone live yet."Putting blockchain to work depends on the use case, Bennett said. "If there is a use case that calls for multi-party collaboration around shared trusted data, with or without an added element of automation, then that's worth pursuing if the existing system is error-prone, full of friction, or otherwise deficient," Bennett said.


How to protect physical infrastructure from cyberattacks

How do you know the unknown? So really, it's not really about identifying who these future or current threat actors might be, it's about understanding the types of attacks that we might be vulnerable to. The types of attacks that are emerging. We see for example evolutions in AI technology coming on very, very fast here. We realize, well, AI has the potential of being extremely good for our quality of life and the products that we build, but ultimately this technology is going to be turned against us. So as cyber professionals, it's our job to start to anticipate this technology and how these technologies are going to then be applied to the attack vectors, attacking our devices looking for openings, and how we can then build the fences against what we anticipate. It's very much a game of understanding our product, understanding the attacked surface, and building the fences for these types of attack vectors. ... . So when you start looking at the world of cybersecurity today and you look at the type of markets we're dealing with, some of the challenges come right down to geopolitical attacks as Andy was mentioning just a few seconds ago. 



Quote for the day:


"Intuition becomes increasingly valuable in the new information society precisely because there is so much data." -- John Naisbitt


Daily Tech Digest - June 06, 2018

Avoid these digital transformation false starts

Avoid these digital transformation false starts
Discussing “bi-modal IT” or “run the business vs. grow the business” may actually jeopardize your digital transformation. “By segregating legacy technologies from next-gen solutions, you are labeling one team as the past and another as the future,” says Lee. “When you identify one set of technologies — and one team — as something to get rid of, not only do you hurt the morale of half of your team, but you fail to innovate at the very foundation of your transformation. It’s not just customer-centric mobile apps that deserve innovation.” ... “There needs to be a collective agreement of whether your role is to transform the very foundations of your business or deliver new capabilities that the business will choose if and how to adopt,” says Lee. “You need to understand those expectations, especially when you are new to the company.” ... “The stakes of traditional IT disciplines: stability, security, software quality, and capacity are magnified during a digital transformation,” says Lee. “Those basics are only getting more important as your digital transformation takes technology closer to the customer and the core of what your company does.”



Blockchain’s Role in Securing Data Privacy

Blockchains make it easier to trace data, but they don’t enable you to control the flow of data once you’ve given away access. Since blockchains exist on a distributed network, there’s no central authority to stop someone from sharing the data you just shared. Blockchain doesn’t solve the issue of data leaks and re-sharing sensitive data. It only makes those leaks easier to trace. There’s still a need for privacy tools that encrypt and create access controls on blockchain data. A hybrid approach of a private, closed blockchain along with custom-developed privacy solutions may prove to be the best bet to gain the benefits of blockchain without losing the control of more centralised systems. draglet, a German blockchain development company, works in this field of private blockchain development, amongst other blockchain projects. With the right customisation, private blockchains could provide an easy to audit, low-risk way to store and manage customer data without sacrificing data controls. Additionally, smart contracts written on the blockchain could automate much of the access controls, sharing agreements, and data management tasks. 


Unpacking the event-driven microservices approach


When you use microservices with CEP outputs, you should think in terms of API managers, brokers and service buses. In this situation, microservices are invoked like service-oriented architecture or REST components in order for the developers to know the message formats needed, the nature of stateless or stateful processing and the way that microservices are sequenced along the workflows. Traditional programming practices that optimize the reuse of the smaller components can be effective here. Component reuse is an explicit benefit for microservices, and it has to be addressed in your design. Component reuse is facilitated by the fact that the sizing, in the functional terms of a microservice, used behind a CEP front end is almost totally controlled by the development team. Microservices with larger functional scopes aren't easily reused but are more efficient because there are fewer network paths to transit. Noncontextualized events are usually processed by microservices, lambdas or functional components. They are then orchestrated in an orderly way by a separate component; this is referred to as orchestration, workflow engine or step function.


Most businesses still struggling with mobile working and security

mobile working security
Fifty-three percent cited that one of their top three biggest problems with remote working is due to the complexity and management of the technology that employees need and use. Over half (54%) say that while their organisation’s mobile workers are willing to comply with requests relating to security measures, employees lack the necessary skills or technologies required to keep data safe. Nearly a third (29%) take the radical approach of physically blocking all removable media, and a further 22% ask employees not to use removable media although they have no technology to enforce this. “The number of organisations blocking removable media has increased compared with responses to the same question in 2017, when 18% said they were physically blocking all removable devices. A unilateral ban is not the solution and ignores the problem altogether whilst presenting a barrier to effective working. Instead, businesses should identify corporately approved, hardware encrypted devices that are only provided to staff with a justified business case. The approved devices should then be whitelisted on the IT infrastructure, blocking access to all non-approved media.” said Jon Fielding, Managing Director, EMEA, Apricorn.


What is TensorFlow? The machine learning library explained

What is TensorFlow? The deep learning library explained
The single biggest benefit TensorFlow provides for machine learning development is abstraction. Instead of dealing with the nitty-gritty details of implementing algorithms, or figuring out proper ways to hitch the output of one function to the input of another, the developer can focus on the overall logic of the application. TensorFlow takes care of the details behind the scenes. TensorFlow offers additional conveniences for developers who need to debug and gain introspection into TensorFlow apps. The eager execution mode lets you evaluate and modify each graph operation separately and transparently, instead of constructing the entire graph as a single opaque object and evaluating it all at once. The TensorBoard visualization suite lets you inspect and profile the way graphs run by way of an interactive, web-based dashboard. And of course TensorFlow gains many advantages from the backing of an A-list commercial outfit in Google. Google has not only fueled the rapid pace of development behind the project, but created many significant offerings around TensorFlow that make it easier to deploy and easier to use: the above-mentioned TPU silicon for accelerated performance in Google’s cloud


Now that everything can be tokenized, banks are taking notice

Now that everything can be tokenized, banks are taking notice
The key, according to Krauwer, is to further shape this future vision and learn how individuals can benefit from such a proposition. Even though the realization of a bank managing customers’ immaterial assets may still be far away, it’s not science fiction either, she states. “The past couple of years, individuals have become more and more empowered to get the most out of their assets,” Krauwer added. “Whether you make extra money by renting out your house through Airbnb or get free clothing by promoting a brand through your Instagram account, there’s no denying that a whole new economy has emerged with significantly lower entry barriers than in the pre-platform era.” ... One example is social network Earn.com, which allows its members to earn tokens whenever they respond to a message from a fellow community member. Yet, with an array of opportunities coming to the fore, a solution may be called upon that enables a person to get the most out of their assets with the least amount of friction involved that still maintains a person’s privacy.


Machine Learning in Finance – Present and Future Applications

Machine Learning in Finance - Present and Future Applications
Combine more accessible computing power, internet becoming more commonly used, and an increasing amount of valuable company data being stored online, and you have a “perfect storm” for data security risk. While previous financial fraud detection systems depended heavily on complex and robust sets of rules, modern fraud detection goes beyond following a checklist of risk factors – it actively learns and calibrates to new potential (or real) security threats. This is the place of machine learning in finance for fraud – but the same principles hold true for other data security problems. Using machine learning, systems can detect unique activities or behaviors (“anomalies”) and flag them for security teams. The challenge for these systems is to avoid false-positives – situations where “risks” are flagged that were never risks in the first place. Here at TechEmergence we’ve interviewed half a dozen fraud and security AI executives, all of whom seem convinced that given the incalculably high number of ways that security can be breached, genuinely “learning” systems will be a necessity in the five to ten years ahead.


Boards not asking right security questions


Harding said the second lesson relates to the fact that the most difficult decision throughout the cyber breach was deciding when to bring its customer-facing systems back online. “My question to the engineers was: What risks will we be taking if we put those systems back online? I realised that we could only go ahead when the cyber risk was lower than the business risk of being offline and that cyber risk needs to be a board decision,” she said. The third important lesson, said Harding, was that engineers really can communicate in English when they have to. “We learned that when engineers explain what they do in a way that non-technical people understand, that is when the magic really happens,” she said. In conclusion, Harding said it is extremely important that cyber security is not allowed to become a scary taboo. “We can’t make the digital world 100% safe, but we can make it civilised by building the necessary social, moral and legal scaffolding by having the right debates as a society to agree and set the rules of the road,” she said.


Embracing agile software methodologies to improve workflows

It is also important to keep a sustainable pace. While agility is the goal in these types of software development environments, the most efficient and effective method for creating software is keeping a realistic timetable. Having bouts of productivity is actually counter to the process. A steady, consistent pace is of the utmost importance. In order to keep pace, you will need to have consistent meetings with your team. Daily meetings, or scrum meetings, are the goal for software development teams in an agile environment. In these daily meetings software developers, engineers, and business people outside of the technical team go over all that has been accomplished and all that will be accomplished in the 24 hours to come. These daily meetings are structured around larger timetables. These time periods are punctuated with certain goals and usually last around 30 days. At the end of this 30 day period is when big reviews happen of the software product, major revisions are proposed, and timetables are revised.


Recruiting talent for digital cultures: Tips from McKinsey, Korn Ferry

When searching for digital talent, the wrong people are often the right people, said Swift, global leader for digital solutions at the global consulting firm Korn Ferry Hay Group. It's a conundrum her group takes pains to explain to clients seeking advice on creating digital cultures. "We actually do an exercise with executives where we have them list all the reasons they might not hire somebody," she said, citing as an example a common red flag -- the "jumpy resume." Prospective employees with a history of moving from job to job are often dismissed as bad bets, she said, but great digital candidates often do just that. "So, instead of saying, 'Well this person can't commit and they're flaky'," Korn Ferry asks clients to consider an alternative: i.e., "that this person is curious and adaptable, which are two of the traits in our research by the way that pop as being very predictive of success in digital talent," Swift said. But Swift warned it "takes a massive effort for some of these large organizations to say, 'OK, I'm not going to hire in my own image anymore" and practice what she calls reverse onboarding.



Quote for the day:


"It is amazing what you can accomplish if you do not care who gets the credit." -- Harry S. Truman