December 30, 2014

Consumerization Of Government Services Starts With Case Management
With a case-centric approach, agencies can track information more efficiently, make automated intelligent decisions, and route casework accordingly. This can mean serving a specific customer and fulfilling a request, or working across agencies to achieve a shared result, such as solving a crime, reducing the time required to determine whether a citizen is eligible for certain benefits, or even responding to a natural disaster and supporting recovery. The move to digital is critical if agencies wish to improve their standard of service -- and it means taking a holistic perspective at how your agency interacts with customers and considering new ways to leverage technology.


The World's Biggest Data Breaches, In One Incredible Infographic
In late November, hackers targeted Sony Pictures Entertainment in an unprecedented cyber attack. This led to the exposure of thousands of sensitive emails from Sony executives and threats to release more if the release of the film "The Interview" wasn't canceled. While this breach was indeed historically devastating, it's not the first successful cyber attack on a big corporate powerhouse. The folks over at Information Is Beautiful have put together an amazing infographic with the biggest data breaches in recenty history. You can see when the attack happened, who it happened to, and how large the impact was.


Alleged tech support scammers come up with all kinds of alibis to counter complaints
All four allegedly operated telemarketing scams where consumers were told that their Windows PCs were infected with malware or needed to be optimized to work properly. Some consumers had contacted the companies themselves after seeing their websites or search result ads, while others had been cold-called by the firms. The "help" provided was largely worthless, and in some cases the companies' representatives planted malware on the victims' PCs, the FTC and Microsoft charged. Customers were charged hundreds for the calls or fast-talked into expensive multi-year service contracts.


The Future of Everything? It’s About People Connecting with People
While a majority of organizations are starting to embrace social, mobile, real-time to various extents, if you really stop to think about it, they are simply running to where they think customers are rather than taking the time to understand why they’re in each channel, what they expect and how they (and you) define value. More importantly, there needs to be an integrated experience in these channels that align with the new customer journey that’s taking shape and evolving every day. The traditional funnel that exists today, or what I refer to in the new book as the Cluster Funnel, reflects how businesses are organized today.


The 2015 State of the U.S. Health & Fitness Apps Economy
It’s difficult to know what the best apps are for anything. So many apps populate Google Play and Apple App Store for each category that it is nearly impossible to know what is quality and what is merely mediocre. To help people understand what the best apps are for tracking their health & fitness and medical goals, Applause, the 360º app quality company, introduces the ARC 360 research report on The 2015 State Of The U.S. Health & Fitness Apps Economy. The report also helps companies determine where they stand in terms of quality vis-à-vis their competitors.


Designers Are Ditching The Mouse For The “Flow” 3D Motion Touch Controller
Co-founder Tobias Eichenwald thinks there are better ways to work than squinting at a screen. He wants Flow to let you control your computer “blindly, unconsciously, naturally” — like a guitar. Normally, designers have to dig through Photoshop menus, then use a clumsy mouse or hit the bracket button, which changes things in increments that are too big. “You can never do pixel-perfect graphics” says Eichenwald. With Flow, you can bump up or down the hue or brush size in Photoshop, alter model angles in AutoCAD, switch layers in Illustrator, select frames in a video editing app, and more.


5 Hyperscale Lessons For Mainstream Datacenters
In 2014, industry watchers have seen a major rise in hyperscale computing. Hadoop and other cluster architectures that originated in academic and research circles have become almost commonplace in the industry. Big data and business analytics are driving huge demand for computing power, and 2015 should be another big year in the datacenter world. What would you do if you had the same operating budget as one of the hyperscale datacenters? It might sound like winning the lottery, or entering a world without limitations, but any datacenter manager knows that infrastructure scaling requires tackling even bigger technology challenges -- which is why it makes sense to watch and learn from the pioneers who are pushing the limits.


2015 Prediction: FinServ & Regulators Will See Opportunity in Internet of Things
some legal gray areas might be whether it would be okay if a third party aggregated the farm information, combined it with satellite imagery of fields, and sold subscriptions to trading shops? If so, would that service come under regulatory scrutiny? And if that data could affect share price, how public would this data be? Would regulators call foul on firms that could not correlate the sensor data and flag suspicious employee behavior? What responsibility would a firm have to adopt these surveillance measures? "Regulators are going to be tapping into all these techniques and speeding up," Bates said. It is very probable they will leverage sensor data to track more people and things, just as firms will use the data to innovate their strategies.


Neglected Server Provided Entry for JPMorgan Hackers
The relatively simple nature of the attack — some details of which have not been previously reported — puts the breach in a new light. In August, when Bloomberg News first reported on the attack, which ultimately compromised some account information for 83 million households and small businesses, the bank’s security experts and the Federal Bureau of Investigation feared a sophisticated adversary. Some suspected the attack, possibly with backing from Russia, was intended as retaliation against economic sanctions levied by the United States and its allies in response to Russia’s policies in Ukraine. By mid-October, however, that theory began to fray, and the F.B.I. officially ruled out the Russian government as a culprit.


WiFi Preps for 5G, IoT Roles
The so-called NG60 study group has had just two meetings so far and may require as much as two years to complete its first draft standard. It is working on an upgraded version of the 60 GHz version of WiFi, 802.11ad, capable of delivering 20 Gbit/s over a very short range. Ultimately, NG60 also may include hardware support for mesh networks that could deliver a Gbit/s over 200 to 400 meters for backhaul links on small-cell base stations. Researchers at InterDigital Inc. are building a prototype of a 60 GHz directional mesh architecture using electronically steered phased array antennas that could support up to five hops.




Quote for the day:

"Great things are not something accidental, but must certainly be willed." -- Vincent van Gogh


December 29, 2014

5 Insights From The SEC Whistleblower Program Annual Report That Will Impact 2015
2014 showed a record growth of tips and complaints submitted to the SEC whistleblower program (over 10%), matched with a record number of awards. ... The SEC has authorized 14 whistleblowers to receive awards since the inception of the program, but 9 of these were in 2014. A partner with law firm Proskauer Rose L.L.P. in Chicago, Steven J. Pearlman, commented on the growth trend mentioned in the report, “I think that we would expect to see for the fiscal year 2015 report is another increase, and probably a marked increase, because of the $30 million award. The concern from an employer perspective is that this may very well lead to a lottery-playing dynamic.”


Amazon’s 2014 Holiday Sees Mobile Shopping Approach 60% Of Total Volume
Last year, Amazon reported that more than half of its customers were using mobile devices to shop, so there’s relatively little change with this year’s total only ‘approaching’ 60 percent. Still, both represent a huge change from prior holiday shopping seasons, indicating that transactions on mobile devices is becoming the default option, and that this isn’t just a fleeting fad or freak occurrence. Amazon’s Prime membership increase is likely the Christmas gift Jeff Bezos is most excited about, as their premium service tier is arguably the key to the company’s long-term strategy, as well as its revenue and profitability goals.


The Cost Of Healthcare Data Access
Reading this might already be alarming some business leaders out there. Some clinicians might argue that better shielded data could hurt patients. But wait, hear me out. I'm not proposing a SIPRNet for healthcare. I'm suggesting that first we must assess whether the efficiency of anywhere, anytime access to data is worth the risk of harm to our organizations and even to us personally, should armed assailants target us. Curbing remote access to data that isn't needed remotely is a great first step. Second, I'd like to call for new information delivery technologies capable of differentiating between internal and external access, and behaving accordingly so that large quantities of data can't be accessed from outside our protected networks.


Technology That Took Us a Step Back
Recently Reddit asked if you could erase one discovery or invention, what would it be. Some of the non techie ones included: Land mines, leaded petrol, napalm, children's beauty pageants, one-ply toilet paper, glitter, 24 hour news networks and reality television. In this slideshow we pluck out a few techie-related ones. Add to the list in the comments section below.


HP named leader in 1st Magic Quadrant for Deduplication Backup Appliances
Gartner published its first ever Magic Quadrant for Deduplication Backup Target Appliances to help storage professional’s short list vendors. We believe that this report is a testament to a growing recognition that backup and recovery is the next critical frontier in data center modernization. In the report, Gartner positioned HP within the Leaders Quadrant with only one other vendor. I want to share with you our take on the reasons why. “By 2018, 50% of applications with high change rates will be backed up directly to deduplication target appliances, bypassing the backup server, up from 10% today.”*


Cloud and analytics are forcing data center transformation
“High-performance computing, which used to be a bit of a niche market, is becoming mainstream as more people want to crunch their data. So this is blowing new life into HPC while the cloud is driving an all new model for compute,” Andreoli told theCUBE host Dave Vellante. As organizations adopt different approaches to implementing that model, HP is adding variety to its server portfolio. Most traditional enterprises are taking the converged infrastructure route, replacing their dis-aggregated architectures with integrated modules that combine hardware building blocks into a single chassis with built-in management software to reduce administrative overhead.


Five Rules for Strategic Partnerships in a Digital World
Partnerships have always been a critical strategy for businesses looking to grow in unfamiliar markets, tap new customer segments, or sell additional products or services. They have also always been notoriously tricky to make work. Too bad, because in today’s hypercompetitive, hyper-connected marketplace, partnerships have taken on even greater strategic importance and complexity. Both business-to-consumer and business-to-business companies are in an arms race to develop innovative user experiences, expand distribution, and capture new sources of monetization.


New Congress may move swiftly to raise H-1B cap
There is no certainty that these efforts to raise the H-1B cap will succeed, and it's possible that acrimony with the White House over immigration will derail action on an H-1B-specific bill. Another factor in the mix might be former Florida governor Jeb Bush, who may be about the closest thing to an announced candidate for the Republican presidential nomination that his party has right now. If Congress takes up any immigration issue, he may speak out. Bush, who recently announced on Facebook that he has "decided to actively explore the possibility of running for President of the United States," is a strong advocate for raising the H-1B cap, much like his brother, former President George W. Bush.


Six IT nightmares that will keep us all awake at night
Are you looking forward to 2015? I know I am. 2014 was okay, but I will definitely be glad to leave it in the past. But as we look forward to 2015, the lessons and experiences of 2014 will haunt us IT folks. So whether you're a CEO, CTO, CIO, CMO, CDO, CFO, CXO, IT manager or just a rank-and-file engineer, here's a list of what's going to cause nightmares and what we'll be cleaning up throughout the upcoming year.


Innovation Machine
Traditional financial accounting is a great way to run a business — and the most efficient way to kill new ideas. We have to agree on a new framework for accounting against early-and-mid-stage businesses before they’ve gained enough traction to be measured on revenue. This framework is based on three phases of product development and Dave McClure’s Pirate Metrics. Each phase has it’s own set of metrics that matter. “Do you have a problem worth solving?”



Quote for the day:

"Example is not the main thing in influencing others. It is the only thing." -- Albert Schweitzer


December 28, 2014

The future is Machine Learning, not programs or processes.
But how practical is such machine learning to simplify process management for the business user. Does it require AI experts or big data scientists and huge machines? Absolutely not, as it too uses the LESS IS MORE approach. Recognized patterns are automatically compacted into their simplest, smallest form and irrelevant information is truncated. But in 2007 it still used IT data structures and not business terminology. Using an ontology to describe processes in business language enables human-to-human collaboration and run-time process creation, and simplifies human-computer cooperation.


Hayim Makabee on the Role of the Software Architect
In this talk Hayim will present the practical aspects of the role of the Software Architect, including the architect’s contribution at the diverse stages of the software development life cycle, and the cooperation with the diverse stakeholders: Developers, Team Leaders, Project Managers, QA and Technical Writers. Hayim Makabee was born in Rio de Janeiro. He immigrated to Israel in 1992 and completed his M.Sc. studies on Computer Sciences at the Technion. Since then he worked for several hi-tech companies, including also some start-ups. Currently he is a Research Engineer at Yahoo! Labs Haifa.


From Print to Digital: Adopting Standards, Transforming Paradigms
Pearson is the world's largest education company,. Pearson executive Ryan Hunt will outline how digital and technology have triggered Pearson's reinvention as a worldwide learning provider rather than a textbook publisher, and how Pearson is leveraging and driving the development of global standards including instigating the EDUPUB initiative.


Next-Gen Business Analytics Paving the Way to Success in 2015
Business analytics give arrangements which help to settle on key choice and business strategies by gathering expansive data and information. You would find that it does have not simple but complex data like profits, losses, transactions, marketing return, customer feedback and so forth. Normally business analytics programming is utilized to create these sorts of information. This is not another term; however it has ended up being more exact and organized with time. Individuals frequently require a legitimate structure to assess the gigantic measure of data and information accessible.


2014 in Numbers: Huge Valuations, Shocking Security Stats, and a Big Climate Deal
55 percent: Proportion of the supposedly secure servers on Alexa’s list of the million most widely used websites that were vulnerable to a two-year-old vulnerability in the widely used encryption software library known as OpenSSL, including 44 of the top 100. When the flaw was found this year, many website operators scrambled to address the vulnerability, but patching efforts seemed to stall just months after the initial discovery, and hundreds of thousands of devices could still be vulnerable.


Cynefin 101 – Portfolio Management
The Cynefin practice of ritualised dissent is used here to review and validate the initiatives and this is something that most organisations are not good at. It is all too common, due to the siloed structure of most organisations, for an initiative to be proposed from an individual or small group of people without wide review and support. This technique ensures that a wide review is undertaken and therefore when it presented it is more likely to be complete and supported. The idea behind the practice are similar to UCL’s Vincent Walsh idea of ‘trashing’. Again the idea is that a proposal is reviewed in a rigorous manner to ensure that it fully formed. This practice ensures an objective review of the idea and removes the subjectively.


Identifying and Mitigating Multiple Vulnerabilities in NTP
Multiple Cisco products exhibit vulnerabilities when processing crafted Network Time Protocol (NTP) IP version 4 (IPv4) packets. These vulnerabilities can be exploited remotely without authentication and without end-user interaction. Successful exploitation could allow arbitrary code execution or result in a denial of service (DoS) condition. Repeated exploitation attempts could result in a sustained DoS condition. The attack vector for exploitation is through NTP using UDP port 123 over IPv4 packets. An attacker could exploit these vulnerabilities using spoofed packets.


A Guide to Choosing a Next-Generation Firewall
It is important to note that these five vendors were selected as they were highlighted in the most recent industry reports; they're not the only NGFW vendors on the market today and enterprises have other options. We simply highlight five of the highest rated devices according to NSS Labs' testing and our own evaluation of the products. ... The bottom line is that all of the products discussed here are from well-respected vendors and each provides a complete NGFW solution. Because of this, it will come down to the individual specs and features that will sway each buyer to one product over another.


Lockdown: Information Security Threats on the Edge of 2015
Look at information security threats. While the number of high-profile attacks may go up or down in any given year, there will always be attacks, and there isno "magic bullet" to prevent them from occurring. What does change is the scope. The adoption of new technologies leads to new attack vectors. Malware authors, malicious individuals and groups, and nation-states all have the necessary discipline (and in many cases, the resources) to exploit our increasing technology footprint.


JPMorgan Chase’s Weak Link—and What It Means for Healthcare
One is that the breach occurred during a period of high turnover in the bank cybersecurity team. It’s also possible that vetting of outside vendors might also have been an issue: he same group of hackers that penetrated the JPMorgan network attacked JPMorgan’s Corporate Challenge charitable race website, which was run by a separate company. Another issue is related to the bank’s size, and the difficulty of securing the networks of companies that had been acquired. In JPMorgan’s case, the name “Bank One”—a bank that was acquired in 2004—still appears in a web URL, according to the Times.



Quote for the day:

"Instead of worrying about what people say of you, why not spend time trying to accomplish something they will admire." -- Dale Carnegie

December 27, 2014

UPS ORION Advanced Analytics Case Study
We then learned another lesson on the difference between “feasible” and “implementable”. There must be a balance between consistency and optimality. Advanced optimizations are great at rearranging things to find the lowest cost alternative. But that means that from day-to-day, they could significantly change a route just to save a penny. As you can imagine, drivers don’t like this and neither do customers.  We chose to add business rules and subjective parameters to limit and control the day-to-day variations. This not only improved consistency and acceptance by the drivers, but made the solution from ORION more understandable to front-line personnel, all while continually improving the experience for our customers.


Microsoft and Google Make Odd Bedfellows
It’s true, their businesses are more similar than they used to be, or rather Microsoft has evolved to compete more directly with Google’s cloud model, but there are ways both of them benefit from some of the same trends and developments. Technology firms believe in technology solutions the way capitalists have faith in capitalism and the Pope accepts the Church as true. So, in many respects, you would expect Microsoft and Google to have a similar job of persuading all of us that technology is the answer to all our ills.


“Smart” Software Can Be Tricked into Seeing What Isn’t There
The researchers can create images that appear to a human as scrambled nonsense or simple geometric patterns, but are identified by the software as an everyday object such as a school bus. The trick images offer new insight into the differences between how real brains and the simple simulated neurons used in deep learning process images. Researchers typically train deep learning software to recognize something of interest—say, a guitar—by showing it millions of pictures of guitars, each time telling the computer “This is a guitar.” After a while, the software can identify guitars in images it has never seen before, assigning its answer a confidence rating.


Examining New Mission-Focused Capabilities
The video at this link and embedded below captures the content and dialog of a webinar which examined new capabilities of Cloudera and Intel, with a focus on capabilities that provide a full stack solution to many key enterprise mission needs. The webinar included insights by Cloudera’s Senior Director of Technology Webster Mudge and Intel’s Enterprise Technology Specialist Ed Herold, plus questions from an informed audience. Results of the recent CTOlabs.com white paper on this topic were also presented.


Security Prediction: The Rise of the Third-Party Risk
Over the next year, third-party providers will continue to come under pressure from targeted attacks and are unlikely to be able to provide assurance of data confidentiality, integrity and/or availability. Organizations of all sizes need to think about the consequences of a supplier providing accidental, but harmful, access to their intellectual property, customer or employee information, commercial plans or negotiations. And this thinking should not be confined to manufacturing or distribution partners. It should also embrace your professional services suppliers, your lawyers and accountants, all of whom share access, oftentimes to your most valuable data assets.


IT Professionals Not So Jolly This Holiday Season
"With a more global workforce and customer base, companies must be able to cater to various time zones, cultures and customs, even through the holidays. Every minute the network or the site is down is a blow to productivity," he said."Further, we have to remember security for the network never takes vacation. It requires constant vigilance to ensure that an organization's most critical data is kept safe." Since many users aren't experienced remote workers, when they attempt to be online over the holidays, survey respondents noted that more than half (57 percent) of users experience problems with network access.


Business Intelligence Analysts as Architects
Likewise, an architect who doesn’t understand how to translate their artistic visions is less an architect than just a competent artist. When a building owner is truly receptive to the architect suggesting what “could be done” and why it might be useful to have that functionality, great things happen. Similarly, a business sponsor is more likely to embrace an IT partner who, because of an in-depth understanding of their goals, can offer suggestions that would otherwise be overlooked. The best Business Analysts can envision underlying possibilities in data that offer valuable business intelligence in ways the business may not even be aware. Thus, like a skilled architect, the skilled Business Analyst can solidify the vision and map the practical implications to a blueprint.


Singapore Wants a Driverless Version of Uber
Lam Wee Shann, director of the futures division for Singapore’s Ministry of Transport, said during a panel held at MIT last month that the government wants to explore whether autonomous vehicles could reduce congestion and remake the city into one built around walking, bicycling, and public transit. “Singapore welcomes industry and academia to deploy automated vehicles for testing under real traffic conditions on public roads,” Lam said in a follow-up e-mail interview. He declined to say whether Google or any other companies pursuing driverless cars have contacted Singapore yet.


6 aging protocols that could cripple the Internet
The biggest threat to the Internet is the fact that it was never really designed. Instead, it evolved in fits and starts, thanks to various protocols that were cobbled together to fulfill the needs of the moment. Few of those protocols were designed with security in mind. Or if they were, they sported no more than was needed to keep out a nosy neighbor, not a malicious attacker. The result is a welter of aging protocols susceptible to exploit on an Internet scale. Some of the attacks levied against these protocols have been mitigated with fixes, but it’s clear that the protocols themselves need more robust replacements. Here are six Internet protocols that could stand to be replaced sooner rather than later or are (mercifully) on the way out.


Enterprises Quickly Moving Beyond Cost Reduction To Customer-Driven Results
Business analytics is a pivotal factor in 35% of enterprises adopting cloud computing today, and 73% are seeing improved business performance after implementing cloud-based applications and strategies. These and other insights are from the KPMG study, 2014 Cloud Survey Report: Elevating Business in the Cloud. KPMG’s annual survey of enterprise cloud computing adoption finds there is a significant shift away from cost reduction alone to a more customer- and data-driven mindset on the part of C-level executives interviewed.



Quote for the day:

"Unless you try to do something beyond what you have already mastered, you will never grow." -- Ralph Waldo Emerson


December 26, 2014

Developing a Modern Data Management Strategy
Setting aside data growth and dissemination, the majority of the employee workforce is not concerned about the management of data; they are simply concerned with having the ability to access data when and where required. With the introduction of bring your own device (BYOD) policies, mobile access poses an additional complication for organizations. If adequate data management policies are not put into place alongside an organization’s BYOD initiative, it can result in employees saving duplicate copies of large datasets remotely versus pulling it from a central repository. Duplication can quickly multiply capacity, compliance and regulatory concerns, as well as waste valuable storage space.


5 Reasons Why Excel Isn't Enough for Financial Reporting
Despite the compactness and versatility, it’s not necessarily the best knife, corkscrew or screwdriver. You might be able to get by in some situations with the Swiss Army Knife, but as the job gets bigger, you need a separate knife, corkscrew and maybe even multiple screwdrivers. ... For a small company with limited users and needs, they might be able to do all of their financial reporting and analysis within Excel. Basic data analysis, calculations and even visualizing simple tabular data can be achieved in some form or another. But as the company grows and becomes more complex, there needs to be a more robust financial reporting tool with more controls and oversight.


Why Digital Business means going web-scale
It’s a term coined by Gartner to describe the new approaches to computing pioneered by cloud services firms such as Google, Amazon, Rackspace, Netflix, Facebook and so on. These approaches potentially enable orders of magnitude of improved service delivery when compared to many of their enterprise counterparts. Gartner has identified six elements to Web-scale IT: industrially-designed datacentres, Web-oriented (or microservices) architectures, programmable management, velocity-focused processes, a collaborative organisation style and an innovation-centric and learning culture.


Patting down the pachyderm: Big data prognostications for 2015
Elephants are astonishingly intelligent creatures. Long ago, on a family vacation to Indonesia, I had the pleasure to see a troop of trained elephants perform close-up in an audience-interactive show. As I witnessed one of the animals crouch down around my intrepid firstborn, I was relieved to see that it was smart enough to follow its trainer’s instructions, sensitive enough to the boy’s presence and agile enough to execute the entire maneuver like the professional performer he is. As 2014 draws to a close, the proverbial elephant that we call “big data” is smarter, more sensitive and more agile than ever. It’s got a much more varied array of advanced analytics riding on its broad back.


Hundreds of Portuguese Buses and Taxis Are Also Wi-Fi Routers
A massive mobile Wi-Fi network that could be a model for many cities was launched in the city of Porto, Portugal, this fall. Buses and taxis are equipped with routers that serve as mobile Wi-Fi hot spots for tens of thousands of riders. The routers also collect data from the vehicles—and from sensors on trash bins around the city—and relay it back to city offices to help with civic planning. More than 600 buses and taxis are part of the network, which is now serving 70,000 people a month and absorbing between 50 and 80 percent of wireless traffic from users who otherwise would have had to use the cellular network.


How Much Longer Until Flash Storage is the Only Storage?
While it’s clear that flash array storage features a number of advantages in comparison to HDD, these advantages don’t automatically mean it is destined to be the sole storage option in the future. For such a reality to come about, solutions to a number of flash storage problems need to be found. The biggest concern and largest drawback to flash storage is the price tag. Hard drives have been around a long time, which is part of the reason the cost to manufacture them is so low. Flash storage is a more recent technology, and the price to use it can be a major barrier limiting the number of companies that would otherwise gladly adopt it. A cheap hard drive can be purchased for around $0.03 per GB. Flash storage is much more expensive at roughly $0.80 per GB.


Android Lollipop tips its hat to photographers with RAW support
When you snap a shot with your Android camera, the internal software compresses the image into a .jpg file. To the untrained, naked eye, that photo usually looks pretty spectacular. The thing is, what you see is what you get. You can't really manipulate that photo on any low level. It's compressed and saved in a read/write format, so the images can be more easily edited with a bitmap editor (such as The Gimp or Photoshop). With RAW images, the data has been minimally processed from the image sensor. Many consider RAW images to be the digital equivalent of the old school negative. These RAW images will have a wider dynamic color range and they preserve the closest image to what the sensor actually saw.


The Future of Data Scientists
Over time, the skill set for this group has evolved. We’ve seen a convergence of technological and math skills, and qualified data scientists are now part software architect and part mathematician. Data scientists must be able to understand technology and implement solutions in various languages while at the same time keep up with the advances in mathematics and machine learning that drive the profession. Even the brightest minds have had to embrace technology tools to complement their analysis as the need to identify patterns in huge volumes of multidimensional data has outpaced the human brain’s ability to do so. Raw computing power has also become increasingly important as organizations demand that decisions be reached and executed quickly.


IoT groups are like an orchestra tuning up: The music starts in 2016
IoT involves linking devices that in many cases have never been connected before, or at least not on anything but a closed, specialized network. It also involves managing those objects and developing applications to make them do things together that they could never do alone. So products from different vendors eventually will have to speak the same language, at some level. If they can't, then products for connected homes, cities and factories won't ship in the largest possible numbers, which they will need to do if prices are to plummet like they have for PCs, smartphones and other products over the years. That's especially important for consumer IoT, where cost is paramount.


The Future Of Wearable Technology Is In The Enterprise (At Least For Now)
“The whole world is going to go head-worn. It’s not if, it’s when,” says Osterhout. “The decision has already been made. It’s fait accompli.” Osterhout’s company made its name developing wearable imaging devices for the military. Think of night vision, target identification, and anything else you might have seen in a Schwarzenegger movie involving robots, aliens, and explosions. “We’ve built and funded and fielded thousands and thousands of handheld computers and headworn display systems for the military in Iraq and Afghanistan. In the New Year the company may be taking a version of its product to the big International Consumer Electronics Show in Las Vegas and that would most definitely not be for a military buyer.



Quote for the day: