April 25, 2016

Cyberattack prediction to improve drastically

AI2, as the new system is called, merges analyst intuition with AI. The researchers believe they can obtain an 85 percent prediction rate with the combination. That’s “roughly three times better than previous benchmarks,” the publication says. AI2 plows through the data looking for patterns, as do other detection systems. When it finds something, it tags it and alerts the human analyst, which is pretty run of the mill. Nothing special there. Where it gets clever is that after the analyst has made a determination—bad code, good code—the AI system takes over again and pumps that knowledge back into the machine. Thus the feedback from the human analyst gets incorporated into the learning.


Q&A: Bill Gates

For a lot of energy innovations, you’ve got to give government credit. With nuclear energy, all the key research was done either by the government or by government funding. With fossil fuels, there was clearly some spillover effect from the digital revolution to analyze geological data, but it was government investing that helped to get to this incredibly precise horizontal drilling capability. So basic R&D spending has been the thing that has driven most of the breakthroughs. We do need private-sector risk-takers to go out and scale the stuff up, which is why we paired the idea that 20 leading countries must double their energy R&D over the next five years with a group of investors [the Breakthrough Energy Coalition] that will take on funding high-risk, breakthrough companies.


How Israel is rewriting the future of cybersecurity and creating the next Silicon Valley

Israel is a land of mystery, science, faith, reason, tension, and peace. Today, it is most widely known for its long-smoldering geopolitical conflict and its religious sites held sacred by four world faiths. But, the aspect of modern Israel that is having the most significant impact on global civilization in the 21st century often goes under the radar. Since the rise of the personal computer, Israel has been quietly making major contributions to the technologies that are transforming humanity and giving people tools to solve age-old problems in powerful and exciting news ways. And, these contributions to the global technology ecosystem have accelerated in the past two decades.


Bitcoin, Schmitcoin. The Real Breakthrough is the Blockchain Behind It

“Reliable,” “permanent.” Not words we’re used to in the online world. But the distributed nature of the blockchain and the strength of the cryptography make sabotaging the blockchain unusually tough for would-be hackers or terrorists. (Cough, cough: digital banking records.) And the system’s continually being strengthened. The blockchain community is currently prioritizing scalability—the bitcoin system’s still a bit slow—and locking down privacy. Given the permanence of the blockchain's record, there’s a lot of info to, well, hide. Also, there's a debate raging within the community about whether there should be multiple blockchains for different uses, or one for everything. We're not taking sides.


How cloud computing and the on-demand economy are remaking IT careers

Evidence suggests more businesses will need specialist managers to take control of a portfolio of diverse IT projects. Research from the Tech Partnership and Experian suggests future growth in specialist technology roles is likely to be greatest amongst IT directors, with 37.5 per cent growth between 2015 and 2025. Interestingly, the demand will only be part met by churn within the profession. New entrants will fill most opportunities (81 per cent), including job changers from non-technology positions. BCS director of professionalism Adam Thilthorpe says there is a notable upwards trend in the amount of people -- from all kinds of disciplines -- who see their future in IT. "I would argue that we need evangelists for the positive power of IT in all areas of the business," he says.


Why IoT Affects Every Industry Today. Yes! Including Yours.

All physical devices that play an important part in our daily lives can be IoT devices. What makes them unique is that they have sensors, actuators, and embedded communication hardware to remain connected to the internet. ATMs were the first IoT-related devices that were in use as early as 1974. The story of the ATM’s rapid rise to ubiquity is also one of a revolution in retail banking. The staff at modern retail-banking branches are now free to engage customers in higher-value services, such as insurance, mortgages and stock-market trading. ... This innovation opened the door to more advanced customer services like telephone and Internet banking. That’s the power of IoT devices! As technology protocols are advanced, more and more devices have now begun to interact with each other. Together, they have become more aware, autonomous and capable of providing actionable insights into the world around us.


Bangladesh Bank attackers used custom malware that hijacked SWIFT software

There are still many unknowns about the well-planned Bangladesh Bank heist, such as who was behind it, how they got into the bank's network in the first place, and how they initiated the rogue transfers. However, the existence of this custom malware toolkit should serve as a warning to other financial institutions. "This malware was written bespoke for attacking a specific victim infrastructure, but the general tools, techniques and procedures used in the attack may allow the gang to strike again," the BAE researchers said. "All financial institutions who run SWIFT Alliance Access and similar systems should be seriously reviewing their security now to make sure they too are not exposed."


Navigating the Data Breach Regulatory Maze

In addition to incident variability, data breach laws are a maze of growing complexity and ambiguity. There are 51 state and territory breach notification laws that have different definitions of personal information, allow varying exceptions and have different requirements regarding notification thresholds, content and timing. And these laws are rapidly changing and getting stricter: In 2015 and the first part of 2016, 10 states enacted new addendums or breach laws. Adding to the complexity is a plethora of federal regulations and standards—HIPAA, GLBA and PCI to name a few—as well as international laws and the long awaited European Union’s General Data Protection Regulation (GDPR). The primary struggle for privacy and compliance professionals is lack of consistency given the manual and highly subjective methods of conducting the required multifactor risk assessments. 


IoT Security Will Reach $840 Million By 2020, Garter Finds

"Gartner forecasts that 6.4 billion connected things will be in use worldwide in 2016, up 30 percent from 2015, and will reach 11.4 billion by 2018," Ruggero Contu, research director at Gartner, wrote in Monday's report. "However, considerable variation exists among different industry sectors as a result of different levels of prioritization and security awareness." IoT devices used across vertical industries will be the largest area of growth, followed by energy management, automotive applications, and the consumer-driven IoT category. From 2013 through 2020, Gartner expects IoT endpoints to experience an annual growth rate of 32%, and for endpoint spending to be dominated by connected cars and machinery, such as commercial aircraft, as well as farming and construction equipment.


Software audits: How high tech plays hardball

Technically, a software audit is a way to prove you've installed only software you've paid for, or for a publisher to prove you've installed or used too much. But the audit process often ends by the customer signing a check -- either to pay for software that was over- or misinstalled, or to strike a new deal for a longer-term commitment “There is going to be a sale at the end of an audit," says Peter Turpin, vice president at Snow Software. "Auditing is a way of collecting money for the software a customer has installed. Therefore you need to pay for it.” But major publishers also use the threat of an audit as a way to close new deals, says Craig Guarente, co-founder of Palisade Compliance, which helps enterprises manage Oracle licensing issues.



Quote for the day:


"You will face your greatest opposition when you are closest to your biggest miracle." -- Shannon L. Alder


April 24, 2016

Finding the Truth Behind Minimum Viable Products

When we start off building a new feature or product, there are a million questions to answer. “Is this solving the customer’s problem? Does this problem really exist? What does the user expect to gain with the end result?” We have to find the answers to these questions before committing ourselves to building a solution. This is why starting with a minimum feature set is dangerous. When you jump into building a version one of a new product or feature you forget to learn. Experimenting helps you discover your customer’s problems and the appropriate solutions for them by answering these questions. It also doesn’t end with just one experiment. You should have multiple follow-ups that keep answering questions. The more you answer before committing yourself to the final solution, the less uncertainty there is around whether users will want or use it.


This finance trend is so hot even Amazon wants in

This would be a logical progression for Amazon, which already has a significant and active user base. Amazon has been experiencing increased growth tied to payments, as its payments unit has 23 million active users and has recorded 200% year-over-year growth in merchants adding the "Pay with Amazon" buy button to their online stores. There is also precedent for Amazon to make such a move. Chinese e-commerce giant Alipay has more than 450 million monthly active users and has more than 50% of the online payments market in China. So Amazon could be on the path to building up a similar type of momentum with its own customers. Fintech acquisitions would also make Amazon more competitive with other checkout services such as Apple Pay and Visa Checkout.


Intel Pivots From PCs to Cloud

"The data center and Internet of Things businesses are now Intel's primary growth engines, and combined with memory and FPGAs, form and fuel a virtuous cycle of growth," CEO Brian Krzanich said. "Together these businesses delivered $2.2 billion in revenue growth last year, made up 40 percent of our revenue and the majority of our operating profit." Details of the cuts will be announced in the weeks, he said, adding that the restructuring was not something he took lightly. Krzanich has been focused on making this transitional move since he became CEO three years ago. The restructuring announcement was made alongside Intel's first-quarter earnings report.


Bitcoin and Blockchain Have Their Own Futures

Gil Luria, in response to the question by Bloomberg’s Joe Weisenthal and Scarlet Fu about blockchain technology, clarifies the difference between bitcoin and its underlying technology. Blockchain is superseding bitcoin when it comes to investments made by big banks and investment firms. Many banking and financial institutions have already invested their time and resources in the development of a private blockchain network for their regular operations. While bitcoin is used for payment applications, blockchain is used for an entirely different range of applications. According to him, blockchain is a vast tool suitable for asset classes while bitcoin serves a much simpler purpose of making payments and executing simple banking functions.


7 Test Automation Requirements for Higher Software Quality

For unit testing, there are many testing frameworks developers use to ensure that their code does not break. JUnit in Java and Karma in JavaScript are some examples that most organized development teams should already be using. As for larger-scale integration tests, scripts are usually created to simplify tasks that would be too tedious to perform manually. However, creating these automated tests is often time-consuming and not cost-effective, especially if the environment requires many components and environmental configurations to be observed and coordinated. Automated regression testing, which largely relies on the user interface, is very effective, and many QA professionals are achieving excellent results with programmatic approaches such as APIs and service virtualization testing.


Man vs. Tool? On the Role of Software Tools and Human Experts in SQA Activities

There are several tasks that can only be performed by human experts and not by software tools (such as ‘Define relevant quality aspects/ scope of analysis/ quality goals’ or ‘Configure/ customize/ administrate software tools’). Furthermore, there are several tasks that have to be completed jointly by software tools and human experts because each contributes a subpart of the overall task (for example ‘Analyze software quality’ or ‘Perform tests’). Hence, we conclude that a combination of software tools and human expertise should be used in software quality activities (‘man and tool’ instead of ‘man vs. tool’). Only the combination of both gives a holistic picture of software quality and only human commitment ensures software quality and its improvement.


Reasoning About Software Quality Attributes

Just as general scenarios provide a template for specifying quality attribute requirements, quality attribute design primitives are templates for "chunks" of architectural designs that target the achievement of specific quality attribute goals. Attribute primitives provide building blocks for constructing architectures. However, they are building blocks with a focus on achieving quality attribute goals such as performance, reliability and modifiability goals. Quality attribute design primitives will be codified in a manner that illustrates how they contribute to the achievement of quality attributes. Therefore each attribute primitive will be described not only in terms of their constituent components and connectors, but also in terms of the qualitative and/or quantitative models that can be used to argue how they affect quality attributes.


A Code Quality Problem in Washington State Puts Dangerous Criminals Back on the Street

A defect in the software used to calculate early release resulted in good behavior credits being applied to inmates. These inmates were not supposed to receive the credits and as a result were allowed out early. The issue was flagged more than three years ago when a family was notified about the early release of a dangerous perpetrator. Nick went on to explain that the family calculated the date themselves and contacted the department about the miscalculation. After the software defect was noticed in 2012, the issue remained in tact because the department did not take measures to fix the problem. The issue was brought to the governor’s attention in December of 2015, who immediately began working to resolve the issue.


11 Myths About Software Qualification and Certification

With software taking on an ever-greater role in embedded systems, companies are realizing that “quality code” requires more than just the developer’s claim. Even for systems that don’t require formal certification for functional safety or security, software qualification is becoming more common. After all, who really wants to risk expensive field support, product recalls, or even legal action if software fails? Still, at least 11 myths continue to circulate about software qualification and certification.


Characteristics of a Great Scrum Team

According to the Scrum Guide the Scrum Master is responsible for ensuring Scrum is understood and enacted. Scrum Masters do this by ensuring that the Scrum Team adheres to Scrum theory, practices, and rules. The Scrum Master is a servant-leader for the Scrum Team. The Scrum Master helps those outside the Scrum Team understand which of their interactions with the Scrum Team are helpful and which aren’t. The Scrum Master helps everyone change these interactions to maximize the value created by the Scrum Team. The role of a Scrum Master is one of many stances and diversity. A great Scrum Master is aware of them and knows when and how to apply them, depending on situation and context. Everything with the purpose of helping people understand and apply the Scrum framework better.



Quote for the day:


"The value of a company is the sum of the problems you solve." -- Daniel Ek


April 23, 2016

How IoT security can benefit from machine learning

“Machine learning is a critical component to developing Artificial Intelligence for IoT security,” says Uday Veeramachaneni, co-founder and CEO at PatternEx. “The problem is that the IoT’s will be distributed massively and if there is an attack you have to react in real-time.” Most systems relying on machine learning and behavior analysis will gather information about the network and connected devices and subsequently seek everything that is out of normal. The problem with this primitive method is that it produces too many false alarms and false positives. The approach suggested by PatternEx is to develop a solution that incorporates machine learning and augments it with human analyst insight for greater attack detection.


Blockchain - Legal and regulatory issues around distributed ledger technology

As with any potentially transformative new technology, distributed ledgers raise a number of questions for policy makers and regulators at both national and international levels. Regulators are certainly closely analysing and monitoring distributed ledger developments and, for now, appear cautiously optimistic about its potential, especially because of the potential that distributed ledgers could actually help to improve regulatory compliance tracking and reporting. But, guess what?: most authorities are taking a "wait and see" approach. Blockchain and distributed ledger technology is not without its challenges, including scalability and latency, lack of mainstream understanding, lack of readiness in some sectors to rely exclusively on data in digital form, over-reliance on out-dated legacy systems which would need to be overhauled before distributed ledger technology could be implemented.


What can a toothbrush instruct us about IoT business styles?

Let’s make a Bluetooth-related toothbrush that comes with a smartphone app. Now the “smart” toothbrush helps Oral-B do a improved task in protecting dental well being by “focusing, tracking, motivating and sensing”. The toothbrush is smarter, but the business product is not. The related solution supposedly generates extra worth for buyers, but all the other things of the business product continue being the same. The worth is nevertheless shipped by way of a toothbrush unit, captured by sales by way of retail channels access to the retail shelf-room is nevertheless the essential competitive edge. Not a great deal business product innovation here. ... Sceptics, of course, will ask, “Who wants builders to extend the toothbrush?” But moms of youthful kids will see a sea of opportunity here


EU charges Google with foisting its search and browser on smartphone makers

This is the second set of charges against Google by the commission. On April 15 last year, it announced a “statement of objections” against the search giant in an investigation into charges that its Internet search in Europe favored its own comparison shopping product. The commission announced on the same day an investigation into Google’s conduct with regard to the Android operating system that would look, among other things, into whether Google had illegally hindered the development and market access of rival mobile applications or services by requiring or providing incentives to smartphone and tablet manufacturers to exclusively pre-install Google’s own applications or services.


10 Important Predictions for the Future of IoT

"A recurring theme in the IoT space is the immaturity of technologies and services and of the vendors providing them. Architecting for this immaturity and managing the risk it creates will be a key challenge for organizations exploiting the IoT. In many technology areas, lack of skills will also pose significant challenges." In the coming years, IoT will look completely different than it does today. IoT is a greenfield market. New players, with new business models, approaches, and solutions, can appear out of nowhere and overtake incumbents. But business is the key market. While there is talk about wearable devices and connected homes, the real value and immediate market for IoT is with businesses and enterprises.


A digital crack in banking’s business model

Across the emerging fintech landscape, the customers most susceptible to cherry-picking are millennials, small businesses, and the underbanked—three segments particularly sensitive to costs and to the enhanced consumer experience that digital delivery and distribution afford. For instance, Alipay, the Chinese payments service (a unit of e-commerce giant Alibaba), makes online finance simpler and more intuitive by turning savings strategies into a game and comparing users’ returns with those of others. It also makes peer-to-peer transfers fun by adding voice messages and emoticons. From an incumbent’s perspective, emerging fintechs in corporate and investment banking (including asset and cash management) appear to be less disruptive than retail innovators are.


When Does Deep Learning Work Better Than SVMs or Random Forests?

Random forests may require more data but they almost always come up with a pretty robust model. And deep learning algorithms... well, they require "relatively" large datasets to work well, and you also need the infrastructure to train them in reasonable time. Also, deep learning algorithms require much more experience: Setting up a neural network using deep learning algorithms is much more tedious than using an off-the-shelf classifiers such as random forests and SVMs. On the other hand, deep learning really shines when it comes to complex problems such as image classification, natural language processing, and speech recognition. Another advantage is that you have to worry less about the feature engineering part.


Digital data and the fine line between you and your government

The question before consumers and the courts today is three-fold: What kinds of valuabledata is the IoT generating; who should have access to and control over that data; and who can be legally compelled to share that information with law enforcement. In the recent Apple encryption case, the FBI went directly to the manufacturer of a product to gain access to digitized information residing on that device. In our digitally connected future before us, will law enforcement simply bypass end users like you and me and compel companies to turn on our Nest cameras, unlock our August Smart Locks or tune in to our Echos? The Apple encryption case and its predecessors have broad implications for the entire tech community — not just those building smartphones and running data centers. The way in which we’ll interact with technology in the future has been turned on its head.


Build Your Own Container Using Less than 100 Lines of Go

To really understand what a container is in the world of software, we need to understand what goes into making one. And that's what this article is explains. In the process we’ll talk about containers vs containerisation, linux containers (including namespaces, cgroups and layered filesystems), then we’ll walk through some code to build a simple container from scratch, and finally talk about what this all really means. ... Caching is what makes Docker images so much more effective than vmdks or vagrantfiles. It lets us ship the deltas over some common base images rather than moving whole images around. It means we can afford to ship the entire environment from one place to another. It’s why when you `docker run whatever` it starts close to immediately even though whatever described the entirety of an operating system image.


Ransomware, Everywhere: What’s The Science Behind It?

Money isn’t just a motive; money is the enabler. Cybercriminals whose crimes make money can invest in new attacks, invest in defeating countermeasures, and invest in developing new targets. Until recently, attacks on critical infrastructure and the Internet of Things have also been rarely-realized theoretical concerns. There are many hackers who would think that bringing down a power station with a cyberattack is cool, but making that happen would require a group effort to build the necessary hacker tool chain. Ransomware delivers both the motive and the resources to make that happen. And once that ransomware-funded tool chain exists, it will be launched for many other purposes, ranging from idle curiosity to political vengeance.



Quote for the day:


"If a cluttered desk is a sign of a cluttered mind, of what, then, is an empty desk a sign of?" -- Albert Einstein


April 22, 2016

The 4 Stages of Better Technology Adoption

Every business is at a different stage in their technology evolution. For some, they’re just starting to see that the break-fix relationship with their provider isn’t serving them properly. For others, they have a fully integrated technology strategy, but need a way to take it to the next level. So often we discuss topics that involve technology innovation without paying as much attention to topics that cater to the initial stages of businesses improving technology. This is important because a small business owners need to understand how they can improve and innovate their technology just as much as a more sophisticated business that is farther along in their technology process. Here are the four stages of better technology adoption to help you get a better idea of where you stand and what the next steps might be for you to innovate your technology at a pace that’s right for you.


How to be More Productive as a Data Scientist

Greater productivity can be gained beyond avoiding unnecessary repeated tasks. The cloud has become an indispensable tool for all sorts of businesses and industries, with one of its greatest strengths being increased productivity. This holds true for a field as complex and new as data science. Various cloud services and tools have been developed designed to help data scientists conduct their analyses, clean data, and visualize their results. With the cloud, data scientists can perform their duties from nearly anywhere while having access to vast stores of data they would otherwise not be able to use. Many productivity tips are much simpler than using cloud services or getting rid of unhealthy iterations.


Why enterprise developers could save Windows 10 Mobile

Microsoft is well aware of its market share problem and the related shortage of quality mobile apps, of course, and it purchased Xamarin in February to make it simpler, and thus cheaper, for Windows developers to port their desktop applications to iOS, Android or Windows 10 Mobile. "This is not for people who write iOS or Android apps, but if you are a corporate Windows developer and you have held back on mobile applications, now you have the possibility of building your applications for third party mobile platforms," according to Wes Miller, an analyst at Directions on Microsoft, who spoke with CIO.com last month.  Windows no longer rules the business software world unchallenged, but a huge install base of Microsoft applications still exists within in midsize and large businesses.


The tech industry’s “diversity” focus favors one group over pretty much any other

Rarely, though, will you ever hear white people lamenting about working conditions that their black or brown children, spouses and siblings might have to endure. They rarely have those relationships, so they aren’t forced to develop empathy for brown and black people. Colorless diversity is okay with spending tens of millions of dollars on conferences, summits, retreats, and outreach for and about white women, but finds it distasteful when others point out the disparity in spending for people of color. Colorless diversity would have black and brown people sit down and wait their turn. Let me be clear: I’m not writing this because I think it’s bad that companies are spending money on diversity programs for women. These programs are necessary.


The Era of the Intelligent Cloud Has Arrived

The more enterprises seek out insights to drive greater business outcomes, the more it becomes evident the era of the Intelligent Cloud has arrived. C-level execs are looking to scale beyond descriptive analytics that defines past performance patterns. What many are after is an entirely new level of insights that are prescriptive and cognitive. Getting greater insight that leads to more favorable business outcomes is what the Intelligent Cloud is all about. The following Intelligent Cloud Maturity Model summarizes the maturity levels of enterprises attempting to gain greater insights and drive more profitable business outcomes. Line-of-business leaders across all industries want more from their cloud apps than they are getting today.


Microsoft’s Nadella taps potential of industrial internet of things

With more of the value in industrial products shifting from hardware to software, it is no surprise that many industrial companies are reconsidering their software strategies. According to GE, the industrial internet as a whole will be a $225bn market in terms of annual revenues by 2020 — dwarfing the expected $170bn for the consumer internet of things, which has attracted more public attention, and bigger even than the enterprise cloud computing market which is predicted to hit $206bn. Of the new industrial software market, GE estimates that some $100bn will go to a small handful of companies that provide the central platforms for the industrial internet — the software that collects and aggregates data, acts as the foundation for higher-level applications and creates shop windows for developers to reach an audience in the industrial world


Why HTC may be the next Motorola of Android

HTC's been moving in the right direction for a while now, with an impressive and ever-improving focus on overall user experience and post-sales support. It's been climbing higher every year on my Android upgrade report card and this year came in with stronger scores than ever -- an 86% overall, following only Google's Nexus devices in terms of all-around upgrade reliability.  HTC may earn its profits from hardware sales like everyone else, but where it differs is that it actually seems to place value on positive long-term relationships with the people who buy its devices. ... It's not just timely upgrades that make HTC the new consumer-friendly king of Android manufacturers: It's things like stepping up and answering my call for a guaranteed two full years of upgrades for flagship phones, long before any other manufacturer was willing to make such a commitment.


9 Free Windows Apps That Can Solve Wi-Fi Woes

As we all know, life isn't quite that easy. Your home or office network can have dead spots where devices can't seem to connect, or where the connections get slow or flaky. Public hotspots can make you prey for hackers and snoopers. And when you are at a hotspot, you might need to share your connection with your other devices, including smartphones and tablets. While there is no way to immediately solve all the problems associated with wireless connectivity, there are applications that can make things better -- and many of them are free. I've rounded up nine free pieces of Windows software that can go a long way toward helping you solve your Wi-Fi issues at home, in your office or on the go.


Google's problem with the cloud is that it's too innovative and not practical enough

Google practically invented the cloud, yet struggles to translate its benefits to more earth-bound enterprises. Even at GCP Next, which was essentially an enterprise love-in, Google couldn't help but tout its science fiction bona fides. Sure, Google started well. Chairman Eric Schmidt intoned that "Cloud is about automating the tedious details and empowering people." Tedious...enterprise...so far, so good! But then, Google started into machine learning, an area where it's heads and shoulders above its competition, with Google senior fellow Jeff Dean telling the crowd, "Machine learning is one of the most important topics in computing." The company went on to blog that "now any application can take advantage of the same deep learning techniques that power many of Google's services."


SEC Warns More Cyber Enforcement Actions Coming

"Cyber is obviously a focus of ours, as I know it is for the other divisions, and we've brought a number of cases there relating to Reg S-P and failure to have policies and procedures relating to safeguarding information," Ceresney said, citing the case the commission brought against R.T. Jones, a St. Louis-based RIA, this past summer. "There'll be others coming down the pike," Ceresney cautioned. The SEC is reviewing the cybersecurity policies in place at advisors and broker-dealers. Separately, the commission has been shifting exam personnel from the BD side of the Office of Compliance Inspections and Examinations to the unit that oversees RIAs. But even with those moves, commission officials acknowledge that they can't keep up with the rapid growth of the RIA sector. The SEC is only able to examine about 10% of registered advisors in a given year



Quote for the day:


"The older I get the less I listen to what people say and the more I look at what they do." — -- Andrew Carnegie


April 21, 2016

Why Machine Learning Is The New BI

Whether it’s IoT, big data or analytics, companies have a lot more data to base their decisions on, and data-driven decision making sounds obvious. And the next step beyond data-driven decisions is decision support systems and even automation. Are we ready for intelligent assistants with business advice? While a recent study of 50,000 American manufacturing organizations found that the use of data-driven decisions had almost tripled between 2005 and 2010, that was still only 30 percent of plants. And when telecom provider Colt surveyed senior IT leaders in Europe in 2015, 71 percent of them said intuition and personal experience works better for making decisions than using data (even though 76 percent of them say their intuition doesn’t always match the data they get).


Fintech explosion demands joint effort on oversight, report says

“There is an urgent need both for the private sector and financial supervisors to collaborate,” the group said in the report, whose contributors include investment bank executives, international economists and entrepreneurs from Asia, the U.K. and the U.S. The forum’s aim is “to foster competition between traditional financial players and new entrants while also preserving system stability,” it said. Fintech was a central theme this year at the group’s annual meeting in Davos, Switzerland, and the report draws on discussions that took place there. It incorporates views of members including executives from UBS Group AG, Deutsche Bank AG and JPMorgan Chase & Co.; tech firms such as IEX Group Inc. and On Deck Capital Inc.; and regulators including the U.S. Securities and Exchange Commission and the Bank of England.


How to create a strategic analytics culture in your organization

One of the real values of utilizing data is that it can uncover questions or ideas that aren't currently being considered in your organization. A data science team will need specific tasks to accomplish, but they also need a certain degree of autonomy to explore the data and experiment with it. "If you want to build a culture, set them free," Davis said. Change is hard, especially in a large organization with many moving parts. As someone arguing for an analytics culture, you are a change agent, and you have to determine how resistant to, or accepting of, change your organization is. Try asking yourself the following questions:


Back to the future: It's all about appliances again

While that converged infrastructure move flies in the face of the promise of our server-less future, Sangster posits that the value that converged infrastructure delivers -- by taking a group of technologies that can be difficult to use on their own (much less together) and combining them into a prescriptive, pre-integrated solution -- is eternally attractive. Sangster points out that OpenStack has, until recently, been viewed as software for innovators and early adopters. This is the realm of proud DIYers blazing the trail ahead. They love to experiment, doing all the hardware and software engineering possible as they work to understand, implement and eventually deploy a new system like OpenStack. This is, of course, fun for the tinkerers, but unhelpful for the mainstream organizations that simply want to use a solution. For those folks, converged infrastructure makes sense.


The bots are coming … but they are not taking over.

The magic sauce in the march of the bots is in the deep background: the democratization and implementation of artificial intelligence systems on a large scale. Millions of software developers build interesting products and systems across the world every day. But only a handful of computer engineers know how to actually build, train and deploy advanced computing functions like machine learning, computer vision or neural networks. The companies and organizations that know how to do such things are incredibly limited: Facebook, Google, Microsoft, IBM, Oracle (to a certain extent), think tanks and university research departments like MIT, Stanford and Carnegie Mellon. The average software developer writing JavaScript Web apps probably doesn’t know the first thing about how to build artificially intelligent systems.


Is Mobile Commerce Growth Really Happening?

The shift from e-commerce to m-commerce happened quite rapidly, too rapidly for many retailers actually. Another new paradigm in 2016 is the move from shopping in mobile browsers to shopping in mobile apps. A combination of well-designed mobile apps with good UI, enhanced smartphone capabilities, push notifications, and new mobile payment tools have led to an explosion in mobile shopping. This also brought a new agenda in sales (retail) strategies for businesses to keep customers engaged and retain to come back. ... Mobile apps play a vital role in mobile commerce growth, but still struggle. 85% of mobile time is spent in apps, which is obviously stunning. On the other hand, most of the app time is solely spent in an individual’s top 3 apps. While mobile web drives double the traffic of apps across industries.


Whaling Emerges As Major Cybersecurity Threat

Vendors such as Microsoft, Proofpoint, Cloudmark and Mimecast are building tools to help companies defend against these attack. Mimecast, which makes cloud software designed to spot and quarantine phishing emails with malicious attachments and URLs, has just launched a tool designed to harpoon whaling. Called Impersonation Protect, the software's algorithms analyze the language content of emails as they come in through a corporate server. It looks for key indicators, beginning with whether the source name actually works for the company. The software will then parse the email content for requests that includes keywords and phrases such as "W2" or "wire transfer," and provides a probability score that a target email is either safe or malicious. "One indicator in isolation is not bad, but two together could be fishy," Malone says.


Dear CISOs and Legal Counsel: We Can’t Wait for the Privacy Regulators

The Issue is Clear: Why Should Anyone Trust Anyone? We could leave this issue to privacy officers, internal and external legal counsel, governments, data protection authorities, politicians, regulators, and technology companies to sort out. We could wait for the ultimate answer to solve the privacy question once and for all. And wait. And wait some more. And wait for another review, debate, newsworthy event (such as needing information from another critical terrorist phone). Or wait for the next cloud service to be hacked, exposing photos that violate an individual’s right to privacy. The reality is we just don’t trust each other—person to person or country to country. The reality is also, we have to trust each other at some level to interact personally or conduct business with each other.


Better Web Testing With Selenium

WebDriver has a few different ways to temporarily pause a script in the middle of a run. The easiest, and worst way, is an explicit wait. This is when you tell the script to hang out for some amount of time, maybe 15 seconds. Explicit waits hide real problems. A lot of the time, we see the wait fail and bump the time up a few more seconds in hopes that it will work next time. Eventually we have padded enough time in the script so that the page loads completely before trying to perform the next step. But, how long is too long? These explicit waits can conceal performance problems if we aren’t careful. The smarter way to handle waits is to base them on the specific element you want to use next. WebDriver calls these explicit waits. I have had the most luck in improving stability of a check by stacking explicit waits.


Lambda Functions versus Infrastructure - Are we Trading Apples for Oranges?

Some refer to this as stateless computing or serverless computing. Personally I prefer the second term, as there is clearly a state somewhere-probably in a database service that the function may leverage— but the function itself is essentially stateless. The same argument could be held against the serverless term, clearly there are servers floating around in the cloudy background but their existence is implicit and automatic rather than explicit and manual. The next area of value in AWS Lambda stems from the ability to easily associate your function with all manner of triggers via both web-based and command line tools. There are more than 20 different triggers that can be used—most of them being from other AWS services such as S3, Kinesis and DynamoDB.



Quote for the day:


"Problems are only opportunities in work clothes." -- Henry Kaiser,