Daily Tech Digest - April 15, 2017

Let's talk about how we talk about blockchain

The characteristics of third generation DLTs are shifting markedly, and the blockchain vernacular is losing some of its mystique. Decentralisation distinguished the first generation blockchain, and some still say it’s essential. But let’s remember that the public blockchains don’t actually produce decentralisation; they are designed with decentralization as a starting point. Nakamoto rejected financial institutions, and the Bitcoin blockchain was designed to handle e-cash with no central authority. Yet nothing in the original design indicated that decentralisation could fit all types of business, nor that the blockchain could decentralise anything other than e-cash.  Immutability is another word that’s becoming a bit stale. In my nearly twenty years experience in cybersecurity prior to blockchain, I don’t recall “immutability” ever being expressed as a requirement.


The Democratization of Machine Learning: What It Means for Tech Innovation

Market-based access to data and algorithms will lower entry barriers and lead to an explosion in new applications of AI. As recently as 2015, only large companies like Google, Amazon and Apple had access to the massive data and computing resources needed to train and launch sophisticated AI algorithms. Small startups and individuals simply didn’t have access and were effectively blocked out of the market. That changes now. The democratization of ML gives individuals and startups a chance to get their ideas off the ground and prove their concepts before raising the funds needed to scale. ... There is an effort underway to standardize and improve access across all layers of the machine learning stack, including specialized chipsets, scalable computing platforms, software frameworks, tools and ML algorithms.


Decoding banks digital customers’ expectations

Most banks’ customer strategies, fueled by customer analytics, will need to change to really take advantage of customers’ new channel preferences, for many different researches show that consumers who have grown up immersed in digital technologies, are two to three times more likely to want more digital interactions than what banks currently support, yet older customers are becoming surprisingly open to adding other channels to their portfolio and are increasingly experimenting with online interactions, using a wider variety of contact channels and apps. As a result, customers from all ages find it easier to compare a bank’s or financial institution’s promise with its delivery and how the overall experience meets their own expectations and, subsequently, make changes if they consider their bank isn’t as digitally ready as they would want it to be.


Search the world's largest cybercrime library

"The repository enables lawmakers to draw upon the database of legislation when drafting laws on cybercrime or electronic evidence," said Loide Lungameni, chief of the UNODC (UN Office on Drugs and Crime) Organized Crime Branch. " ... Established in conjunction with the 2013 Comprehensive Study on Cybercrime, the database is a response to the explosion of global connectivity at "a time of economic and demographic transformations, with rising income disparities, tightened private sector spending, and reduced financial liquidity." "Upwards of 80 percent of cybercrime acts are estimated to originate in some form of organized activity," the study determined, "with cybercrime black markets established on a cycle of malware creation, computer infection, botnet management, harvesting of personal and financial data, data sale, and 'cashing out' of financial information."


Last Words: Computational Linguistics and Deep Learning

Where has Deep Learning helped NLP? The gains so far have not so much been from true Deep Learning as from the use of distributed word representations—through the use of real-valued vector representations of words and concepts. Having a dense, multidimensional representation of similarity between all words is incredibly useful in NLP, but not only in NLP. Indeed, the importance of distributed representations evokes the “Parallel Distributed Processing” mantra of the earlier surge of neural network methods, which had a much more cognitive-science directed focus (Rumelhart and McClelland 1986). It can better explain human-like generalization, but also, from an engineering perspective, the use of small dimensionality and dense vectors for words allows us to model large contexts, leading to greatly improved language models.


AI and robots will take our jobs - but better ones will emerge for us

Innovation is the only sustainable way to make society wealthier and better off. In terms of real GDP, Americans are on average more than eight times wealthier today than they were in 1917 2. In the 16th century, Queen Elizabeth was practically the only person wearing silk stockings. In the 21st century, any American woman can. A similar point holds true for cars, plumbing, electricity, and a variety of other modern wonders that began as luxury goods. When technological unemployment occurs, laid-off workers seek retraining and private sector leaders create transitional infrastructure to reabsorb them into the economy. Innovative technologies create more wealth and better jobs in the end by eliminating unpleasant rote work and increasing overall productivity. In the past 30 years, we have experienced a complicated period of globalisation.


How Digital Transformation Will Affect The Automotive Industry

Today already 40 million people use app-enabled carpooling services, and the usage of ridehailing apps has grown rapidly to over 70 million users. Frost & Sullivan’s mobility research has highlighted the continued trend of the automotive industry investing in dedicated collaborations. “As information services, in particular, become more sophisticated, the potential to integrate and aggregate mobility services is increasing,” explains Shwetha Surender, Program Manager Mobility. This allows users to plan, book and pay for their journeys on the smartphone in real time. To make this effective, partnerships between both private and public transport providers are essential. The revenue potential of such digital mobility services is expected to rise to ~$2 trillion by 2025 globally, explaining the continued interest from the private sector.


Fintech start-ups put banks under pressure

Startups have the advantage of being free of legacy technology systems and tough regulation, both of which limit the digital developments of established financial services firms. As a result, start-up companies can more efficiently create mobile-focused services or products that threaten existing financial companies. For example, a number of mobile-based banks such as Atom, Tandem, Starling and Monzo have emerged in the past year with the aim of offering current accounts that help customers to manage their money and lifestyle. Some fintech start-ups pose a direct threat by capitalising on weaknesses and gaps left by established companies. Nutmeg in the UK, for example, provides low-cost online wealth management, which makes investment expertise accessible to millions of people who cannot afford advice but do not have the confidence to go it alone.


NSA's arsenal of Windows hacking tools have leaked

The dump of Windows exploits -- arguably affecting the most people and organizations and likely to cause the most damage and embarrassment to the intelligence agency -- has been expected since the hacking group first emerged on the scene last year. In case you missed it, hacking tools that were confirmed to belong to the NSA's so-called Equation Group were stolen last year in one of the biggest breaches of classified files since the Edward Snowden revelations. These tools, allowed NSA analysts to break into a range of systems, network equipment, and firewalls, and most recently tools to target the Linux operating system -- many of which were old and outdated. The group attempted to auction off the files but failed, and have been releasing portions of the stolen files in stages.


Are UK IT contractors leaving the sinking Brexit ship?

Ever since the UK shocked the world (and, maybe, itself) by voting to exit the European Union, pundits have prognosticated on what effects this will have on the economy and society. While many think it’s too early to say, UK skills sourcing company Arrows Group broke cover and came out with a notable statement, suggesting that Brexit is already leading to a 10 per cent reduction in skilled tech workers from within the EU relocating to the UK. Conversely, the company says there is an increase in UK digital skills heading elsewhere, notably Switzerland. The Arrows database used for this research only covers about 2,000 contractors but as an early indicator of what is going on its insights might have some value. With that caveat, I followed up with Arrows founder and CEO James Parsons and the following is a lightly edited version of our email exchange.



Quote for the day:


"A computer will do what you tell it to do, but that may be much different from what you had in mind." -- Joseph Weizenbaum


Daily Tech Digest - April 14, 2017

3 Overlooked Attributes of a Great Chief Digital Officer

Confronting the tidal wave known as digitization, some CEOs call for a lifeboat in the form of a Chief Digital Officer (CDO). The CDO helps a company respond quickly and strategically, to the rapidly evolving digital landscape. There are several qualities that every CDO needs. To start, they need an innovative mind and great skill at communication. Those are obvious. “It’s really about [developing] a set of capabilities—around customer engagement, digital marketing, using algorithms to adjust the way the company works—not about a title,” says Martha Heller, President of executive search firm Heller Search Associates. Here are three less-obvious qualities that Heller says make CDOs effective


The Future of Application Development Is Here and it Is Cognitive-First

The DataRPM platform automates predictive modeling, leveraging proprietary Meta Learning capabilities to increase quality, accuracy and timeliness of equipment failure predictions by more than 300 percent. The technology enables customers such as Jaguar, Samsung and Mitsubishi Heavy Industries to predict and prevent asset failures, reduce maintenance costs, optimize inventory and resources, predict quality issues, forecast warranty and insurance claims and manage risks effectively. Imagine, analyzing a massive volume of data, with hundreds of different variables, concurrently, within hours and leveraging that data to drive the business applications of the future? This is what Progress will deliver and we’ll do it in a way that is easy and affordable for businesses of any size.


Analysing distributed architectures in the era of IoT

Design and architecture phases must aim at conceiving a structure able to easily provide data and services to a multitude of unrelated devices. Third generation consumers, like wearable devices, personal and support equipment, sensors and actuators, and more in general any electrical appliance, should be easily pluggable and require the lowest integration and maintenance efforts, without any structural integration. The consequence is simple: we cannot architect our applications as they were isolated islands, self-contained and device/platform dependent. We must provide easy access to the information processed by our software, easing the fruition from devices potentially unknown.


Communicate IT’s Business Benefits More Effectively

Over half of IT leaders see themselves as part of a cost center or service provider, and only 4% are highly satisfied with IT’s communication with the rest of the business. This survey points out the risks and costs of these sorts of order-taker relationships, including loss of credibility and low level of engagement with business partners. Today’s CIOs acknowledge the problem, but many are struggling with how to address it. In fact, the same CEC survey found that 89% of IT leaders report at least one significant barrier to effective communication. How can you show the company the benefits IT is bringing, and help them to process and understand that story? The first step is to accept the inadequacy of working in silence while hoping the company understands the impact you are having.


95% of Organizations Have Employees Seeking to Bypass Security Controls

“Insider breaches are a growing threat to virtually all organizations including mainframe users,” says John Crossno, product manager of Compuware’s security solutions group, which recently released a tool designed to mitigate the threat. The increasing number of incidents where employees fall prey to phishing and other social engineering attacks and hand over authorized user credentials to attackers have made even otherwise secure mainframe environments vulnerable, he says. He points to the massive data breach at the U.S. Office of Personnel Management in 2015 as one example of how attackers are able to gain access to critical mainframe systems by acquiring the valid credentials to do it. In the mainframe environment, “enterprises have traditionally relied on insufficient methods to identify threats including disparate logs and data gathered by security products to piece together user behavior,” he says.


‘Cloud adoption and escalating threats accelerate encryption deployments’

The report revealed enterprises have accelerated adoption of encryption strategies, with 41% of respondents saying their organisation has an encryption strategy applied consistently across the enterprise. Notably, for the first time in the study’s 12-year history, business unit leaders have a higher influence over encryption strategy than IT operations. Other critical findings demonstrate organisations continue to show a preference for control over encryption and key management when those activities migrate to the cloud. John Grimm, senior director of security strategy at Thales e-Security, said that “This year’s findings align with key trends demonstrating an increased reliance on the cloud, ever-evolving internal and external threats, and new data sources mandating stronger protection.


Blockchain 101: How This Next Big Service Will Change The Future

Setting up your own Blockchain is not easy. It requires heavy infrastructure and development capabilities that most businesses aren’t savvy enough to manage. Enter BaaS. As more companies discover the power of Blockchain and what it can do for their businesses, there will be even greater demand for making this technology more easily accessible. According to Harvard Business Review, Blockchain is the next great disruptor, even more likely to change the next decade of business than big data or artificial intelligence (AI). Says the writer, just as the internet was the first native digital medium for information, Blockchain is the first native digital medium for value. Some 65 percent of banks are expected to implement a Blockchain solution in the next few years—and that’s just on the finance side. The technology is set to see a massive explosion throughout the business landscape.


Multi Or Hybrid? Dealing With A Complicated Cloud World

“We’re seeing conversations shift towards multiple clouds, not one single technology,” said Simon Crawley-Trice, director of global solutions & services for EMEA at Rackspace. “I think it’s going to be a combination between hybrid and multi-cloud depending on what’s right for the business.” “A lot of service providers tend to lead with the technology, but CIOs want a business conversation around what is the business value of hybrid cloud? They want to know what the business value is of consuming these different cloud technologies.” Cockerton agreed, highlighting that “ultimately the conversation is going to become one of the right workload in the right place at the right price. That’s going to determine the conversation for the next 10 years”.


The AI revolution: Is the future finally now?

Despite the mounting interest and the proliferation of new technologies, is this current wave that much different than what we have seen in the past? Do the techniques of the modern AI movement – machine learning, data mining, deep learning, natural language processing and neural nets – deserve to be captured under the AI moniker, or is it just more of the same? In the earlier peaks of interest, the broad set of activities that were typically bunched together under the term ‘AI’ were reserved for the labs and, if they ever saw the light of day, they were severely constrained by what the technology of the day could deliver and were limited by cost constraints. Many of the algorithms and structures central to AI have been known for some time; rather, previous surges of AI had unrealistic expectations of immediate consumer applications that could never be accomplished given limitations of the data and techniques available at the time.


Augmented reality in financial services

Within a bank, AR has the potential to transform productivity. Data visualisation is a key tool for traders needing to make important data-driven decisions quickly. AR can help traders view, analyse and manipulate large quantities of complex data faster through a more intuitive AR interface. Several companies have trialled Oculus Rift to create immersive 3D virtual reality environments for analysing data. Citibank has taken the next step by using Microsoft’s HoloLens headset to create Holographic Workstations for traders. These headsets use AR to layer complex data sets that enable traders to visualise and make decisions collaboratively with clients. We can expect to see more AR in bank offices in the future.  With the rapid growth in mobile banking apps and introduction of digital-only banks, there are more and more questions about the future role of branches.




Quote for the day:

"We're entering a new world in which data may be more important than software." -- Tim O'Reilly


Daily Tech Digest - April 13, 2017

Managed services - A catalyst for transformation in banking

To view managed services in the right context, it’s often helpful to understand the evolution and growth of outsourcing in financial services companies. Historically, banks have used a variety of outsourcing models to maximize resource efficiency. These models have evolved with changing times. A good example of this progression is business process outsourcing (BPO), which has existed for at least several decades. In 1992, American Express (Amex) spun off its transaction processing unit, where it already had developed scale and experience, and partnered with a third-party card processing unit. Amex anticipated the commoditization of the transaction processing business, so it placed a strategic bet to focus on the growth of the card issuing business.


Bank gets lesson in the security failings of third parties

A story detailing this attack in Dark Reading noted that “customers accessing the bank’s online services were hit with malware posing as a Trusteer banking security plug-in application. The malware harvested login credentials, email contact lists, and email and FTP credentials.” The bank and the DNS provider did apparently make some mistakes — and mistakes are a great way to learn, especially if they are made by someone else. First, the bank had declined to use the DNS provider’s two-factor authentication. Had it done so, the attack might have never worked. Second, the DNS provider, according to Kaspersky Labs, had patched a cross-site request forgery flaw on its site, Dark Reading said. That flaw, coupled with an email phishing attack of the DNS firm, may have provided the initial access prior to the patching.


The 10 best features in Android O (so far)

Google I/O is still more than a month away, but we’ve already gotten a sneak peek at what Google is planning for Android O. To help developers make sure their apps are in tip-top shape for the public release later this year, Google has given them the first preview a little early, opening up a brand new box of tricks and tools. This first release is just for developers, and is focused mostly on feautures that require particular devleoper support—there will be much more in Android O, with more user-facing improvements in later beta releases. While we’re not sure how many of these features will make it out of Developer options and the System UI tuner and into the main release, but there are a bunch of cool tricks we’ve found while exploring the new settings. Here are our 10 favorites.


Data science gets chic

Predictive analytics is one type of analytical method that is getting much attention. This is because senior executives appear to be shifting away from a command-and-control style of management – reacting after the fact to results – to a much more anticipatory style of managing. With predictive analytics executives, managers and employee teams can see the future coming at them, such as the volume and mix of demands to be placed on them. As a result they can adjust their resource capacity levels and types, such as number of employees needed or spending amounts. They can also quickly address small problems before they become big ones. They can transform their mountains of raw data into information to test hypothesis, see trends, and make better decisions.


With Robots On The Job - It Won't Be IT As Usual

The trend means that CIOs and IT managers need to be prepared for an influx of robotics because introducing this technology isn't as simple as firing up a fleet of humanoid robots and letting them loose in an office building. It's going to take planning, new skills and thought about how robots will affect employees and require new infrastructure. ... "It's very much a different mindset than traditional IT," said Mike Gennert, a professor and director of the Robotics Engineering Program at Worcester Polytechnic Institute, in Worcester, Mass. "IT managers worry about how they manage information, how it's used, how it's stored and secured. But none of that has the ability to directly affect the physical world. Robots affect the real world. That brings issues IT managers have not had to confront."


Who Should Regulate Cybersecurity for Connected Cars?

Lauzon along with other researchers remains skeptical that federal regulations are the best way to ensure safety. “To have regulation that chases down cybersecurity is very difficult because the law generally does not keep up with technology very well,” he said. “No automotive company wants to make a car that is hackable.” One option that could gain support would be to follow suit with the federal automated vehicle guidance released in September 2016. The guidance, which was intended to serve as a living document, laid out several best practices, specified what separate jurisdictions are responsible for regulating, and set up a 15-point self-check safety assessment letter. “I like the way NHTSA approaches it now and says, ‘Here are guidelines you should follow,'” said Lauzon. “With security, you don't usually know there is a problem until it's too late.”


Hacked Dallas sirens get extra encryption to fend off future attacks

The city believes the hack came from the Dallas area, but officials haven't detailed how it occurred. Dallas police are working with the FBI and the Federal Communications Commission (FCC) to validate what they think happened and find the source. The hack caused all 156 emergency sirens to activate for about 90 minutes, scaring some residents and doubling the number of calls to 911. Radio security experts theorized the incident may have been a simple "replay attack" where the hacker recorded the radio signal sent out on April 5 at noon as part of a monthly test of the emergency siren system. Then, the hacker could have played that signal back repeatedly early Saturday. It would take a hacker with a software defined radio (SDR) or other off-the-shelf radio frequency test equipment to pull off the attack, said Chris Risley, CEO of Bastille Networks.


Always-On Strategy

Always-on strategy complements the annual process by giving senior leadership a regular forum in which to monitor and discuss issues that warrant continual attention, including those identified during the annual process and during the course of the year. The always-on process is particularly well suited to addressing issues that span multiple business units (such as a common technology platform), lie outside the scope of existing businesses (for example, growth into adjacent markets), or are too far-reaching to address at the business unit level (such as downstream integration). However, companies must apply always-on strategy systematically—to ensure that executives focus on the highest-priority issues, push for issues to be resolved, and effectively coordinate the activities of the annual planning process with those of the always-on forums.


BrickerBot – The Dark Knight of IoT

The use of the ‘Busybox’ command combined with the MTD and MMC special devices means this attack is targeted specifically at Linux/BusyBox-based Internet of Things (IoT) devices. The similar exploit vector as Mirai means the devices must have their Telnet port open and exposed publically on the Internet. Mostly this would match IoT devices that have been proven vulnerable to Mirai. Because the process does not perform malware infection, but has a clear purpose of corrupting and disabling the device, there is no binary to study and there is not much we can say about how the bot finds its targets. Because BrickerBot.2 is hiding itself behind TOR exit nodes, there is no indication on the location of the bots or even how many bots might be out there. We could assume a random public IP scan to detect potential victims much like Mirai bots are performing.


How to Sell Refactoring? The Case of Nordea Bank AB

When you begin to work with an organization in the context of a specific subject, you usually encounter many points of view. From the very beginning, it is extremely important to realize that these are just different narratives of the same reality and none of them is more real than others. Within the same organization, you talk to different people who often present contradictory information, but each of these is consistent and seems to be justified. ... This way, the developers could focus on how to refactor the backend, style the new views and integrate them with their e-banking system. It drastically reduced the threshold for entering the new technology and made it easier to achieve success. At that stage, our priority was to promote the need for refactoring, not to migrate to a new technology.




Quote for the day:



"The meeting of two personalities is like the contact of two chemical substances: if there is any reaction, both are transformed." -- Carl Jung


Daily Tech Digest - April 12, 2017

A.I. in the kitchen: It's not that far from reality

"Hello Egg comes with cooking assistance even for the most advanced chefs, as well as step-by-step voice-navigated recipe video tutorials and real-time prompts from a human support team for those who might need a little more hand-holding in the kitchen," tech expert Lulu Chang explains. "Moreover, the smart device promises to 'keep a lively conversation going by expressing itself through mimicking facial expressions,' and can also keep you entertained and informed by way of Spotify, audio news feeds, weather forecasts and voice-activated timers and reminders." Having Watson author a smart cookbook and getting to interact with a little egg that responds to your commands is cool, but the future of A.I. in the kitchen has much more in store than trendy products and gadgets.


Why You Should (Sometimes) Let Software Run Your Business

A less radical approach is to take an existing software product (which could be run on premises or accessed as a service) and have it customized to match your company's operations and processes — either by the vendor, by a third party or internally. "That can still be expensive and open-ended," Bartoletti warns. "You can spend two years customizing software, and every change you make can cost you millions." He adds that there is also a risk that you will end up out of sync with the base product's update cycle. That's because each time the base software is update it is your responsibility to test the customizations to ensure that they still work as expected with the base software and modify them as necessary. By the time this work has been carried out the base software may have been updated again — perhaps to include some of the functionality that your customizations provide.


How Amazon is bringing the Alexa experience to your phone

Now instead of facing competition from Google and Apple in the home assistant market, Amazon seeks to strike back by integrating Alexa with phones. As CNET reports, Huawei Mate 9 owners “will get it first in an over-the-air update”, and it is available for iPhone users as well. Other Android users will eventually be able to install Alexa over their phones through the Google Play Store. But while Amazon so far has been looked like an unstoppable juggernaut everywhere it goes, working with smartphones is one area that will be a major challenge. While Amazon can seamlessly integrate Alexa with its own technology in the Echo, integrating it with a phone made by a different company presents challenges. Unfortunately, the Alexa app is not the same as having an Echo in your pocket, though it offers plenty of useful features.


That Fingerprint Sensor on Your Phone Is Not as Safe as You Think

New findings published Monday by researchers at New York University and Michigan State University suggest that smartphones can easily be fooled by fake fingerprints digitally composed of many common features found in human prints. In computer simulations, the researchers from the universities were able to develop a set of artificial “MasterPrints” that could match real prints similar to those used by phones as much as 65 percent of the time. The researchers did not test their approach with real phones, and other security experts said the match rate would be significantly lower in real-life conditions. Still, the findings raise troubling questions about the effectiveness of fingerprint security on smartphones.


The journey of data storage: what’s next?

Reflecting the growing importance of seamless data delivery to businesses as they become ever-more tech dependent, the storage industry has been developing at a significant rate in recent years. Some great new solutions have hit the market, and we are starting to see the beginnings of a shakeup of the industry. For the past twenty years the industry has been dominated by large specialists like EMC and NetApp. However, the emergence of flash storage is providing customers with a simple, cost effective way to manage data, and new companies such as Nimble Storage, Nutanix and Pure Storage are starting to change the way the industry is run. IDC recently found that the flash based storage market grew a massive 71.9 per cent on top of last year, so there is no question that flash storage is dominating the present market and driving greater expectations around performance, and data centre and TCO (total cost of ownership) reduction.


Fintech firms still see a future for fiduciary compliance tools

Financial services marketing consultant Dan Sondhelm, CEO of Sondhelm Partners, said it was smart for the firms to have aggressively promoted DoL-related features before the rule came into effect. "Whether a law is in place to protect investors isn't the issue," Sondhelm says. "The problem is now visible. Advisers have to have to deal with the problem. They have to have an answer and process to show they are looking out for the best interest of their clients. Smarter clients will keep this issue top of mind." There's been no slowdown in demand for the analytics platform being offered by Boston-based FinMason, says its CEO Kendrick Wakeman. "We are not changing our products in light of the delay of the DoL and last week was one of the busiest weeks we have had in our history from the standpoint of sales demand," he says.


When Hacks Are about Image instead of Money

The biggest risks from these hacks is not the exposure of personally identifying information, but the erosion of trust in our organizations and notable figures. This is because cyberespionage and sabotage campaigns don’t just deal with leaked information. Once a hacker gains high-privilege access to a network, he or she can change internal data, public-facing assets and even insert fake data. If you think fake news is a problem, what about the possibility of fake medical or financial information making the rounds with no way to verify its legitimacy? Unfortunately, like most issues in security, there isn’t a straightforward solution to the problem. It’s impossible to predict how extortion can take place, or what data will be used to tarnish the victim’s image.


As cities get smarter, hackers become more dangerous: This could stop them

After the forensic exams were ordered, several of those who filed suit asked the judge to drop their complaints, either because they suspected Anthem would find evidence the data was lost before the breach or because they didn’t want to submit to having their PCs snooped. Or perhaps they just didn’t want the inconvenience of giving up use of their machines for the duration of the search. Regardless, it proved an effective legal strategy for Anthem. If just a few of those who sue walk away, it still means fewer possible payouts. And it points out how difficult it is to prove that personal data used by criminals was stolen in a particular breach. Yes, the victim’s information was exploited, but how it got into the hands of the criminals is not so easily determined.


DARPA to eliminate “patch & pray” by baking chips with cybersecurity fortification

“Security for electronic systems has been left up to software until now, but the overall confidence in this approach is summed up in the sardonic description of this standard practice as ‘patch and pray,’” said SSITH program manager Linton Salmon of the Agency’s Microsystems Technology Office in a statement. “This race against ever more clever cyber intruders is never going to end if we keep designing our systems around gullible hardware that can be fooled in countless ways by software.” Salmon said SSITH specifically seeks to address the seven classes of hardware vulnerabilities listed in the Common Weakness Enumeration, a crowd-sourced compendium of security issues that is familiar to the information technology security community.


21 Hot Programming Trends & 21 Going Cold

Programmers love to sneer at the world of fashion where trends blow through like breezes. Skirt lengths rise and fall, pigments come and go, ties get fatter, then thinner. But in the world of technology, rigor, science, math, and precision rule over fad. That's not to say programming is a profession devoid of trends. The difference is that programming trends are driven by greater efficiency, increased customization, and ease of use. The new technologies that deliver one or more of these eclipse the previous generation. It's a meritocracy, not a whimsy-ocracy. What follows is a list of what's hot and what's not among today's programmers. Not everyone will agree with what's A-listed, what's D-listed, and what's been left out. That's what makes programming an endlessly fascinating profession: rapid change, passionate debate, sudden comebacks.



Quote for the day:


"Excellent firms don’t believe in excellence – only in constant improvement and constant change." -- @tom_peters


Daily Tech Digest - April 11, 2017

Why a Quiet Blockchain Consortium Could Soon Make Noise

Amidst this backdrop, an upcoming piece of legislation is set to buffet the industry with a sweeping change that will produce upheaval and possibly contraction. I'm talking about MiFid II. It's hard to overstate the impact these regulations will have on asset management. Due to come into force in January 2018, MiFid II aims to increase transparency, enhancing investor protection and removing shady practices in pricing and allocation. Fund managers will be required to pay separately for research, financial advisers will no longer earn a commission and reporting requirements will multiply. And that's just scratching the surface. An independent report estimates the cost of complying with Mifid II to be more than £2.5bn. This is likely to bring about a sector shift, with many smaller firms not being able to bear the cost, and larger enterprises offsetting the increase elsewhere.


Why the board needs security leaders to fuel disciplined growth

As the risk of breaches increases, boards – whose role when they oversee the CEO is to act as fiduciaries on behalf of shareholders– are increasingly at risk of falling short of their responsibilities. While board members are not expected to be experts on information security, they must make sure that the company has the right people and processes in place to erect defenses against information security violations, to establish procedures for monitoring the level of information security, and to make sure that the right steps are taken should a security breach occur. At the same time, CISOs should educate board members about the best information security practices among peer companies as well as introducing board members to important trends in hacking and defense. Such briefings will help directors to evaluate proposals for investment of people and capital into new technologies and processes to protect companies against an ever-evolving information security threat environment.


Blockchain: The Battle To Secure Digital Identities

Recently, IBM and SecureKey also announced they are working together with the main goal of creating a “new digital identity and attribute sharing network” to make it easier for users to verify their data in a privacy-enhanced, secure and efficient way. Deloitte is doing a similar project using the Ethereum blockchain. It is an open source based on a smart identity platform available for users and companies that want to obtain, verify and identity credentials when communicating with one another. This way, customers can create and store identity info such as ID reference, driving license or passport, which can be confirmed by third parties to create verifiable credentials to be used for any digital communication. This Deloitte’s platform provides many opportunities for the automation of identity-related process including customer registration and Know Your Customer (KYC).


Is Digital Privacy A Right Or A Privilege?

The proponents of net neutrality rollbacks argue that tiered rate schedules will fund infrastructure innovation. The supporters of anti-privacy legislation argue that there’s little distinction between media companies (like Facebook) and ISPs, and both should have the right to collect and sell data that reflects the behavior of their customers. These are the business arguments. Are there other arguments we might want to consider? First, everyone should have the right to opt-out of the collection and distribution of personal data without losing privileged services or paying higher rates or extra fees. If a media company or an ISP wants to collect and sell my data it should only do so with my explicit permission – which I might well give (for a price). Why shouldn’t individuals share in these revenue streams? If I spend a ton of money online every year and everyone wants to follow me, stream to me and entice me, why shouldn’t I get a piece of the action?


MapR Announces Availability of Native Tableau Connector for Apache Drill

“Strong demand from our joint customers led to this tighter integration,” said Robert Green, director of product management at Tableau. “Tableau and Apache Drill share a common view on self-service data discovery and this development opens up new avenues for users of both technologies.” Apache Drill is a supported data source for Tableau bringing more robust integration compared to generic ODBC. The MapR Tableau Connector for Apache Drill delivers tighter metadata integration between Tableau and Apache Drill, and brings advanced analytics capabilities that leverage Tableau Sets to Apache Drill users. Additionally, Tableau users on Macs can now access Apache Drill.


No vendor lock-in fear with converged infrastructure

Cisco reached out to all the appropriate experts, who joined in on a call. The problem resided within a software-based Trend Micro firewall. The firewall was deactivated, which resolved the PCoIP problem. Before settling on HyperFlex, Safonov said he shopped around. He got three quotes from hyper-converged vendors and three quotes for more traditional architectures, including all-flash arrays. While his paramount concern was price, Safonov was still worried about managing servers, storage and networking gear from different vendors. "We would still have to troubleshoot across all the vendors," he said. Perry said the reduced concern about vendor lock-in may not last forever. It could change if server software and management tools head down an increasingly proprietary path.


Software developers – business enabler or hostage taker?

The skills attained during a computer science degree will be out of date by graduation, meaning organisations need to look beyond blunt qualification statements. Without undertaking specific skills tests, it is impossible to ascertain whether an individual can truly do the job. In addition, technical skills alone are not the only requirement. These individuals need to work as part of a team – are they team players? Do they buy in to the specific development processes of that organisation? Many developers are perfectionists which sounds great in theory, but is useless in practice – the software will never be good enough, never ready to be deployed. A pragmatic attitude is essential; plus an understanding of the importance of a standardised development process. Determining whether or not an individual has the right mix of skills and expertise to become a good software developer is a very significant challenge


Mobile Analyst: Factoring in Progressive Web Apps a Matter of 'When,' Not 'If'

More recently, Google announced deeper integration of PWA technology into its Android mobile OS. "Once a user adds a progressive Web app to their home screen, Chrome will integrate it into Android in a much deeper way than before," Google said. ...  "PWAs aim to disrupt the mobile app paradigm by bridging the Web experience with native app functionality, by using the latest browser technologies to meld the accessibility of the Web with the presence of the mobile app," Wong said in a recent blog post promoting that research. "Most of the leading desktop and mobile browsers (except for Safari and browsers on iOS at the time of writing) have embraced the browser advancements (service workers) brought forth by Mozilla, Google, Facebook and others to implement service workers that enable a Web site to behave like an app," Wong continued.


Why smart stores don't check out

Amazon's "Just Walk-Out Technology" has one job: to figure out what you're taking out of the store. As you remove items from the shelf, A.I. uses multiple inputs to figure out what you grabbed. Cameras watch you take it. Scales built into the shelves provide data to calculate the weight of what you took. Amazon's patent filing suggests that the system may also refer to past purchases to help identify current ones. In other words, intelligent software analyzes a video feed to determine that you removed something from the shelf that looked like a cupcake. It considers data from the shelf, which is also a scale, and calculates that you took something that weighs about as much as a cupcake. And it checks your purchase history — it knows you're a cupcake-eating maniac. After all that input, the software decides that you took a cupcake off the shelf and adds it to your list, which is kept up-to-date in real time as you shop.


Why we must strengthen cyber risk management now

When it comes to combating financial crime, financial institutions are increasingly in the frontline of defense. Regulators the world over require financial institutions to meet stringent Know Your Customer (KYC), anti-money laundering and sanctions rules and regulations. Complying with such obligations in multiple jurisdictions is demanding – and increasingly costly – but the costs and reputational impact of non-compliance are even higher. SWIFT has a broad finance crime compliance portfolio, developed with the SWIFT community. It’s a suite of managed and shared services that leverages our platform, technology and standards expertise to cut through the complexity and give the industry simpler, more cost-effective ways to meet the challenges of financial crime compliance.



Quote for the day:


"It's the little details that are vital. Little things make big things happen." -- John Wooden