Daily Tech Digest - April 23, 2017

Delaware Law Amendments Would Facilitate Blockchain Maintenance of Corporate Records

According to Vice Chancellor J. Travis Laster, the blockchain could help to remove the middleman when it comes to how shares are held and voted, as at present they are operating on an outdated system that is too complex to determine who owns a share and how it’s used in decision making. Delaware is just one state in the U.S. that is showing an increased interest in the distributed ledger. Only recently, the Senate in the state of New Hampshire considered a blockchain bill that would deregulate digital currency transactions such as bitcoin from money transmitter regulations in the state. By doing so, the bill is designed to protect consumers when using digital currencies such as bitcoin instead of making them register with money transmitter regulators.


Do Collaboration Tools Create Security Risks For Your Business?

The business world is abuzz with the benefits of collaboration tools: less reliance on email, more organic collaboration on projects and better communication and relationships between teams. Collaboration tools encompass many solutions, including video conferencing, VoIP, document sharing and instant messaging. However, it is also important to think about the security risks that are inherent in tools such as document collaboration platforms, presentation software, remote support tools and virtual events. Each of these can create potential security threats, and evaluating vulnerabilities – and viable solutions – should be a sustainable part of your tool-selection process.


What’s To Do Before Ethereum Enters Its Third 'Metropolis' Stage?

One tricky part is making changes to all ethereum clients, no matter what programming language they're written in, in lockstep. Ethereum Foundation's Khokhlov has been writing tests using a tool called Hive to ensure not only that the clients implement the changes correctly, but that all clients agree on consensus-level changes. That's because if all clients don’t follow the same rules, there could be an accidental split into different networks (as happened briefly in November). Just like former phase changes Frontier and Homestead, the shift to Metropolis requires a 'hard fork' – meaning nodes or miners that fail to upgrade to the new blockchain will be left behind. Because of the possibility of an inadvertent split, hard forks are controversial and taken very seriously.


How IoT and Big Data are tackling Africa’s problems

“All solar systems are monitored in real time through the cloud,” Fruhen announced at a recent tech event in Nairobi. “Five years [ago] when we were founded nobody was thinking about IoT or Big Data but now we collect over 30 million payment notifications every year.” He added that they have more than one million device readings every day. This is from the batteries to temperature of the devices and sensors. Additionally, they have geographical data on where the devices are located. They also have 450,000 rooftop sunshine readings every day. They have calculated that they have saved their users US$338 million since they started, five years ago. “Cloud is the enabler for all these,” he reiterated. “We have 680 terabits of data on our platform.” The company has used its data to provide upgrade devices to users who have finished their solar loan.


5 Ways Cloud Vendors are Dealing with Data Privacy Concerns

Today, cloud vendors are designing managed cloud services from the ground up to meet the most advanced data security requirements, giving current and prospective customers the peace of mind that their data is private and secure. They should also deliver across-the-board support for every aspect of cloud security including physical security, network security, data protection, monitoring, and access controls. Data encryption for data in flight and at rest along with tokenisation of sensitive data items are strategies that can help improve Data Security and help to meet the most stringent of data privacy requirements. Cloud vendors understand that any successful cloud security solution requires close collaboration between you and your cloud service provider, knowing that it’s critical that your organisation has a programme that covers everything from data governance and compliance to cloud user access.


9 Essential #EdTech Ideas to Share With Your Team

To deny that tech will be important to students' futures seems unthinkable. But it's not enough to recognize students will need tech to be successful. Your students also need to see you as a willing learner of technology. They need to see you as a learner period. And it's a shame if you aren't leveraging your skills as a teacher because you aren't willing to learn technology. All of your teacher skills are priceless, but they can be even more relevant and powerful if you know how to effectively use technology for learning, too. ... Lots of kids like to use technology. But using tech because it is engaging isn't as important as using it because your students are engaged. If your students are curious and motivated learners, they will have questions that need answers. They will want to create and share new knowledge.


Learning to Think Like a Computer

Computational thinking is not new. Seymour Papert, a pioneer in artificial intelligence and an M.I.T. professor, used the term in 1980 to envision how children could use computers to learn. But Jeannette M. Wing, in charge of basic research at Microsoft and former professor at Carnegie Mellon, gets credit for making it fashionable. In 2006, on the heels of the dot-com bust and plunging computer science enrollments, Dr. Wing wrote a trade journal piece, “Computational Thinking.” It was intended as a salve for a struggling field. “Things were so bad that some universities were thinking of closing down computer science departments,” she recalled. Some now consider her article a manifesto for embracing a computing mind-set. Like any big idea, there is disagreement about computational thinking — its broad usefulness as well as what fits in the circle.


Regression - Professional analyst should be able to answer these three questions.

To produce a regression analysis of inference that can be justified or trustworthy in the sense that helpful. The term in the statistical methods that generate a linear the best estimator is not bias (best linear unbiased estimator) abbreviated BLUE. Then there are some other things that are also important to note, in which the data to be processed, must meet certain requirements. In terms of statistical methods some terms or conditions of the so-called classical assumption test. Because they meet the assumptions of classical statistical coefficient will be obtained which actually became estimator of parameters that can be justified or accurate ... With adjustments being an attempt to fulfill certain requirements (classical assumption) in the regression analysis as a form of simplification in the application of modern economics, which is a form of empirical science.


Google’s New Chip Is a Stepping Stone to Quantum Computing Supremacy

The six-qubit chip is also a test of a manufacturing method in which the qubits and the conventional wiring that controls them are made on separate chips later “bump bonded” together. That approach, a major focus of Google’s team since it was established just over two years ago, is intended to eliminate the extra control lines needed in a larger chip, which can interfere with how qubits function. “That process is all working,” says Martinis. “Now we’re ready to kind of move fast.” Designs for devices with 30 to 50 qubits are already in progress, he says. He briefly flashed up images of the six-qubit chip at the recent IEEE TechIgnite conference in San Bruno, California, but his group has yet to formally disclose technical details.


Data Transformation is the New Digital Transformation

What is data worth? In my 2010 predictions I expected to see “datasets increasingly recognized as a serious, balance sheet-worthy asset”. I was a bit early there. Data is clearly still not a well understood or significant investment category – brand “goodwill” is better accounted for, but there is no doubt that markets value companies perceived to be data rich with higher evaluations than other companies. Data is a moat. IBM acquired the Weather Company for around $2bn according to the Financial Times, and promptly put CEO David Kenny in charge of a swathe of its Watson and Cloud units. Uber now has a business selling data to companies including Starwood, and is leveraging data to make deals the public sector organisations such as the city of Boston. But taking advantage of data is hard – requiring entirely new skill sets. Valuing it is hard. Cleaning it is hard. Querying it is hard. Managing and maintaining it is hard.



Quote for the day:


"A problem is only a problem when viewed as a problem." -- Robin Sharma


Daily Tech Digest - April 22, 2017

How Indonesia is preparing its fintech ecosystem

“Trust in online payments and consistent education to accept new ways to pay are the two major challenges that we are currently facing,” explains Doku chief operating officer, Nabilah Alsagoff. “Most Indonesians are still comfortable and pretty much rely on bank transfer and COD as their preferred method of payments.” One of Doku’s main aims is to make e-commerce systems easier to navigate for both customers and merchants, she says. The ultimate goal is to be a part of Indonesians’ daily payment habits via e-money, especially for the unbanked in a country of over 250 million where only 65 million are bank account holders. But not only is access to customers a barrier, so too are laws and regulations. Most fintech players feel that the regulation in Indonesia is still in [a] grey area.


Indian techies, IT firms fret as Donald Trump orders US visa review

More broadly, uncertainty over the review announced this week has unsettled Grishma and many others like her. She will have to wait until at least around August to learn her fate, but having accepted the US job offer she is not in a position to apply for positions elsewhere, including in Europe. "It's pretty debilitating," Grishma told Reuters. "I'd like to start work to mitigate the financial damage." Trump's decision was not a huge surprise, given his election campaign pledge to put American jobs first. But the executive order he signed, though vague in many areas, has prompted thousands of foreign workers already in the United States or applying for visas to work there to re-think their plans. Companies who send them also face huge uncertainty.


How one company uses big data to maximize yields and minimize impact

The systems Vegis and her team have built are hosted on Bluemix, IBM's data storage, processing, and analytics cloud. "IBM's tools have enabled us to save both time and money on programming and development," Vegis said. With the initial hurdle of developing machine learning systems and processing data already accomplished, Foris.io has been able to actually gather data instead of just planning for it. According to Vegis, cognitive computing platforms like Watson allow them to "take concept to prototype in a shorter period of time, which we know will improve our chances of securing funding." That doesn't just apply to her and Foris.io—it's a huge benefit for all tech innovators. With a probe installed, data gathering begins. The devices, capable of transmitting data several kilometers, measure moisture, pH level, salinity, temperature, and other factors


25 Predictions About The Future Of Big Data

A flexible structure is just as important today as business needs are changing at an accelerating pace and it allows IT to be responsive in meeting new business requirements, hence the need for an information architecture for ingestion, storage, and consumption of data sources. One of the challenges facing enterprises today is that they have an ERP (like SAP, Oracle, etc.), internal data sources, external data sources and what ends up happening is that “spread-marts” (commonly referred to as Excel Spreadsheets) start proliferating data. Different resources download data from differing (and sometimes the same) sources creating dissimilar answers to the same question. This proliferation of data within the enterprise utilizes precious storage that is already overflowing - causing duplication and wasted resources without standardized or common business rules.


Introducing ‘Operator 4.0,’ a tech-augmented human worker

Human work will become more versatile and creative. Robots and people will work more closely together than ever before. People will use their unique abilities to innovate, collaborate and adapt to new situations. They will handle challenging tasks with knowledge-based reasoning. Machines enabled by the technologies that are now becoming commonplace – virtual assistants like Siri and Alexa, wearable sensors like FitBits and smart watches – will take care of tedious work details. People will still be essential on the factory floors, even as robots become more common. Future operators will have technical support and be super-strong, super-informed, super-safe and constantly connected. We call this new generation of tech-augmented human workers, both on factory floors and in offices, “Operator 4.0.”


Fintech CEO Talks Cross-Border Pain Point Removal

Looking at payments through a global (rather that U.S.-based) lens, 2017 is not going to be a year of leap-frog innovations, but rather a year of incremental improvements focused on country-by-country wins. As mobile infrastructure continues to expand and the Internet reaches an additional two billion people in markets where access was previously nonexistent, we’re bound to see a spike in demand for online and mobile purchases. At the same time, the payment methods landscape will only become more fragmented, requiring payment platforms to optimize between multiple payment options, acquirers and processors, handle currency conversions cost-effectively and transparently, and account for numerous legislative nuances across multiple markets. Decades-old payments systems won’t cut here.


People Re-engineering How-to’s: Mentoring As A Service

The mess comes in what the older cohort in the business see in the self-organizing abilities and discipline in the personalities of the newcomers. I personally disagree with this 'mess theory' and see it as a normal difference in perspectives between generations that were professionally made in different ecosystems, with sharp differences in tempo and culture. Actually it’s our role (as veterans in the craft) to stretch a good hand to get the newcomers professionally in shape seamlessly and gracefully. So what’s the problem, then? Well, that becomes an issue when resources to coach these hordes of not-yet-matured practitioners are not enough. Especially when we remember the sometimes insane pressures on teams and leaders to meet their schedules, leaving very little space for helping juniors outside what’s barely needed to get them 'technically productive'.


Legal impact of data protection and management in the digital age

Regardless of the cause, the threat of data breaches is imminent and can have severe repercussions for organizations, especially if they are found guilty of failing to take sufficient measures to secure their data. Singapore's data protection law has one of the highest fines in Asia with each breach subject to a potential fine of S$1 million. Similarly, breaching Europe’s new General Data Protection Regulation can result in a fine of the larger of either 20 million Euro or 4 per cent of the organization’s global annual turnover. Beyond financial penalties, a data breach can cause irreversible damage to a company’s reputation as well as potentially significant damages payable in civil liability to third parties, not to mention possible personal criminal liability for senior management. Organizations should be well aware of the prevailing legal regulations that govern ever growing popular technology solutions such as cloud storage, collection, analysis, and offshore storage of customer data.


Huawei’s CEO Eric Xu talks wearables, Cloud, AI, and more

AI will be everywhere in our products, in our technologies, and in our operations. And I believe AI can bring value in each and every one of those aspects. In the Telco markets, we've been talking about the technology of AI to build what we call a network brain. The whole notion of this network brain is to help telecom operators to be more intelligent as they build, run, and manage their network. Also, we have tried to bring artificial intelligence into smartphones. Last year we launched Huawei Magic; a concept phone with AI capabilities built into it. The idea was to show how the phones would evolve from smartphones to intelligent phones.  And then our network and cloud service - no matter whether it's Public Cloud or Private Cloud - we also inject the capabilities of AI into the Cloud platform to better enable enterprises.


Why You Must Build Cybersecurity Into Your Applications

“Companies face a terrible choice: either they turn their business into software and they accept the fact that they’re going to have rampant vulnerabilities and breaches or they let their competition win the innovation race. And everyone chooses software,” said Williams. “But as a result, we’re going to have 111 billion new lines of code in 2017. And the problem is that these legacy tools, dynamic analysis tools, static analysis tools and web application firewalls, were invented in the early 2000s. They’re absolutely incapable of scaling to the level of modern software.” This requires an approach that uses automation. Every business that has been around for more than five years will have legacy software integration challenges, which requires developing new code. Companies are constantly integrating new software platforms with older systems and a cybersecurity platform has to be able to protect all of these assets.



Quote for the day:


"Sometimes the questions are complicated and the answers are simple." -- Dr. Seuss


Daily Tech Digest - April 21, 2017

A Vigilante Hacker May Have Built A Computer Worm To Protect The IoT

Symantec has found some possible proof. The company noticed that the computer worm has been leaving a message over infected devices since at least March, Grange said. That message has been digitally signed and fetched in a way that leaves little doubt it comes from Hajime's developer. The short message doesn't reveal anything about the Hajime developer's identity. But the vigilante hacker is aware the security community has been studying the Hajime worm. One clue: The mysterious developer refers to himself or herself as the "Hajime author" in the message the worm has been leaving behind. However, it was actually security researchers at Rapidity Networks that came up with the name Hajime, which is Japanese for the term "beginning."


Australia's bold plan for cybersecurity growth

The SCP is intended to "identify the challenges Australian organisations face when competing in local and international cyber security markets". "The SCP provides a roadmap to strengthen Australia's cyber security industry and pave the way for a vibrant and innovative ecosystem. It articulates the steps and actions required to help Australia become a global leader in cyber security solutions, with the aim of generating increased investment and jobs for the Australian economy," it says. The SCP was launched by Senator Arthur Sinodinos, Minister for Minister for Industry, Innovation and Science. "The aspiration, and it's set out here in this plan so clearly, is to be a global leader in this space," Sinodinos said.


Even small firms can tap into value through data wrangling

Chances are, small businesses already have a fairly large amount of data collected, particularly if they have been in business for at least a year. Even if the business is older and had not begun in the digital age, and does not have many electronic records, the paper records still contain data. Sales slips, time cards, order forms, all of these have data worth analyzing. Perhaps the records are a mix of paper and electronic records. Maybe more recent inventory records are recorded in a spreadsheet, while the older information is kept in a hand-written ledger. It would be worth the business owner’s while to digitize the paper records. This will require an initial output of resources, but the time spent scanning images or entering data into a database program will be paid back in the time saved by the staff not having to dig through paper files looking for information in addition to gaining the ability to query these records.


Microsoft launches 'IoT-as-a-service' offering for enterprises

The Microsoft spokesperson added that the new offering will help IoT product manufacturers "that value time to market with technical stack prescribed and managed for them". "It is designed to enable the rapid innovation, design, configuration, and integration of smart products with enterprise-grade systems and applications to reduce product manufacturers' go-to-market cycle and increase the speed at which they can innovate so they can stay ahead of their competition and deliver smart products that delight their customers," the spokesperson told ZDNet. IoT Central is vertically and horizontally agnostic, though the spokesperson said its early adopters happen to operate in the manufacturing and engineering industries such as ThyssenKrupp Elevator, Sandvik Coromant, and Rolls-Royce.


Artificial intelligence: fulfilling the failed promise of big data

According to Forrester’s Business Technographics survey of over 3,000 global technology and business decision makers from last year, 41percent of global firms are already investing in AI and another 20 percent are planning to invest in the next year. Most large enterprises’ first foray into AI is with chatbots for customer service, what we call “conversational service solutions.” These run the gamut from hard coded rules-based chatbots which aren’t artificially intelligent to very sophisticated engines using a combination of NLP, NLG, and deep learning. From a customer insights perspective, many companies are starting to uses some of the “sensory” components of AI such as image and video analytics and speech analytics to unlock insights from unstructured data.


How the Internet of Things Puts SCADA Systems at Risk

Since OT is technology that was built pre-Internet and is goal-oriented, its security is not always a top priority, Brown said. Others agreed. "I think it's still sort of a nascent field which is ironic because industrial systems, operational systems are from a past era," said Alex Eisen, a security researcher for ForeScout. Eisen later continued, "Think about trains, iron, mechanical engineering, electrical engineering and now we find ourselves in this modern world, information age, where a lot of these hard skills and experience is sort of tucked away." The panel discussed risks to assuming OT and IT systems are not connected. Brown went on to describe multiple attacks that have happened because of unknown entanglement between the two systems. The panelists — which included representatives from SMUD, the Sacramento Regional County Sanitation District, security companies, and others — discussed how OT systems can be protected:


How To Run Your Small Business With Free Open Source Software

Even if you want to stick with a closed source operating system (or, the case of macOS, partially closed source), your business can still take advantage of a vast amount of open source software. The most attractive benefit of doing so: It's generally available to download and run for nothing. While support usually isn't available for such free software, it's frequently offered at an additional cost by the author or a third party. It may be included in a low-cost commercially licensed version as well. Is it possible, then, to run a business entirely on software that can be downloaded for free? There certainly are many options that make it possible — and many more that aren't included in this guide.


Five emerging technologies for rapid digital transformation

To get a sense of what pressures IT leaders were under and how they were dealing with them, I recently sampled just over 50 of the top practitioners in the space with a focus on what I regarded were leading organizations in their industry -- mostly large enterprise CIOs, as well as a few CTOs, CDOs, and EVPs of IT who I knew were pushing the envelope -- to better understand the IT initiatives they are focusing on to becoming more agile. By picking cutting-edge leaders at top organizations, the intent was that the data will show what they're facing and how they're dealing with it this year, in a way that gives more typical organizations time to prepare for what they'll likely face next year and beyond. Unsurprisingly, the data clearly that top IT leaders are feeling much more pressure for their team to move quicker than they ever have in the past.


Surveys show high hopes, deep concerns about IoT

While many have high hopes for IoT, few are on their way to full deployment. The survey found 41 percent of respondents expect IoT to have a big impact on their industries within three years, affecting things like efficiency and differentiated products and services. But only 7 percent said they have a clear vision with implementation well under way. Most companies don't have everything they need to succeed in IoT, with many saying they'll need new technical skills, data integration and analytics capabilities, or even a rethinking of their business model. Thirty-one percent of the executives said their organizations face a "major skills gap" in industrial IoT. The annual developer survey co-sponsored by the open-source Eclipse IoT Working Group, IEEE IoT, Agile IoT and the IoT Council, also found growing adoption along with continuing concerns.


The Value of Exploratory Data Analysis

EDA is valuable to the data scientist to make certain that the results they produce are valid, correctly interpreted, and applicable to the desired business contexts. Outside of ensuring the delivery of technically sound results, EDA also benefits business stakeholders by confirming they are asking the right questions and not biasing the investigation with their assumptions, as well as by providing the context around the problem to make sure the potential value of the data scientist’s output can be maximized. As a bonus, EDA often leads to insights that the business stakeholder or data scientist wouldn’t even think to investigate but that can be hugely informative about the business. In this post, we will give a high level overview of what EDA typically entails and then describe three of the major ways EDA is critical to successfully model and interpret its results.



Quote for the day:


"Our leadership style is defined by who we are and what we do, not by what we say." -- Gordon Tredgold


Daily Tech Digest - April 20, 2017

The three ‘B's’ of cybersecurity for small businesses

Large-scale cyberattacks with eye-watering statistics, like the breach of a billion Yahoo accounts in 2016, grab most of the headlines. But what often gets lost in the noise is how often small and medium-sized organizations find themselves under attack. In the last year, half of American small businesses have been breached by hackers. That includes Meridian Health in Muncie, Indiana, where 1,200 workers’ W-2 forms were stolen when an employee was duped by an email purporting to come from a top company executive. Many small companies are just one fraudulent wire transfer away from going out of business. There’s lots of advice available about how to fight cybercrime, but it’s hard to tell what’s best. I am a scholar of how businesses can more effectively mitigate cyber risk, and my advice is to know the three “B’s” of cybersecurity: Be aware, be organized and be proactive.


Want to Know What’s in a GC Pause? Go Look at the GC Log!

The evidence presented here suggests that the garbage threads were not active for the vast majority of the pause. If the pause was due to background I/O then the GC threads, captured by the OS, should have accumulated an inordinate amount of kernel time, but they didn't. This all suggests that the GC threads were swapped out, and incredibly, not rescheduled for more than 22 seconds! If our app wasn't paused by the garbage collector then the only possibility is that the JVM was paused by the operating system, even if that doesn't seem to make any sense. Fact is, operating systems sometimes do need to perform maintenance, and when this happens, just as is the case with GC, the OS may need to pause everything else. Just like GC pauses coming from a well tuned collector, OS pauses are designed to occur infrequently and be very brief to the point of hardly being noticed.


Machine Learning Paving The Way For Enhanced Marketing

The key thing to remember is that as you supply machine learning software with more data, it keeps on learning and adapting. Other areas in which a machine learning application can help marketers include: Customer segmentation – Machine learning customer segmentation models are very effective at extracting small, homogeneous groups of customers with similar behaviors and preferences. Customer churn prediction – By discovering patterns in the data generated by many customers who churned in the past, churn prediction machine learning forecasting can accurately predict which current customers are at a high risk of churning. This allows proactive churn prevention, an important way to increase revenues. Customer lifetime value forecasting – CRM machine learning systems are an excellent way to predict the customer lifetime value (LTV) of existing customers, both new and veteran.


Cyber security is a ‘people problem’

While people have long been seen as the weakest link in IT security through lack of risk awareness and good security practice, the people problem also includes the skills shortage at a technical level as well as the risk from senior business stakeholders making poor critical decisions around strategy and budgets. Interestingly, the increase in reported skills shortages contrasts with a decrease in those reporting a lack of experience being a market factor. This suggests that as the industry matures the shortage of experienced, senior managerial professionals will reduce and the problem will be felt most acutely in the hands-on technical disciplines. “The survey highlights the continued need for industry, government, academia and professional organisations like the IISP to continue to work hard to attract new entrants and younger people into the industry,” said Piers Wilson, author of the report and director at the IISP.


Inside Story of Building a Global Security Operations Center for Cyber Defense

In this market, what a lot of our customers see is that their biggest challenge is people. There are a lot of people when it comes to setting up MSSPs. The investment that you made is the big differentiator, because it’s not just the technology, it’s the people and process. When I look at the market and the need in this market, there is a lack of talented people. How did you build your process and the people? What did you have to do yourself to build the strength of your bench? Later on we can talk a little bit more about Zayo and how HPE can help put all of this together. ... But within the SOC, our customers require things like customized reporting and even customized instant-response plans that are tailored to meet their unique audits or industry regulations. It’s people, process and tools or technology, as they say. I mean, that is the lifeline of your SOC.


Cutting through the Noise: Is It AI or Pattern Matching?

At any recent security conference lately, you probably have heard hundreds of vendors repeating the words "We have the best artificial intelligence (AI) and machine learning." If you happened to be in one of those conversations and asked "What does that mean?," you probably got a blank stare. Many security consumers are frustrated when marketing pitches don't clearly articulate what AI does in a product to help protect an environment better. There are several dilemmas facing security companies that keep them from being more up-front about how they use AI and machine learning. For some, the concepts are a marketing statement only, and what they call AI and machine learning is actually pattern matching. Also, machine learning relies on a tremendous volume of data to be effective, and there are very few vendors that possess enough of it to be successful in its implementation.


Blockchain: Overhyped buzzword or real-deal enterprise solution?

While the technology has grown in popularity, mainly because it's the basis for the wildly hyped cryptocurrency and payment platform Bitcoin, many experts are still not sure exactly how it works. Even the founder of Bitcoin, Satoshi Nakamoto, is a shadowy figure and no one appears to know with certainty who he is or if the name is a pseudonym for a group of developers. Nakamoto, however, holds one million bitcoins, or the equivalent to $1.1 billion. Angus Champion de Crespigny, blockchain leader at Ernst & Young, called the technology "overhyped" and said many business applications touted as beneficiaries of its use have regulatory or operational issues that can be difficult to solve via one technology alone. "We're seeing interest in using it to propagate security policies and identity access management, but it's early days.


Microsoft Open Sources React Native-Based Cross-Platform Library

"ReactXP is designed with cross-platform development in mind," its site says, though it promises it will only let developers "share most of your code" among platforms. "With React and React Native, your Web app can share most its logic with your iOS and Android apps, but the view layer needs to be implemented separately for each platform. We have taken this a step further and developed a thin cross-platform layer we call ReactXP." Developer Eric Traut provided more information in a blog post. "It builds upon React JS and React Native, allowing you to create apps that span both Web and native with a single code base," he said. Although it's built on both implementations, an FAQ indicates it borrows more heavily from React Native. ... ReactXP is described as a thin abstraction layer built upon and bridging React JS and React Native.


Are We Ready To Bid The SIEM Farewell?

"A lot of the vulnerability is bad configurations which stem from poor consultancy. These things weren't meant for a huge company," Grigg said. He's hardly pointing the finger at anyone to lay blame, as Grigg said that in his earlier years he had likely provided some bad consultancy. "I started to notice buddies of mine who were really good consultants, and watching them do their work, I thought, 'I probably shouldn't be allowed to touch this stuff'. Unfortunately, It's the norm to have bad consultants," Grigg said. Many companies hire a third party to come in as the 'fix it' people. Those that specialized in SIEM platforms, as Grigg eventually did, found themselves "Fixing what was super messed up," he said.  Because so much of the SIEM industry is legacy software that was the same tool just redesigned and rebranded, Grigg said, "Those back doors still exist on there today."


Q&A on The Rise and Fall of Software Recipes

The simplest way to increase value is to implement a policy that ensures that bugs are reproduced in a test case before any attempt to their resolution, so that they can’t happen again without being detected by running the test suite. Not only is the software better by having the bug removed, but the expected behaviour is now formally documented by an executable test case. But there is no such thing as a single best way to debug software. Each software developer has his/her own preferred tool or process to do so. ... When dealing with a buggy piece of software, I add assertions (available in some form in virtually all languages today) that check for the conditions that represent the expected behaviour of the system. I iteratively reduce the scope of my bug (things are all right when entering it, and faulty when exiting it) by adding more and more precise assertions, until I find the source of the problem, and fix it.



Quote for the day:


"A bird isn't afraid of the branch breaking because it's trust is not on the branch, but on it's wings." -- Unknown


Daily Tech Digest - April 19, 2017

AI will create many new jobs — here’s how you can prepare

For humans to be the most productive in their collaboration with machines, they need advanced technology skills that probably exceed their current capabilities. The skills gap must be closed for workers at various levels of competencies and who possess a variety of experiences. Filling such widely disparate skills gaps, bridging the college-to-work gap, and retooling millions of workers into completely new jobs are daunting tasks. Traditional approaches to education have come under pressure due to the costs (student debt in the U.S. is estimated at $1.3 trillion) and questionable efficacy (a late-2016 study showed that nearly half of new college graduates are underemployed). Given the magnitude of the problem, a new approach is necessary. Though not yet widely adopted, adaptive learning is a low-cost, proven, and highly efficient way to equip people from factory workers to physicians with skills — not just in technology, but in other realms as well.


StorageOS goes to market with persistent Docker container storage

StorageOS also optimises storage, tracking where containers are running and ensuring storage remains as local as possible to keep latency down. It aims to tackle the key weakness of storage for container environments – that container storage is not persistent. That means that when containers cease running, whether for planned or unplanned reasons, storage is lost and not resumed when containers are restarted. Containers are gaining popularity because of their ability to be deployed and scaled rapidly. Organisations can deploy a given number of containers to support a campaign launch, for example, then, if demand spikes, more containers can be added, effectively increasing the parallelised operation of the application. These can also be in different locations, so some containers could be run in-house while additional capacity is run from a public cloud.


The benefits and pitfalls of implementing threat intelligence

The industry should aim to achieve a level of interactive integration and cooperation between analysts and their tools, so that they seamlessly play off of each other’s strengths to be better than their sum. The current place where analyst and automation meet are at the SIEM and the threat intelligence platform. The SIEM is the centre of events. The threat intelligence platform (TIP) is where intelligence is managed by the analyst. Your SIEM and TIP should work well enough together that any events that already correlate to threat intelligence can be viewed in the SIEM while the TIP can still be used to research any probable future threats. The experienced analyst is central to the process for the steps that require their intuition, given all of the possible information, to make a decision. Once they make or review decisions they can quickly deploy any changes to the appropriate systems or channels.


Spanner, the Google Database That Mastered Time, Is Now Open to Everyone

To be sure, a few others could build a similar service, namely Amazon and Microsoft. But they haven’t yet. With help from TrueTime, Spanner has provided Google with a competitive advantage in so many different markets. It underpins not only AdWords and Gmail but more than 2,000 other Google services, including Google Photos and the Google Play store. Google gained the ability to juggle online transactions at an unprecedented scale, and thanks to Spanner’s extreme form of data replication, it was able to keep its services up and running with unprecedented consistency. Now Google wants a different kind of competitive advantage in the cloud computing market. It hopes to convince customers that Spanner provides an easier way of running a global business, a easier way of replicating their data across multiple regions and, thus, guard against outages.


Mobile device strategies catch on among hospitals

In developing mobile policies, hospitals must address the security of patient information and the need to comply with the privacy and security regulations of the Health Insurance Portability and Accountability Act (HIPAA), notes the Spok report. Some organizations that responded to the survey, in fact, “viewed mobile strategies as primarily a security project concerning HIPAA compliance,” the report points out. However, hospitals’ mobility strategies must extend beyond security to help them reach their organizational goals, Edds says. Kuhnen, similarly, says that hospitals must go beyond mobile security if they don’t want to fall behind. “They need to look at the productive uses of mobile technology—how the technology can make their workflows more efficient and improve user satisfaction.”


Four Data Science Imperatives for Customer Success Executives

To decrease customer churn, you can use predictive modeling to identify the variables that are predictive of customer churn. While you can find drivers of churn manually when the data set is small, you will need to rely on the power of machine learning when you integrate all your data sources. Because integrated data sets can contain many variables, data analysts/scientists are simply unable to quickly sift through the sheer volume of data manually. Instead, to create predictive models of customer churn, businesses can now rely on the power of machine learning. Machine learning is a set of techniques that allow computers to make dynamic, data-driven decisions without explicit human input. In the context of CSM, machine learning helps computers “learn” the differences between users who stay and those who leave.


New Verizon Smartwatch Doesn't Need A Smartphone

Wearables may soon not rely on a smartphone, as more than one network-connected smartwatch hit the market. One such smartwatch launching next month was developed by a major network to function as an independent device. Verizon’s new Wear24 smartwatch can connect to Verizon’s 4G LTE network without requiring a smartphone. The smartwatch automatically operates using the user’s existing phone number when sending texts and making calls, according to Verizon. The smartwatch is equipped with an eSIM (Embedded Subscriber Identity Module), which enables the network connectivity. This functions similarly to the SIM card in a smartphone, but is not removable. Integrating eSIMs into IoT devices enables networks to remotely configure device connectivity settings and allow or deny access based on the status of a device owner’s subscription.


Addressing the Cybersecurity Skills Gap

The talent shortage is real, and it might get worse before it gets better. As the amount of accessible data grows, data crime is becoming more pervasive. Ransomware, sophisticated extended-duration attacks, phishing and whaling attacks are all targeting large enterprises, government organizations, mom and pop shops and everyone in between. It doesn't help that the rapid growth of data crimes is a relatively new trend, making it hard to find people who are deeply experienced in fighting data crime and who can be thrown into the fire immediately. This gap can have the biggest effect on small business leaders, who often can’t compete with larger companies when it comes to offering the salary and benefits that attract today’s top IT talent. At this point, qualified newly hired professionals command average salaries of roughly $150,000, and that number most likely has room to grow.


Cyber threats are growing more serious, and artificial intelligence could be the key to security

"This is the real scare, to not just a particular industry of a particular size, but to everybody. It is a matter of existence," said Aurora. That's where Darktrace's artificial intelligence system comes in, with the latest technology offering called Antigena. Once a threat is identified, Antigena automatically responds by taking proportionate actions to neutralize it and buy security teams enough time to catch up. In essence, it acts like a digital antibody that can slow down or stop compromised connections or devices within a network without disrupting normal business operations. "Human beings are still going to be fundamental, but right now, the kind of attacks — you find it very difficult to figure out and they're so quick that if you look at traditional means, by the time human beings get to respond, it's too late," Aurora explained.


Demystifying Network Analytics

A common request from network operations: “I don’t want to wait for users to phone us about problems, nor do I have time to sift through mounds of data. Tell us who’s having a problem and how to fix it.”  True analytics needs to automatically surface insights and recommend useful actions that IT can take to proactively improve user experience. What’s more, the tools should be able to suggest what actions to take to deliver the biggest bang for the buck relative to improving the users’ network experience. ...  But what comes out of the machine learning algorithm must be translated back into a plain English recommendation, such as: “By removing the rogue access points interfering with the 5GHz radio of a certain access point you can effectively mitigate 400 client hours of poor client Wi-Fi performance.”



Quote for the day:


"Any powerful idea is absolutely fascinating and absolutely useless until we choose to use it." -- Richard Bach