Daily Tech Digest - May 09, 2017

Leadership For The IT Revolution

Leadership is not an immutable set of universal traits. The British have an expression, “Horses for courses,” by which they mean that just as some horses are best on wet tracks, or long tracks or short tracks, so are some people better suited to certain activities than other people. This applies in IT leadership. Horses for courses; environment matters.  To be successful, IT leaders need to identify and apply a subset of leadership traits relevant to the environment in which they find themselves. This means that when the environment changes, leaders have to change — not who they are, but how they lead. ... Nathan Rothschild was convinced opportunities were greatest when cannonballs were falling in the harbor, “when there’s blood in the streets, even if the blood is your own.”


Insurance companies struggle with managing analytics teams

Led primarily by traditional CIOs, many companies have created centralized data management, big data and information governance strategies and capabilities. To lead these functions, insurance companies have sought talent from adjacent industries that have led the way in data analytics. This typically includes retail, financial services, information services and data companies. In some instances, Insurance companies have looked to executives coming out of healthcare organizations in order to leapfrog their own data capabilities. Though the Insurance industry has made significant strides in terms of data capabilities, it continues to grapple with the challenges of organizational access, and structuring to maximize the impact of analytics.


Battling cyber security’s human condition

Unfortunately, technical security protections are often easily undermined by social engineering and human error. In fact, according to CompTIA’s 2016 International Trends in Cybersecurity report, 58 percent of security breaches are caused by human error, versus 42 percent caused by technology error. For example, look at Sony Pictures’ catastrophic data breach, where the company lost employee personal information, emails, and even copies of un-released films. When the dust finally settled around this attack, evidence suggested that the intruders began with credentials harvested from spear-phishing campaigns that deceived employees. Sometimes attackers don’t even need to trick employees into giving up their credentials; they can just guess an over-simplified password. According to Verizon, 63 percent of all intrusions involve stolen, weak, default or easily guessed credentials.


Security Surprises Arising from the Internet of Things

Threats to IoT can be divided into two categories. First, devices are taken over to do something they are not intended to do, like a security camera that becomes part of a botnet attack. But also devices can be commandeered to do exactly what they are intended to do but in a devious way. Think of directing a self-driving car to drive off a bridge. Consider the cyber attack on Iran’s nuclear enrichment centrifuges to make them rapidly speed up and then suddenly slow down (imagine pushing down hard on the accelerator, and then the brake in your car), which eventually seriously damaged them. That flummoxed operators who had never planned a response to prevent something like that because why would you do that in the first place? Therein lies the danger of IoT security flaws: Hackers may come up with ways to use devices that were never conceived of before.


How to check for the Intel Active Management exploit that lets hackers take over your PC

A vulnerability that lets someone boot up your PC and install software at will, and even bypass logging in, sounds about as bad as it can get. Still, it's not clear just how easy this is to exploit. Security reporter Dan Goodin of Arstechnica reported last week that some researchers believe the exploit would have to be present and the machine would have to be set up or provisioned for remote management for it to open to the attack. Goodin, however, followed up with a report on Saturday that researchers had bypassed the AMT without even entering a password. In the end, the first step in fixing a problem is recognizing that you have one. If you think you might have the exploit on your machine, run the check.


Linux Foundation to develop tool for building blockchain business networks

The Linux Foundation announced a new software project under its Hyperledger open consortium aimed at creating a collaboration tool for building blockchain business networks -- or smart contracts -- and their deployment across a distributed ledger. The new project, called Hyperleder Composer, is a modeling language based on JavaScript and with REST API support, that allows non-developers and developers to model their business network. The language also supports modeling of relationships and data validation rules. For example, all blockchain business networks share certain elements, such as assets, participants, identities, transactions, and registries. With existing blockchain or distributed ledger technologies, it can be difficult for organizations to take a blockchain business use case and map the concepts into running code.


How to navigate uncertainty? Stop managing the manageable

A landmark study in the mid-1990s found that only 55% of a company’s results stemmed from issues that managers could control. That means fully 45% of the results related to effects in the environment -- a recession, a surprise by a competitor, a natural disaster, and so on. Managers tend to throw up their hands about external surprises. “Who could have known?” “What could we have done?” But that 45% can, in fact, be managed. The secret is to sense the external events quickly and to react faster and more nimbly. Remember: you don’t have to get everything right; you just have to be a little more right than your competitors. To begin managing those areas traditionally considered unmanageable, senior executives should focus on developing four organizational capabilities.


Why Your Own Resilience Matters Less Than Your Team’s

It’s no surprise that there’s a strong correlation between effective leadership and the characteristics common among resilient individuals—which include self-reliance, an internal locus of control, a growth mind-set, strong problem-solving abilities, and good interpersonal skills. Indeed, resilience experts at Sloan Group International reported in a recent presentation that, based on the available research, “people who self-select into a leadership role tend to have a higher ability to deal with stress and hold a high amount of resilience.” Vindication for the Shackleton model, right? Sure, but that model may deliver fewer returns as the workplace evolves. The more distributed leadership becomes, and the more collaboratively teams are asked to work, the fewer chances there are for Shackletons to come along and save the day when things go awry.


Industrial Robots Are Security Weak Link

One challenge for companies will be to find people who have experience in both robotics and security. “There will be a few folks, but it will be a hot market because not many students study both robotics and security,” Gennert said. “Those that do both will be able to write their own ticket.” Until companies can effectively combine robotics with security, robots may be an easy entryway for a hacker into a company's networks. Nunnikhoven said there’s no direct evidence that hackers have taken advantage of these exploits. There aren’t proper monitoring systems in place to know if the systems have been exploited, he said. Malicious hackers could get into a robot's controller system and make adjustments to its actions, which could create a dangerous situation in the factory or could enable the robots to build unsafe products on the production line.


Taking an Application-Oriented Approach to Cloud Adoption

In cloud, we don’t know exactly where our application is running. Hardware is prone to failure. Software updates and patches are also prone to error. It’s better to architect and design your application to handle failures rather than thinking and trying to make it robust which is never possible. Eliminate single point of failure (SPOF), build resiliency at every level. An application should function even when the underlying hardware has failed. AWS Availability Zones (AZ) and Regions, similarly Azure Locally Redundant Storage (LRS), Zone-redundant Storage (ZRS), Geo-redundant Storage (GRS), and Read-access geo-redundant storage (RA-GRS) all make it easier to design redundant capabilities. Building resilient cloud infrastructure is straightforward and far less expensive than traditional means.



Quote for the day:


"Our worst fault is our preoccupation with the faults of others." -- Khalil Gibran


Daily Tech Digest - May 08, 2017

And Now a Ransomware Tool That Charges Based On Where You Live

The payment scheme is based on the so-called Big Mac Index, an interactive currency comparison tool that The Economist created in 1986 to assess whether international currencies are at their correct relative levels or are undervalued. It basically compares the average price of a Big Mac in the U.S. against prices for the same product in various other countries to determine currency trends. The tool, which The Economist has said was originally designed as a lighthearted attempt to gauge currency misalignment, has become a global standard for measuring international purchasing power parity. Fatboy, according to Recorded Future, uses the same index to determine which of its victims get to pay more and which of them get to pay less—at least in relative terms.


Do You Really Have Big Data, Or Just Too Much Data?

The type of information companies are collecting is also multiplying -- from traditional sources such as customer mailing addresses and phone numbers to more advanced demographics, web histories, shopping preferences, and even biometric data. Advances in technology, computer power, and analytics mean companies can collect and process data in almost real-time. This may lead executives to believe that the more data they have, the greater their advantage. However, collecting a virtually unlimited amount of data can create a serious threat for organizations, because the amount collected often outstrips the ability to protect it. In fact, when CEB surveyed 54 information risk executives around the globe in 2015, more than three-quarters of them indicated it is harder, or significantly harder, to prevent data breaches than in the past.


Why SMBs are at high risk for ransomware attacks, and how they can protect themselves

Gibbons recommends having basic IT protections around how files are shared within a network, including a basic VPN setup for employees who work from home, or a fileshare system like Dropbox. "Having a corporate-sponsored way of sharing files remotely, working on them, and getting them safely back into the network goes a long way," Gibbons said. Basic employee education programs about email phishing and other cyber threats is also very effective, Gibbons said. "You need to plan as though you're absolutely going to get infected," he added. "The problem is you're subject to the weakest link in the chain—the least technically skilled individual in the business will be how you become a victim." When ransomware does hit, it's key to identify and isolate the infected machine to ensure it doesn't spread throughout the network, Gibbons said.


5 Career Paths in Big Data and Data Science, Explained

The first article provides a general overview of some of the dominant concepts in data science, with the second being an update to these concepts from earlier this year. The third article provides a deeper treatment of the concepts of data science and Big Data. The fourth and final article is a quick discussion touching on some of the complexities and nuances surrounding the use of the term "data science" versus a number of other terms. I have broken up the various professional possibilities into an easily manageable set of 5 career paths. While there may be mass outcry and widespread panic related to this particular division of roles, they really serve to categorize skills and professional responsibilities at a high level, and so I believe the following is quite useful for orienting newcomers to the myriad opportunities which exist in this professional realm, myriad opportunities


Why CFOs and CIOs need to partner on cybersecurity

“In the old days when your CIO and CFO had no relationship and didn't talk to one another, it was bad management,” said Lee Lofthus, assistant attorney general for administration at the Department of Justice. “Now, if you don't talk to one another, it's a real cyber risk for the whole agency.” Other panelists pointed to DOJ as a federal leader in institutionalizing the relationship between the CFO and CIO. The CIO sits on the working capital board at Justice, while the deputy CFO sits on the department’s investment review board. Lofthus added that there is no longer a bright line between a cybersecurity budget and an IT budget at DOJ. “It's an increasingly composite budget we get that has cyber baked into it,” he said. He pointed to the example of data center consolidation, which was originally viewed as a cost-cutting measure.


Another Tectonic Shift: The Cloud Disrupts Traditional BI Architectures

“Cloud” is not a technology it’s an architecture. In the same way that software built for the mainframe made assumptions about the environment in which it operates, software built for client-server architectures made a different set of assumptions. This is why we saw the rise of an entirely new set of vendors who seemed to appear from nowhere to become some of the largest software vendors in the industry. Almost no vendors of data technologies (databases, integration tools, query or reporting products) carried over from the mainframe market into the later stage client-server market of the late 1990s to early 2000s. We are at a stage in cloud adoption where the BI vendors are beginning to recognize that the way their software was built, deployed and managed is not well suited to the way cloud architectures work.


Computer Forensics Follows The Bread Crumbs Left By Perpetrators

The extent to which deleted data and historical activity may be recoverable varies on a few factors, but generally degrades over time and commensurate to the volume of activity on a system, he said. This approach to computer forensics remains suitable for focused, small-scale investigations, but is too time and resource-intensive for enterprise-scale tasks, such as hunting across thousands of systems in a corporate environment, Kazanciyan said. “As a result, technologies that facilitate rapid search and analysis of evidence across ‘live’ systems began to flourish in the past decade, and formed the foundation of what's referred to as the endpoint detection and response (EDR) market,” he said.


Tech execs unsure about cyberinsurance, want storage flexibility, and wonder about AI

"I wish they would understand that most of the data that I deal with is dark data, and what that means is just like the proportions of the universe, where 3 percent we can see but 97 percent is dark matter, just because you can't see it, it doesn't mean it's not there. My data are high-resolution images, very rich information, and I wish what they understood is we need to stratify that data better." "I'm very jazzed about screenless. The processing power has been woven into everything that we have, and so I believe that anything I touch, anything I speak to, it's all alive and I'm loving how it's evolving." ... "Oh, man. Well we're healthcare so HIPAA. I just wish that was a little bit more of an out-of-the-box type of setup, that they would just figure out how to make that more turnkey than it's their first rodeo every time.


Will the Internet of Things always be so vulnerable?

The Internet of Things doesn’t have to be as vulnerable as it currently stands. In many cases, the transition to managing business affairs online — everything from accounting and storing customer data, to production and inventory management — has occurred faster than business leaders can adopt new security measures. In their eagerness to improve communication, data storage, and business operations through IoT devices, many businesses simply haven’t paused long enough to think about the careful protection of that data.  Though countless enterprises would like to say otherwise, the truth is cyberattacks cannot be fully prevented. Nevertheless, smart companies — and individual users — can adopt quality standards and best practices that minimise those risks to ensure IoT becomes a boon, not a burden.


Data Breaches: Fear the simple, not the complex

John Grim explained how this works and how prevalent it is, he said: “Financial pretexting is tricking somebody, like sending them a fake invoice, and having an executive sign off on it, and basically stealing money that way.” “In terms of pretexting the top communication vector email, we’re seeing 88% there, and then we are seeing pretexting 10% of the time in telephonic or phone communications.” With close to 90% of this most basic form of attack being sent in via email, it begins to raise the possible question as to whether email is still a suitable platform for transferring sensitive information. CBR recently spoke to a startup called Pushfor that is tackling the space, aiming to provide a secure solution for sending important information.



Quote for the day:


"You can know a lot about something and not really understand it" -- Charles F. Kettering


Daily Tech Digest - May 07, 2017

Phishers Spoofing Email Senders to Muck around with Victims’ Web Accounts

The researcher observed that attackers could also use that same feature to add malicious PDF documents to a target’s to-do list. All they would need to do is attach the documents to their emails. They could then use the “*” character, per Wunderlist’s service, to flag that email and its attachments as important. Fortunately, it’s not hard to fix the issue. Web services can take a cue from companies like Google, Evernote and Facebook and begin using unique secret email addresses for each account. This address connects a generic mail-in account to the user’s account. To mess with the system, someone would need to know the secret email address for the target’s account and the company’s generic mail-in email address.


Why one CIO chose ‘speed over elegance’ in corporate split

It's customary for CIOs to seek synergies in such complex splits. Enticed by reduced license and support costs, Bender purchased several SAP applications. He chose SAP's Hybris ecommerce application and SAP cloud applications, including SuccessFactors for human resource management, Ariba for procurement and spending analytics, and Concur for travel and expense management. “Cloud-based solutions were preferable because we could stand them up faster and implement them accordingly,” Bender says. While Bender acknowledges the predominance of SAP in his portfolio he insists that he's not wed to the vendor; rather, he's picked the best solution for each business need. "You have to look in terms of adding value to the business," Bender says. "Where it makes sense we lean into SAP and we’ve had success with that.”


Culture May Eat Agile for Breakfast

Originally rooted in the “fake it ‘til you make it” practice, the approach used to be of an intermediary nature to gain time while figuring out or preparing the right solution. Nowadays, it is the answer particularly in areas like sales or customer service, the latter often acting as an extension of an inadequate product or service. Adding people to fix issues manually turns out to be psychologically challenging at the leadership level. There often is an immediate feeling of adding value by fixing a problem. However, this initial short-term success is achieved at the expense of the long-term solution by making it seem less urgent. Hence, this path means focusing on the low-effort-low-outcome quadrant, when the organization should address the real issue at hands: how to preserve its culture when hiring starts focusing on providing skills, not mindset?


HoloLens system uses augmented reality to aid spinal surgery

At least that's the promise of the new Scopis Holographic Navigation Platform, which is designed to be used with the Microsoft HoloLens to help doctors perform spinal surgery.  The company claims that its system can use 3D tracking with the HoloLens to help accurately find spinal screw positions faster during surgery. The system also allows the medical team to place virtual monitors above the surgery space, giving the surgeon a hands-free way to refer to charts and images while operating. Scopis also employs the HoloLens' familiar finger gestures (which look like you're pinching the air) to allow the surgeon to control the AR content. Of course, the $3,000 HoloLens is still mostly in the hands of developers, so we're still learning about just how reliable it is during pressure situations like surgery, but this short video is an encouraging look at the possible near future of AR as a practical tool beyond gaming and casual apps.


How Mindfulness will Protect You From Being Replaced by a Robot

Mindfulness is a natural capacity, present in all of us to some extent. But we are all too familiar with its opposite: a default, heedless, distracted state often described as ‘autopilot’. It goes without saying that anything that we can do on autopilot, robots and AI will soon do better. Mindfulness may come to be seen as the core 21st century capacity, because it concerns our only competitive advantage over the machines: awareness itself. ... If we’re successful in creating a human-centered economy that plays to our best qualities, then this may mean that we work fewer hours, or fewer days. But it may also mean that many of us will be unemployed. If this is the case, how will we use our time? What will education teach us?


Big Data Analytics Talent is Just Waiting to be Tapped

There is also a need to separate the roles involved in managing and preparing data analytics – which can be divided into two broad categories: data science or data engineering. Aashu Virmani, chief marketing officer at in-database analytics software company Fuzzy Logix, recently explored these distinctions with Adrian Bridgwater in a recent Forbes article. “In the most simple of terms, data engineers worry about data infrastructure while data scientists are all about analysis,” Virmani states. Virmani also explored the qualities that make a good data scientist or good data engineer. Data scientists, Virmani says, “may not have a ton of programming experience but their understanding of one or more analytics frameworks is essential.” He also says that a large part of their role is hypothesis testing, but the key is letting the data tell its own story.


Is the digitization of finance making human bankers obsolete?

The future of banking also is changing the fundamental relationship between bankers and clients. Banking is primarily a relationship business, noted moderator Dan Primack, business editor at Axios. Often a human bank manager can be the driver of business based on his relationships and network, but that may be changing. So, is the digitization of finance making banking relationships less important? Michael Tannenbaum, chief revenue officer of the San Francisco-based SoFi — an online personal finance company that provides student loan refinancing, mortgages and personal loans — invoked what he called the 80/20 rule, where the majority of financial services perhaps could be solved with technology, and supplemented with high-end service from a financial services professional.


Cyberspies tap free tools to build powerful malware framework

After analyzing the way in which Netrepser's command-and-control server assigns unique tracking IDs to infections, the Bitdefender researchers believe that the attack group has compromised around 500 computers to date. The vast majority of those systems belong to government agencies and organizations, indicating that Netrepser's goal is cyberespionage, not financially motivated cybercrime. Bitdefender declined to disclose the countries whose government agencies have been targeted, but some of the spear-phishing emails sent by the cyberespionage group contained malicious Microsoft Office documents with Russian names and text. This doesn't necessarily limit attacks to Russia, because the Russian language is used in many former Soviet Union member countries.


The pitfalls of cybersecurity shopping: hype and shoddy products

Some vendors even resort to scare tactics. When Chow rejects a product pitch, salespeople often tell him he doesn’t care about his company’s security. “It’s a shame-and-guilt game,” Chow said. One CISO said that on two occasions, vendors have threatened to report his organization to the U.S. Dept. of Health and Human Services, claiming he was violating compliance regulations by not buying their security product.  The aggressive sales tactics aren't surprising. Competition among vendors has ramped up in recent years as a wave of security startups has shaken up the sector with new products promising better protection. That’s brought a flood of venture capital into an increasingly crowded market.


Do you need a chief artificial intelligence officer?

There is significant new hype around AI and ML which can undermine the productive and beneficial uses of these technologies. But artificial intelligence and machine learning are a set of methods in computational science that have been in practice benefiting businesses for many decades. For organizations exploring this role, review how it has been structured in other organizations and what has been expected (e.g. recommendation, fraud detection, image analysis and so on). Great success has come from the proper implementation of these mathematically-based methods when applied to suitable problems in the business setting. The real change in recent years has been the focus on data acquisition, cleansing and engineering which is “the food” for a great AI and ML program.



Quote for the day:


"You're not always going to be successful, but if you're afraid to fail, you don't deserve to be successful." -- Charles Barkley


Daily Tech Digest - May 06, 2017

Artificial intelligence will make or break us. Here's how we need to respond

The problem, for some, is the assumption that new technological breakthroughs are incomparable to those in the past. Many scholars, pundits, and practitioners would agree with Alphabet Executive Chairman Eric Schmidt that technological phenomena have their own intrinsic properties, which humans “don’t understand” and should not “mess with.” Others may be making the opposite mistake, placing too much stock in historical analogies. The technology writer and researcher Evgeny Morozov, among others, expects some degree of path dependence, with current discourses shaping our thinking about the future of technology, thereby influencing technology’s development. Future technologies could subsequently impact our narratives, creating a sort of self-reinforcing loop.


Mind the Gap

The sheer number of IT departments that are not acknowledging the numerous security gaps for cyber-attackers to exploit is astonishing. The problem is that many of those within the industry believe they have their security posture under control but they haven’t looked at the wider picture. The number of threats is increasing every day and as new technologies and opportunities emerge, companies need new security infrastructure to cope with the modifications of the threat landscape. Currently, C-level executives struggle to keep up with the necessity to approve budget requirements to bring their enterprise security up to the next level of protection. If companies are not up to date with the latest trends, businesses are being left more vulnerable to data breached as a consequence.


APT10’s devastating cyber attack shows anti-virus defences can't be relied on

Using meticulously-acquired data, these emails masquerade as messages from a public sector entity, such as the Japan International Cooperation Agency, for example, while the attachments are crafted to address a topic of direct relevance to the recipient. For most employees, clicking open such an attachment will be virtually automatic, activating the malware code hidden in the structure or content of the file attachment. This sophisticated malware immediately rips through networks, heading for the plans, the designs and the data that these incredibly well-resourced threat-actors want to steal. ... These solutions are not only incapable of detecting 100% of the viruses out there, they cannot detect the sophisticated threats that hackers such as APT10 now deploy inside the instruments essential to everyday business – email attachments.


Concern mounts at Indian ID scheme as portals ‘leak’ 100m people’s details

The disclosures came as part of a report entitled Information Security Practices of Aadhaar (or lack thereof): A Documentation of Public Availability of Aadhaar Numbers with Sensitive Personal Financial Information, which focuses on just four of India’s numerous government portals: The National Social Assistance Programme (NSAP): which provides supports unemployed, elderly, sick and disabled citizens; The National Rural Employment Guarantee Act (NREGA) scheme: which provides households in rural areas at least 100 days of guaranteed wage employment each year; The Chandranna Bima Scheme, Govt. of Andhra Pradesh: which provides relief to families if a worker is disabled or killed; Daily Online Payment Reports of NREGA, Govt. of Andhra Pradesh: which tracks progress and payments under the NREGA scheme.


Digital Strategy Vs. Digital Transformation: What's The Difference?

How much appetite for going digital do you have? This is where the question of digital strategy versus digital transformation comes in. The two terms are often misused, in part by being used interchangeably when they are in fact two very different things. A digital strategy is a strategy focused on utilizing digital technologies to better serve one particular group of people (customers, employees, partners, suppliers, etc.) or to serve the needs of one particular business group (HR, finance, marketing, operations, etc.). The scope of a digital strategy can be quite narrow, such as using digital channels to market to consumers in a B2C company; or broader, such as re-imagining how marketing could be made more efficient through the use of digital tools like CRM, marketing automation, social media monitoring, etc. and hopefully become more effective at the same time.


HSBC adopts cloud-first strategy to solving big data business problems

“We deliberately picked projects that were real business problems, because we didn’t want to do a meaningless proof of concept that was kind of interesting to us but didn’t really solve anything,” says Knott. “We chose those five areas because they are important, but they’re not so big that we’re betting the bank on the success or failure of these things.” Some of these use cases, such as the bank’s anti-money laundering activity, requires sifting through billions of transactions looking for suspicious activity, and the organisation wants to use machine learning models to cut down the time it takes to do this work and improve its accuracy. ... “There was a huge appetite to do this, but we also needed to satisfy ourselves that cloud is safe and secure, our regulators are happy, and all the important people are comfortable with what we are doing,” he says.


Why Log Shipping is Better than Database Mirroring for Migrations

Using log shipping, I can go straight from failover to having the database in an AG in a matter of a few seconds, not hours. The set up time will be a little more work because I’m setting up 2 secondaries (2 sets of restores) during set up time, but those can run at the same time so the difference in set up time is negligible. The big difference is I don’t have to go through the restore process for the secondary database because the databases came from the same source database, their log chains are intact, and their logs are in sync already. The failover process for this log shipping scenario does have to be performed in a very specific manner. I wrote on this process previously in my article for SQL Server Pro magazine called 3 Log Shipping Techniques back in 2011. It is actually a very simple process once you understand it.


Can Design Thinking Unleash Organizational Innovation?

To support this “fail fast / learn faster” environment, we do our preliminary data science work using small data sets (10 to 20 GB) on jazzed up laptops (running all of our favorite data management and data science tools). We do this to accelerate the “fail fast / learn faster” process. We don’t want to get hung up on spending lots of time and resources setting up a big analytic sandbox with large data sets. Just the aggregation, cleansing, aligning, transforming and enriching of large terabyte-sized data sets can substantially hinder the rapid “fail fast / learn faster” data science process. We can learn a lot about the variables and metrics that might be better predictors of business performance in a small environment before we start to operationalize the resulting data and analytics in our data lake.


The Hidden Costs of Bad Data

Data is all around us and has a profound impact on our daily lives. But what happens when we rely on bad data to make a decision? Is it as simple as arriving late to work as a result of bad directions, or does bad data have a more costly and meaningful impact on our lives? Erroneous decisions made from bad data are not only inconvenient, but also extremely costly. IBM looked at poor data quality costs in the United States and estimated that decisions made from bad data cost the US economy roughly $3.1 trillion dollars each year. Research from Experian Data Quality also found that bad data has a direct impact on the bottom line of 88% of all American companies. The averages losses from bad data was 12% of the company’s overall revenue. A Gartner Reporter also found that 27% of data in the World’s top companies is flawed.


TensorFlow, an open source software library for machine learning

TensorFlow delivers a set of modules (providing for both Python and C/C++ APIs) that enable constructing and executing TensorFlow computations, which are then expressed in stateful data flow graphs. These graphs make it possible for applications like Google Photos to become incredibly accurate at recognizing locations in images based on popular landmarks. In 2011, Google developed a product called DistBelief that worked on the positive reinforcement model. The machine would be given a picture of a cat and asked if it was a picture of a cat. If the machine guessed correctly, it was told so. An incorrect guess would lead to an adjustment so that it could better recognize the image. TensorFlow improves on this concept by sorting through layers of data called Nodes. Diving deeper into the layers would allow for more and complex questions about an image.



Quote for the day:


"Change the changeable, accept the unchangeable, and remove yourself from the unacceptable." -- Denis Waitley


Daily Tech Digest - May 05, 2017

Backdoors: When Good Intentions Go Bad

If technology can hide communications, can't technology be used in a legal and safe way to reveal critical information when people's lives are at stake? Unfortunately, the answer is that these requests for access to encrypted information creates "backdoors" that can make all citizens vulnerable to attack. A backdoor in security is a way for an entity (like the government) to access encrypted information. Protecting data using encryption involves creating an encryption key, which is the equivalent of the key to the lock on the front door of one's house. The idea of a backdoor is to provide another key so that law enforcement can enter the house if necessary. Just as the backdoor to the house will open for anyone – friend or foe – with the correct key, an encryption backdoor can make users' information accessible for both good and bad purposes.


How YouTube plans to dominate your living room

YouTube is making a bigger push and investment in the living room because it believes it can improve on-demand services, make TV more personalized and include social components that are typically missing from other providers. “The idea there is we combine the best of cable and broadcast television with YouTube,” Mohan said. “We think there’s great content out there, but we wanted to build a television experience that was truly built for this century.” YouTube's foray into the living room is also boosted by what Mohan and many others are calling “the golden age” of video content. Massive investments are being made to produce videos across multiple platforms and the choices available to viewers has grown profoundly from the three major networks that dominated television as recently as three decades ago.


Third parties leave your network open to attacks

Markus Jakobsson, chief scientist at Agari, said the one big disadvantage to working with third-party vendors is the loss of control over security. "Not only does each vendor create a new entry point into an organization’s network for cyber criminals to exploit, but it also means every employee for that vendor is now a potential target to breach your brand. ... But in today’s digital world, this isn’t a reality." Mike McKee, CEO of ObserveIT, said the lack of visibility into what users at third-party providers are doing – accidentally or intentionally – is a huge security risk. “Every organization must ensure it has identified the outside parties with access to systems and data and have secure procedures in place, strict policies for these users to follow, and effective technology in place to monitor and detect if the third parties are putting their organization at risk," he said.


Why emotional intelligence is key for project success

"Unlike IQ, EQ can evolve and can scale depending on stressors, or even positive emotional states. So it's important someone understands their emotional intelligence so they can counteract whatever might sabotage not only their progress but their teams", said Caroline Stokes, founder of Forward, a team of senior search headhunters and certified executive coaches for global innovation leaders. At Forward, emotional intelligence quotient assessments, like EQ-i 2.0, are used with talent placements and leadership and career development coaches. "We get to work on their EQ within a few weeks of starting their new role to provide awareness and strategies to drive their goals forward," said Stokes. When it comes to the process of merging two companies during an acquisition, EQ can play a vital role.


Lib Dems decry surveillance plans exposed in leaked documents

The regulations state that companies could be forced to ‘modify’ their products in order to comply with government demands, the Open Rights Group points out, adding that the powers would also limit the ability of companies to develop stronger security and encryption. Although TCNs may be challenged on technical grounds and must be approved by Judicial Commissioners, the Open Rights Group said the criteria for making a sound judgement of risk to all parties are not set out in the Act or the draft regulations, and there is there a clear route of appeal. Liberal Democrat president Sal Brinton described the proposed regulations as “a full-frontal assault” on civil liberties and people’s privacy. “This lays bare the extreme mass surveillance this Conservative government is planning after the election.


Manage colocation costs to avoid billing surprises

The colocation market continues to grow, as organizations look to meet their growing needs for compute outside of their own on-premises data centers. An expansive marketplace of providers offers a plethora of colocation services, but a strong service-level agreement between providers and users -- and understanding colocation costs -- requires more than just a handshake. IT admins who oversee the transfer of systems and workloads from inside an organization to a colocation facility have a lot of moving parts to deal with. Security, service-language agreement (SLA) jargon and, of course, budget concerns can all be a major headache. Before making the move to colocation, consult with the business side to make sure it's a good financial decision. After the move, be sure to carefully monitor, manage and optimize colocation costs.


Google Docs Phishing Scam a Game Changer

The attack tricked victims into clicking a link that gave attackers access to their Google Drive through OAuth authentication connections commonly used by third-party applications. The attackers did so by sending victims lure messages claiming to contain links to a shared Google Doc. Instead of a legit document, the link actually initiates a process to give a phony app masquerading as "Google Docs" access to the user's Google account. If the user is already logged into Google, the connection routes that app into an OAuth permissions page asking the user to "Allow" access to the user's legitimate Google Drive. "You aren't giving your Google credentials directly to the attacker. Rather, OAuth gives the attacker permissions to act on behalf of your account. You're on the real Google permissions page. OAuth is a legitimate way to give third-party applications access to your account.


Don't fear the robots, embrace the potential

“Automation is creating a polar shift in how work gets done,” says ISG partner Craig Nelson. “While in the past humans have been supported by technology, we are now seeing a shift to technology being supported by humans to manage and operate business processes. This shift is eliminating much of the mundane cut-paste-and-compare work that humans manage in the cracks between enterprise systems.” The initial response to automation improvements is typically positive, says Nelson, as the technology takes over some of the dirty work employees are eager to offload. But then the anxiety can set in. The elimination of tasks can lead to the elimination of low-level roles, says Nelson. After all, the initial business case for automation was based on eliminating work and full-time employees.


Microsoft’s novel approach to securing IoT

Project Sopris has a sensibly secure IoT stack. It starts with a hardware root of trust, similar to the one developed by the Trusted Computing Group for its Trusted Platform Module. A separate, secured computing environment, this layer creates and manages the keys needed to cryptographically secure connections between devices and servers. It also stores and manages device firmware and software. Building software for Project Sopris devices is much like building code anywhere: What’s important is how the code is stored and managed. Compartmentalizing code so that a failure in one section doesn’t compromise the rest of your software helps prevent exploits from escalating, while building security tools in every layer can reduce the risk of attacks spreading throughout the device stack.


Surface Laptop: Everything you need to know

Microsoft is aiming the Surface Laptop at style-conscious, MacBook-Air-loving college students, though many non-student users are clearly intrigued by it. The Surface Laptop’s clamshell design adds another form factor to Microsoft’s premium line of Surface products, all of which boast beautiful displays and unique features. The Surface Book is the most expensive of the family: a premium 2-in-1 laptop with a striking Dynamic Fulcrum Hinge. The keyboard base is stuffed with extra battery and, in some configurations, a discrete GPU. The Surface Pro 4 is a 2-in-1 that leans more toward a tablet, with a kickstand and the option of a lightweight keyboard. Given the Surface Laptop’s pricing, the Surface Pro 4 is now the lowest-cost product in the family.



Quote for the day:


"You move totally away from reality when you believe that there is a legitimate reason to suffer." --
Byron Katie