Daily Tech Digest - July 14, 2017

9 cutting-edge programming languages worth learning now

The world is filled with thousands of clever languages that aren’t C#, Java, or JavaScript. Some are treasured by only a few, but many have flourishing communities connected by a common love for the language’s facility in solving certain problems. There may not be tens of millions of programmers who know the syntax, but sometimes there is value in doing things a little different, as experimenting with any new language can pay significant dividends on future projects. The following nine languages should be on every programmer’s radar. They may not be the best for every job—many are aimed at specialized tasks. But they all offer upsides that are worth investigating and investing in. There may be a day when one of these languages proves to be exactly what your project — or boss — needs.


So, you want a master's degree in cybersecurity?

Carnegie Mellon University (Pittsburgh)—In 16 or 20 months, the Master of Science in Information Security enhances a technical education in computer systems and security with research/development opportunities and the option to take additional courses in areas complementary to security. Graduates may pursue doctoral degrees or positions as security experts equipped to manage the growing complexities associated with securing data, networks and systems. This graduate degree program meets the criteria for the NSF-funded CyberCorps Scholarship for Service Program (SFS). U.S. citizens who are accepted may be eligible for a full scholarship and stipend from the federal government.


Disruptive Technologies and Industry 4.0

Humankind requires an open mind to bring about Industry 4.0. The technology required by the IoT requires a healthy dose of supply and demand to survive and succeed. Good salaries and plentiful employment provide consumers with money to spend on things they want. Rewarding and encouraging the development of technology and creativity brings about the advancement. The good news is that this action is already in place around the world. Manulife’s Lab of Forward Thinking (LOFT), located in the thriving areas of Singapore, Toronto, and Boston, builds competitive advantages within the financial services industry. Employees are encouraged to use technologies like artificial intelligence (AI) to determine new solutions for building wealth and prioritizing customer needs.


Singapore unveils first look at new cybersecurity laws

CSA Chief Executive David Koh noted that the country's current legislation, the Computer Misuse and Cybersecurity Act, focused primarily on cybercrime. A more multi-faceted bill was necessary to oversee a cybersecurity landscape that continued to evolve, Koh said. Amongst the proposed bill's key components was a regulatory framework targeted at CII owners, which formalised the duties of such providers in securing systems under their responsibility, including before a cybersecurity had occurred. The bill would detail CII owners' responsibilities, which would include providing information on the technical architecture of the CII, carrying out regular risk assessments of the CII, complying with codes of practice, reporting of cybersecurity incidents "within the prescribed period" after the event.


Why Resilience Is Necessary As A Leader

Perhaps we think of resiliency from a personal perspective. When we think of resiliency, the image comes to mind of a person who just completed an ultra-marathon with two prosthetic legs. We do not think of a leader who went through a grueling year and came out a better leader. While personal resiliency is important, it is a critical component of effective leadership. The true grit of a leader is not how they perform during the good times but rather how they display emotional strength, courage and professionalism during the most trying times. It is impossible to demonstrate resilience unless you have gone through difficult times. For example, a leader who leads a team during a time of leadership transition, through a period of high turnover, through an organizational restructuring or through a season where surveys revealed poor performance.


8 keys to DynamoDB success

While DynamoDB generally works quite well, it’s inevitable that we all run into issues. A few months ago at Segment, my colleagues wrote a detailed blog post about our own DynamoDB issues. Mainly, we were hitting our rate limits due to problems with our partitioning setup – a single partition was limiting throughput for an entire table. Solving the problem took a superhuman effort, but it was worth it ... In DynamoDB, read throughput is five times cheaper than write throughput. If your workload involves a lot of writes, see if you can read the data first to avoid updating in-place. Reading first will help avoid throttling and cut your bill in a write-heavy environment where keys may be written multiple times.


Transforming the PMO into an SVMO to Drive Software Value

The PMO for software development is typically focused on planning, implementing, monitoring, and controlling projects. It often serves as the “bad guy” informing management about missed deadlines and keeping the staff on task, ensuring they are following the standard processes as they were defined. ... So, I am certainly not saying that they should be eliminated but I am saying that it’s necessary to focus on more than what has historically been done. I believe the PMO needs to be transformed into more of a strategic partner within the organization, focusing on optimizing process to maximize value flow and measure value rather than just standardizing process to improve efficiency and measure compliance and, consequently, being repositioned as a Software Value Management Office (SVMO).


Who Is A Target For Ransomware Attacks?

“There are a wide variety of ransomware types, but one thing is certain,” says Morey Haber, vice president of technology for BeyondTrust, which offers a privileged access management platform. “No vertical, government, or organization is immune to its effects. Unfortunately, some are more susceptible to successful attacks, based on the type of technologies they deploy, their age, cost for replacement, identity governance and privilege maturity, and overall cyber security hygiene implementations regulated by government or third-party compliance initiatives.” ... it’s never been more important to protect your organization. Here’s a look at who the usual ransomware targets are today and are likely to be in the near future, why they’re targets, and best practices for protecting your data.


Verizon Breach: 6 Million Customer Accounts Exposed

The data exposure was discovered by Chris Vickery, a researcher with the cyber risk team at security vendor UpGuard. The data was contained in an unsecured Amazon Web Services Simple Storage Service (S3) "bucket," or storage instance, Dan O'Sullivan, a cyber resilience analyst at UpGuard, writes in a blog post. Israel-based NICE Systems, one of Verizon's partners, controlled the repository. Verizon says in its statement that NICE was supporting "a residential and small business wireline self-service call center portal and required certain data for the project." UpGuard notified Verizon on June 13 about the data exposure, but the bucket wasn't locked down until June 22. UpGuard characterized that length of time as "troubling." Officials at NICE couldn't immediately be reached for comment.


Companies must hire a CISO to address cyber threats at the executive level

The office of a CISO is a structure you put in place to help your organisation deliver a continually relevant response to cyber risk. You want your CISO to have an impact, you want to see processes challenged and informed consensus with business units achieved, you want to see tweaks to staff behaviours, as well as to the technical environment. You want your customers to have trust in your organisation. You want your suppliers to be vigilant against the potential impact on you if they don't hold up their end. Cyber risk management is not static and there absolutely is no finish line. As your organisation continues its search for pragmatism in approaching cyber risk, you'll want your CISO to be supported in their role, both with their own team as well as senior executive sponsorship because their success is your organisation's digital wealth protection.



Quote for the day:


"Be willing to make decisions. That's the most important quality in a good leader." -- General George S. Patton, Jr.


Daily Tech Digest - July 13, 2017

What are the differences between Office 2016 and Office 365?

Think of Office 2016 as traditional software made and sold in traditional ways. That holds for servicing, too. Microsoft provides monthly security updates for Office applications, usually on the second Tuesday of each month, and also fixes non-security bugs for the first five years of the SKU's lifecycle. But Office 2016 does not receive upgrades with new features and functionality. What you get when you buy the suite, feature-wise, is it. When Microsoft produces a new edition, which it will eventually do, you will need to pay another up-front fee to run that. Office 365, on the other hand, has a completely different servicing model. While the Office applications licensed to users through Office 365 receive the same security patches distributed to Office 2016, they also acquire new features and functionality on a twice-a-year schedule.


Machine Learning, Artificial Intelligence, and Robo-Advisers: The Future of Finance?

One issue relating to neural network–based machine learning–enabled AI applications in investment management is one familiar to readers of this blog and its posts on market structure, high-frequency trading, and algorithmic trading. The black-box issue, in which the workings of an algorithm are not understood by its user or other stakeholders and lead to potentially unintended actions or consequences, is a well-known headache for regulators trying to ensure market stability. Although some attempts have been made to check the source code of algorithmic traders, the most effective protection against algorithmic errors are circuit breakers on markets that limit the amount of damage a failing algorithm can cause.


Next WannaCry attack could cost insurers $2.5B

“Sooner or later we, will see a billion-dollar cyber claim and the insurance market is well positioned to absorb that,” said Thomas Seidl, an analyst at Sanford C. Bernstein in London. “Everybody has exposure to cyber risks and the best precaution can’t eliminate that, so there is a strong demand for insurance making cyber coverage by far the biggest opportunity for non-life insurers for the next years.” ... With cyber coverage growing rapidly and insurers increasingly seeing the segment as their next blockbuster, regulators are concerned that the industry could be taken by surprise. Insurers writing cyber policies “are expected to introduce measures that reduce the unintended exposure to this risk,” the U.K.’s Prudential Regulation Authority said in a statement on Wednesday.


What Is Hyper Convergence?

Hyperconverged platforms include a hypervisor for virtualized computing, software-defined storage, and virtualized networking, and they typically run on standard, off-the-shelf servers. Multiple nodes can be clustered together to create pools of shared compute and storage resources, designed for convenient consumption. The use of commodity hardware, supported by a single vendor, yields an infrastructure that's designed to be more flexible and simpler to manage than traditional enterprise storage infrastructure. For IT leaders who are embarking on data center modernization projects, hyperconvergence can provide the agility of public cloud infrastructure without relinquishing control of hardware on their own premises.


Businesses warned of insider cyber threat

"Too many people are chasing shadows, it's an education process, teaching them not to open suspicious emails and so on, but even CEOs open their own emails. There's all kind of scams out there but they are people scams, not technology scams." For executives worried about the impact of insider threats within their organisations, the Federal Attorney General's department last year amended its 'Managing the insider threat to your business' publication to provide guidance for managers. Key to the Federal Government's advice is to have rigorous recruitment procedures including properly checking references, watching for changes in staff behaviour and maintaining internal access and security controls on data. Mr Meyer said organisations should also focus on monitoring behaviour on their networks to get early warning of untoward activity.


A cloud in your datacenter? Azure Stack arrives

The business model around Azure Stack is an interesting one, using subscription pricing much like Azure. You can pay per hour or per month, with a Base VM charge of $0.008/vCPU/hour or $6/vCPU/month). Like Azure, on top of a Base VM host, you can use your existing Windows Server or Linux licenses. If you don’t have any licenses, then a Windows Server VM comes in at $0.046/vCPU/hour or $34/vCPU/month. There’s similar pricing for storage and for the Azure App Services, all based around vCPU usage. As expected, it’s cheaper than Azure’s pricing for similar features, but here you’re paying for the hardware yourself, and that’s not going to come cheap. Getting used to a subscription fee for your on-premises usage is going to be the biggest change to using Azure Stack.


Salesforce brings digital transformation to field workers with AI, analytics tools

While customers have benefitted from company digital transformation efforts, field technicians often still find it difficult to deliver a modern, onsite experience, said Mary Wardley, program vice president, customer care and CRM at IDC, in the release. "Customer expectations have escalated across the board, and so have expectations for in-the-field diagnostics and issue resolution," Wardley said in the release. "With features including image recognition, automated equipment tracking and analytics baked into the field service process, digital transformation is reaching the field and will enable companies to run their field service organization faster and more efficiently." In terms of availability, Field Service Equipment and Inventory Management can be purchased today with any Field Service Lightning license, which start at $150


What IT Workloads Say About Your True Priorities

The survey found that IT pros enjoy modernizing technology, troubleshooting or assisting users and planning or strategizing. However, respondents estimated that they spend, on average, only 11 percent of their time on “IT planning and strategy,” and 13 percent on “modernizing technology.” While day-to-day issues in IT will never go away — there will always be hardware to deploy, software to update and help desk tickets to attend to — there are ways you can ease some of the grunt work in IT. “The secret here is to identify and automate those time-consuming, repetitive tasks that are sapping your organization’s ability to focus on more business-critical issues and find ways to automate them,” says Peluso.


5 Privacy Worries on 4 Wheels: Staying Safe in the Connected Car Era

As modern vehicles are upgraded to include Internet-enabled technologies designed to access, store, and transmit data for entertainment and safety purposes, consumers are presented with a double-edged sword. On one hand, these connected systems provide important convenience benefits for consumers, but on the flip side, motor vehicles are being exposed to a growing number of security and privacy risks. As the market for connected cars continues to grow (an estimated $155 billion by 2022) and more semi-autonomous vehicles roll off assembly lines, the severity of security and privacy threats rises exponentially, becoming major concerns for both car buyers and manufacturers. Here are five of the top privacy issues associated with connected motor vehicles


Quantum fiber network to launch in August

“This is a major step toward building a global long-haul and truly-secure satellite communication network,” it said in a press release yesterday. Lasers are expected to play an important part in future satellite constellations partly because currently used radio frequency bands are congested. Light will allow transmissions to be more efficient, with lower power, and thus allow smaller and cheaper satellites. A major part of that new satellite communications technology will be the securing of it. Distance, however, has been a problem area for QKD development in general. While conceptually the subatomic communicating particles that make up the warren of entangled keys affect each other wherever they are in the stream, they actually dilute over distance—just as any other medium. Scattering takes place, for example.




Quote for the day:

Remember the difference between a boss and a leader; a boss says "Go!" - a leader says "Let's go!" -- E.M. Kelly


Daily Tech Digest - July 12, 2017

10 Principles for Leading the Next Industrial Revolution

If your company is falling into the trap of thinking that it can make money indefinitely by following its traditional business model, it risks losing out to more flexible competitors. You are not in the same industry that you were in before; soon, that industry may not even exist. Your path to profitability is different. Your opportunities for raising capital have changed. Your capabilities may not apply to the same customers they did before. Your circumstances are probably different from those of any other company, so you need to look freshly at them, without relying on an industry playbook, and rethink your business model accordingly.


Ensure a load-balancer failover in a virtualized environment

The key to modern load-balancer options is operational agility. Today's workloads are dynamic, with daily load variations and frequent spikes. Load balancing needs to recognize this and must extend beyond fixed asset control and handle virtual instances of applications. Virtualization has opened up a new universe of capabilities for balancing. Efficiency improves tremendously when the balancer can increase and decrease the number of instances of a given application. There is no longer a fixed amount of horsepower or a set number of servers. The dynamic range of the resource pool can go as low as a single instance or as high as the whole server cluster. To take advantage of this dynamic range, the balancer must tie in to the cluster's orchestration software. Enable instance control so that the balancer receives additional responsibilities.


General Electric Builds an AI Workforce

The technology depends on artificial intelligence to continually update itself. What’s more, if data is corrupted or missing, the company fills in the gaps with the aid of machine learning, a type of AI that lets computers learn without being explicitly programmed, says Colin Parris, GE Global Research’s vice president for software research. Parris says GE pairs computer vision with deep learning, a type of AI particularly adept at recognizing patterns, and reinforcement learning, another recent advance in AI that enables machines to optimize operations, to enable cameras to find minute cracks on metal turbine blades even when they are dirty and dusty. Take the tiny robot, a little bigger than a Matchbox car, used to inspect working engines. Using computer vision and a variety of AI techniques, the bot can look for cracks inside plane engines by riding on top of a slowly moving fan blade.


From privacy to AI, the new trends set to change the world

Terence Eden, open standards lead at Government Digital Service, drew on the general stasis seen in mobile hardware to highlight a need for refinement. “We’ve reached an inflection point where things are good enough,” he said. “If we look at the big sellers at the moment, it’s stuff that’s plateau-level. People have reached a level where they are happy – apart from with their battery life, of course.” For such big sellers to thrive, however, it’s key that they open up, said Accenture managing director and go-to-market lead George Marcotte: “Businesses have a choice between continuing with the internal, closed-shop practices of the past, or opening their innovation capabilities to an entire ecosystem of innovative partners.”


UK firms still relying on perimeter defences for cyber security

“As a security professional, it feels like I’ve been saying forever that basic perimeter security measures are no longer enough,” said Joe Pindar, director of data protection product strategy at Gemalto. “So it’s worrying to see the UK is continuing to place ultimate faith in these systems, without thinking about what attackers actually want – their data,” he said. Without a switch in mentality, and starting to protect the data at its source with robust encryption and two-factor authentication, Pindar said the UK is like one of the three little pigs. “Unfortunately, the one sitting in the straw house – not realising that when the time comes, passwords and perimeter security alone will not stand up to attackers,” he said.


How an IoT DDoS warning system helps predict cyberattacks

Distributed Denial of Service (DDoS) attacks require very little effort from cybercriminals and yet inflict maximum damage on the targeted victim, preventing them from sending or receiving any digital traffic. While preventative measures are available, the options are a costly gamble to already cash-strapped small- or medium-sized organizations and businesses. Current DDoS attacks typically employ amplification methodology (PDF), in which bad-guy-owned servers coerce vulnerable remote computing devices into multiplying many times over the incoming requests that are then sent to the targeted computing environment with the intent of knocking it offline—imagine the amount of money a gambling web portal would lose on Super Bowl Sunday if those wanting to bet were unable to reach the portal.


Middle East cybersecurity: Is region's big spend aimed at the right targets?

Research and Markets notes that across these sectors, the key drivers for this increased outlay are factors such as the "need to mitigate IT security risks and threats, including malware, ransomware, and advanced persistent threats, along with a rising enterprise mobility trend across organizations". Across the region, investment in cybersecurity is projected to grow at an average 14.2 percent compound annual growth rate over the next five years, with Saudi Arabia expected to be the largest national market. Qatar, which is currently embroiled in the diplomatic and economic fallout from an alleged Russian-led cyberattack, is predicted to be the fastest-growing market for cybersecurity in the region, as it gears up for hosting the FIFA World Cup in 2022.


How to get started with Kubernetes

Kubernetes is available as a standard-issue item in many clouds, though it appears most prominently as a native feature in Google Cloud Platform (GCP). GCP offers two main ways to run Kubernetes. The most convenient and tightly integrated way is by way of Google Container Engine, which allows you to run Kubernetes’s command-line tools to manage the created cluster. Alternatively, you could use Google Compute Engine to set up a compute cluster and deploy Kubernetes manually. This method requires more heavy lifting, but allows for customizations that aren’t possible with Container Engine. Stick with Container Engine if you’re just starting out with containers. Later on, after you get your sea legs and want to try something more advanced, like a custom version of Kubernetesor your own modifications, you can deploy VMs running a Kubernetes distro.


MoJ electronic monitoring programme fails to achieve value for money

“There is still limited evidence on the effectiveness of electronic monitoring in the UK,” it said, adding that the ministry’s bespoke requirements for the tags were too ambitious. “Over time, the Ministry evolved some 900 prescriptive requirements for the new combined RF and GPS tags. They would have to store and send much more location data than existing tags in the market, meet higher data security standards, and prove reliable and robust,” the report said. “They also had to be compact enough to wear comfortably, and not require continual recharging.” ... During the project it also became clear that the contracts didn’t specify who would provide the electronic link to transfer data between the old tags and a central data centre. “It only became clear after the contracts were signed that no party had made plans to build the link.


Mobile DNUN: Danger Notification and User Navigation

Mobile applications are growing in quantity and quality; for example, the Yelp mobile application was an early location-aware communication technology9. Network providers such as T-Mobile, Verizon Wireless, and AT&T offer geolocation application services for their devices. Furthermore, these devices' operating systems (iOS, Android, RIM, and so on) enable software designers to develop various applications using software development kits (SDKs). This has led to an obvious evolution in LBS, with applications such as Foursquare, Yelp, Glympse, and so on. However, finding someone's location can be challenging during an emergency. Moreover, it is difficult to determine the location of an object such as a car in a parking lot if you forget where you've parked it. Our Danger Notification and User Navigation (DNUN) mobile application lets users effectively locate a human or object.



Quote for the day:


"No man will make a great leader who wants to do it all himself or get all the credit for doing it." -- Andrew Carnegie


Daily Tech Digest - July 11, 2017

The Future of Digital Business is Self-Improving Products

That’s a lot of what digital business is all about — turning data into better products and services. But Tesla is taking things to a whole new level. The data from every car is sent to headquarters and shared with every other car on the road. So your car knows what to look out for even if you’ve never been on that street before. Tesla has essentially turned itself into a massively parallel learning machine. The Tesla customer experience improves automatically the more people use the products. And the company is gathering detailed information that can be used for many of other business opportunities. That’s perhaps why Tesla is now the most valuable US car company, eclipsing General Motors, even though GM makes over one hundred times as many cars.


NIST to security admins: You've made passwords too hard

NIST recommends administrators leave out overly complex security requirements that make it harder for users to do their jobs and don't really improve security, since frustrated users are more likely to look for shortcuts. For example, users struggle to memorize large numbers of passwords—the average user accesses more than 40 accounts—so they may either write down passwords, which defeats the purpose of having a "secret" password; reuse passwords, which makes it easier to break into accounts; or use variations of existing passwords, which makes it easier for attackers to guess the patterns. "The username and password paradigm is well past its expiration date," said Phil Dunkelberger, CEO of Nok Nok Labs. "Increasing password complexity requirements and requiring frequent resets adds only marginal security while dramatically decreasing usability.


Digital is Driving Transformation in the Financial Sector

What’s certain is that the pressure on financial institutions is mounting to adapt the way they deliver services to customers. The ubiquity of smartphones, laptops and tablets and shifting consumer habits are driving banks to be creative in how they differentiate. In a market where transactional services are becoming increasingly commoditized, many are seeking to redefine the customer experience as a point of competitive differentiation. Given the vital role of digital maturity, we examine five tenets of digital transformation in the banking and financial sector. ... Everywhere you look there is feedback, potentially valuable snippets of information about your business and how it might improve. The challenge financial firms face is channeling that feedback intelligently, i.e. gathering it, analyzing and extracting value from disparate pieces of data.


GraphQL vs REST: Overview

GraphQL is a query language, specification, and collection of tools, designed to operate over a single endpoint via HTTP, optimizing for performance and flexibility. One of the main tenants of REST is to utilize the uniform interface of the protocols it exists in. When utilizing HTTP, REST can leverage HTTP content-types, caching, status codes, etc., whereas GraphQL invents its own conventions. Another main focus for REST is hypermedia controls (a.k.a HATEOAS), which lets a well designed client run around an API like a human runs around the Internet; starting with a search for "How to complete my tax returns", reading a perfectly relevant article, and after a few clicks ending up on BuzzFeed article about Miley Cyrus throwing Liam Hemsworth a "Weed-Themed" birthday party.


Apache Flink: The Next Distributed Data Processing Revolution?

The Hadoop framework is capable of storing a large amount of data on a cluster. This is known as the Hadoop File System (HDFS) and it is used at almost every company which has the burden to store Terabytes of data every day. Then the next problem arose: how can companies process all the stored data? Here is where Distributed Data Processing frameworks come into play. In 2014, Apache Spark was released and it now has a large community. Almost every IT section has implemented at least some lines of Apache Spark code. Companies gathered more and more data and the demand for faster data processing frameworks is growing. Apache Flink (released in March 2016) is a new face in the field of distributed data processing and is one answer to the demand for faster data processing frameworks.


Why the Blockchain Needs More Failures to Succeed

In the world of startups, learning from failures is an inescapable reality, and part of the prevalent conventional wisdom. That is how the ecosystem and entrepreneurs move forward to greater heights, and with more successes. But in the burgeoning blockchain segment, we haven’t seen that many failures yet. At least, not of the scale and variety required to extract long-lasting lessons for the entire industry. And certainly, not enough to warrant a call for an imminent crash or correction. Failures are important because their sum results in a new body of knowledge that is rich with useful insights and best practices. An aftermath of real failures can make the whole blockchain ecosystem more resilient, because it will result in revealing the boundaries and realities of what’s possible, useful, absurd, impossible, repeatable and scalable


Big Data's Potential For Disruptive Innovation

Disruptive innovations are: More accessible (with respect to distribution or usability); Cheaper (from a customer perspective); And utilize a business model with structural cost advantages (with respect to existing solutions) than their existing counterparts in the market. The reason why the above characteristics of disruption are important is that when all 3 exist, it is very difficult for an existing business to stay in competition. Whether an organization is saddled with an outmoded distribution system, highly trained specialist employees or a fixed infrastructure, adapting quickly to new environments is challenging when one or all of those things become outdated. Writing off billions of dollars of investment, upsetting the distribution partners of your core business, firing hundreds of employees – these things are difficult for managers to examine, and with good reason.


Hackers Find ‘Ideal Testing Ground’ for Attacks: Developing Countries

“India is a place where newer A.I. attacks might be seen for the first time, simply because it is an ideal testing ground for those sorts of attacks,” said Nicole Eagan, the chief executive of Darktrace. At times, these attacks are simply targeting more susceptible victims. While companies in the United States will often employ half a dozen security firms’ products as defensive measures, a similar company elsewhere may have just one line of defense — if any. In the case of attacks carried out by a nation-state, companies in the United States can hope to receive a warning or assistance from the federal government, ... Cybersecurity experts now speculate that a February 2016 attack on the central bank of Bangladesh, believed to have been carried out by hackers linked to North Korea, was a precursor to similar attacks on banks in Vietnam and Ecuador.


Common Misconceptions Found in the World of IoT

A lot of people believe that IoT is only related to collecting data, something along the lines of Big Data. This has often been fueled by the fact that IoT is commonly used along with Big Data. However, IoT is not only limited to collection of data. It is actually related to the exchange of data between devices and how they are connected to the internet. These devices can include any electronics or gadgets that fall under the smart category, some of them in the consumer product section such as TVs, fridges, etc. However, it is not only limited to these categories, but can expand to other sectors such as cars, smart grids, power plants, and so on. ... people believe all IoT devices are safe or rather they underestimate that the devices can be unsafe. IoT devices are often insecure, because of their need for constant connection to the internet making it vulnerable for hacking if the network is hacked as well.


Where’s the value in big data?

Increased revenue will be yours, competition will disappear and customers will love you even more. And yet, the reality is not matching the hype. ‘How do I really drive value from big data’? is a question that needs to be fully answered. Frustration seems to be building and there’s a danger that disillusionment will set in. But it doesn’t have to be this way. There is a route to driving value but you have to be realistic and you have to be methodical in your approach. You also have to start by recognising that, in reality, there are only three kinds of big data projects. The first is simply focused on replacing aging traditional infrastructure; in effect to re-platform an environment and make it fit for purpose in today’s economy – let’s call this the makeover.



Quote for the day:


"You have to put in many,many, many tiny efforts that nobody sees or appreciates before you achieve anything worthwhile." -- Brian Tracy


Daily Tech Digest - July 10, 2017

Big Data Algorithms, Languages Expand

In some ways, the algorithms are anticipating tomorrow’s hardware. For example, quantum algorithms are becoming hot because they “allow you to do some of what quantum computers would do if they were available, and these algorithms are coming of age,” said Anthony Scriffignano, chief data scientist for Dun & Bradstreet. Deep belief networks are another hot emerging approach. Scriffignano describes it as “a non-regressive way to modify your goals and objectives while you are still learning — as such, it has characteristics of tomorrow’s neuromorphic computers,” systems geared to mimic the human brain. At Stanford, the DeepDive algorithms developed by Chris Ré have been getting traction. ... “Much of existing data is un- or semi-structured. For example, we can read a datasheet with ease, but it’s hard for a computer to make sense of it.”


The Evolution of Project Management

Project management should be viewed as a tool that helps organisations to execute designated projects effectively and efficiently. The use of this tool does not automatically guarantee project success. (project success will be discussed in a subsequent issue). However, in preparation for the next issue, I would like you to think about the distinction between project success and project management success. This distinction will provide further insight to the questions: Why are some projects perceived as failures when they have met all the traditional standards of success, namely, completed on time, completed within budget, and meeting all the technical specifications? Why are some projects perceived to be successful when they have failed to meet two important criteria that are traditionally associated with success, namely, not completed on time and not completed within budget?


Artificial Intelligence Processing Moving from Cloud to Edge

Edge or device-based processing of AI algorithms is something that has been difficult until now because of the large processing needs, and the limitations on power consumption. Running NVIDIA’s Pascal GPU consumes hundreds of watts, which can be addressed by cooling mechanisms in a data center, but on a mobile or car that would be unthinkable. However, we are beginning to see several trends that suggest edge-based processing for AI algorithms is starting to happen. This is being pushed at one level by the hyperscalars themselves who are aware of privacy concerns, and want to enable real-time device-based AI training or inference. At the same time, startups are also coming up with innovative ideas, while hardware startups are developing custom solutions for embedded AI applications. Both software and hardware approaches are feeding into the edge-based processing for AI.


The Data Quality Tipping Point

Data quality processes involve a range of costs, from the cost of data quality software to the resource needed to integrate systems. We recommend that every business carries out a review, prior to implementing new data quality measures. It needs to weigh up the points we looked at in the last section: negative effects of inaction, vs expense of throwing the entire budget at bad data. Additionally, the business needs to look at the way it’s using data, and figure out how to improve management internally. That might mean reducing manual touch points, so there’s less human error. Or retraining staff so they don’t type garbage into fields. Finally, let’s be realistic. The cost of the new data quality process needs to be factored into the business’ budget, like any other production cost.


Banks face variety of risks outside of their control, regulator says

"Many banks have increasingly leveraged and become dependent on third-party service providers to support key operations within their banks. Over time, consolidation among service providers has resulted in large numbers of banks (becoming) reliant on a small number of service providers," according to the regulator. It added that that can create "concentrated points of failure for certain lines of business or operational functions for a large segment of the banking industry." Banks also could run the risk of falling afoul of multiple new or amended regulations in lending and real estate, because their vendors are not aware of regulatory changes, the OCC said. Banks may rely on outside firms or software to process loan applications, underwrite or close loans, which could open them to challenges in complying with the new regulations.


7 Lethal Threats To Your Business That Come From Inside

The challenge for most small or tightly held businesses is that it can take 5-10 years to groom a successor to take over the business. Because of that you can't wait until you need to have a succession plan in place and you can't rely on just one person to be the potential successor. You need to constantly be thinking about, looking for, and grooming candidate successors. I can't tell you the number of businesses I've be involved in where the founder, and the business, just end up being stuck with no option but to liquidate or sell, and often for a huge loss in potential value. If I could give you one piece of advise here it would be to wake up every day asking, "If something happened and I could no longer run this business, how would it survive?" If you can't answer that I wouldn't worry much about waking up because I'd have too much trouble even getting to sleep!


CopyCat malware infects 14M Android devices

Significantly, CopyCat steals credits earned by legitimate advertisers whenever one of their ads results in an application download. The malware accomplishes this by swapping out the ad company's real referrer ID with a fraudulent one. These credits are ultimately exchanged for revenue. According to Check Point researcher Daniel Padon, this technique has never been seen before, and is more lucrative than traditional ad fraud. "There are many efforts by ad networks to detect and stop fraud from happening and this is actually a... way to do it without being detected," said Padon, in an interview with SC Media. "You have to be on the device itself [and monitoring] device activity to understand that fraud has actually taken place." Otherwise, the ad transaction "will look like a legitimate one from end to end."


Connecting the dots in the hybrid data management arena

The name of the game is speed, and this platform provides real-time analytics for applications like fraud detection in real-time transactional data streams (banks) and real time personalised offers to customers in stores. In the interview, the Actian executive team ran through a number of case studies, where hybrid data management helped run and improve operations. ... The phenomenon here that we see is businesses trying to drive these applications – these pieces of data is now flattened across the organisation – no longer present in one single large repository deep in the enterprise, but they come from a number of different places really spread across the enterprise. It’s now incumbent on the company/companies that claim that want to profit from this information to be able to extract it, process it and analyse it from these multiple sources in multiple formats to really drive some of these insights.


Data is the fuel and analytics the engine of new economy

Defining analytics as a “multi-disciplinary approach to deriving insights from data,” he said there are different degrees of analytics, starting with descriptive analytics in which you look at historical data to find out what is going on in an organization, what has happened, and what can be learned from that data. The next step, he noted, is predictive: what will happen? Can I forecast the future? “When we get into the predictive space, analytic techniques become more advanced,” he said. ... “However, AI and machine learning have become such buzzwords that many different things get lumped under them. At SAS we try to delineate these areas clearly and have a good understanding of what we mean by deep learning or AI. My calculator is better at arithmetic than I will ever be, but it’s not AI,” he said.


Desperately Seeking Security: 6 Skills Most In Demand

"There’s definitely a talent shortage of quality information security professionals who are capable of solving emerging problems," says Lee Kushner, president of cybersecurity recruiting firm LJ Kushner & Associates. "It’s not a shortage of general skill or average skill, it’s a shortage of skills that can help companies solve their problems." As the industry starts to look at the problem, it'd best start putting a finer point on the types of skills most in demand rather than fixating on one overarching security deficiency. "The problem is more granular than 'look at all the open jobs,'" says Mike Viscuso, CTO and co-founder of Carbon Black. According to the most recent research, the following specialties and skills are the ones that hiring managers are having the hardest time plugging into their teams.



Quote for the day:


"Leadership is like beauty; it's hard to define, but you know it when you see it." -- Warren Bennis