Daily Tech Digest - September 11, 2017

Functional Risks: Adapt or Die

The security function within an organization is one of the most misunderstood parts of an organization and I tip my hat those that recognize the benefits of a finely tuned security function. For those in a security function, the following is not something new, but rather an affirmation that a competent, proactive security leader(s) can wear many hats in an organization in support of their objective of preventing threats to organizational assets, and moreover responding to events with the goal of minimizing the recovery time and impacts to the organizations brand and image. Beyond the multi-disciplinary responsibilities that a security leader has, they will be the person that everyone in the organization will seek guidance and direction from during a crisis.


More artificial intelligence, fewer screens: the future of computing unfolds

In the survey, 79% of executives agree that AI will help accelerate technology adoption throughout their organizations. ... The Accenture authors cite a prime example of where AI is making its first inroads into enterprise UI and UX: voice-activated systems. "Advances in natural language processing and machine learning make technology more intuitive to use, like telling virtual assistants to schedule a meeting instead of accessing scheduling software to find a time, create an event,and type the details," they state. "AI already plays a variety of roles throughout the user experience. At the simplest level, it curates content for people, like the mobile app Spotify suggesting new music based on previous listening choices. In a more significant role, AI applies machine learning to guide actions toward the best outcome."


Evolving Threat from Botnets, IoT Zombies

Today there are vibrant online marketplaces where just about anyone—even those with very limited technical knowhow—can buy tools to execute an attack. Cryptographic currencies enable untraceable digital payments, while old-fashioned economics is driving the growth of these marketplaces. Demand for services now outpaces supply, and DDoS-as-a-Service providers can bring in more than $100,000 annually. Purchasing an attack can be surprisingly inexpensive. On the Clearnet, for as little as $19.99 a month, an attacker can run 20-minute bursts for 30 days utilizing a number of attack vectors like DNS, SNMP, SYN and slow GET/POST application-layer DoS attacks. All an attacker has to do is create an account, select a plan, pay in Bitcoin and access the attack hub to target the victim by port, time and method.


A damaging spring of internet worms and poor performance

In what threatens to become an unpleasant trend, uninsured disruptions and other business fallout from these attacks are increasingly cited as key factors in disappointing earnings reports. Cybersecurity is becoming a ratings boon for CNBC and other media outlets that report on stock markets and financials. More than a few security professionals are feeling the heat, however, as the industry is forced to take a closer look at the up-leveling of age-old deployment methods, like spear-phishing emails and internet worms, which don't require human interaction to spread. What else could go wrong? Plenty. With HTTPS deployments on the rise, researchers from top universities and technology companies like Google have joined forces to document growing concerns about the risks associated with traditional man-in-the-middle defenses using Transport Layer Security (TLS) interception.


Disinformation as a service? DaaS not good!

The computer-enhanced disinformation campaigns launched by Russia and others are fairly crude, and the effort to cover their tracks limited. The future of disinformation is likely to be much more sophisticated and harder to defend against. Disinformation is rapidly going multimedia, for example. Advances in A.I. and CGI will enable convincing audio and video that can make it appear that anyone is saying or doing anything. University of Washington researchers used A.I. to create a fake videoshowing former president Barack Obama saying things he never actually said. And Stanford researchers developed something they call Face2Face, which creates real-time faked video, so basically anybody can be shown to say anything in a live video chat. These techniques aren't perfect. But given time and better technology, they will be.


Why Microsoft will drive serious Linux innovation

Even so, given just how dependent Microsoft increasingly is on Linux, it’s time for the company to not just innovate around the edges of the Linux ecosystem but to start contributing directly to the Linux kernel, commensurate with the value it derives therefrom. Ten years ago, Microsoft couldn’t do this without suspicion. Today, this is what we expect of Microsoft. Microsoft seems to understand this  ... Without fanfare, Microsoft has started hiring Linux kernel developers like Matthew Wilcox, Paul Shilovsky, and Stephen Hemminger. Hemminger’s hire is particularly interesting not only because he’s considered one of the big-time kernel developers, but also because it was he back in 2009 who called out Microsoft for violating the GPL in its Hyper-V code.


Researcher publicly discloses 10 zero-day flaws in D-Link 850L routers

Peeved about previous vulnerability disclosures experiences with D-Link, a security researcher has publicly disclosed 10 zero-day vulnerabilities in D-Link DIR 850L wireless AC1200 dual-band gigabit cloud routers. Security researcher Pierre Kim opted to publicly disclose the vulnerabilities this time, citing a “very badly coordinated” disclosure with D-Link in February; that time around he had reported nine vulnerabilities, but he said it took D-Link five months to release new firmware which ended up patching only one the flaws he found. Overall, Kim thinks D-Link 850L routers are “badly designed” as “basically, everything was pwned, from the LAN to the WAN. Even the custom MyDLink cloud protocol was abused.”


How Network Automation Can Speed Deployments And Improve Security

Traditionally, network provisioning and configuration management are manual, error-prone processes. Network virtualization enables the creation of networks in software, abstracted from the underlying physical hardware. IT can provision networks quickly, with network and security services attached to workloads using a policy-driven approach. Automation takes things to the next level; network functions, including managing bandwidth, load balancing, and performing root cause analysis, are provisioned automatically based on predefined policies. To eliminate the network bottleneck at the University of New Mexico, it deployed VMware’s NSX network virtualization platform and vRealize Automation cloud automation software.


Modernization boosts cybersecurity anxieties, survey says

The chaotic nature of IT transformation may also be a factor, as agencies attempt to simultaneously operate in two worlds: the old IT environment and the new. Tony Sager, senior vice president at the Center for Internet Security, said it's already challenging for federal IT leaders to meet the regulatory reporting requirements of the status quo without the "trauma" that comes from most large scale IT transformations. "Where I see people stressed is if they see old requirements they're stuck dealing with while trying to change the IT infrastructure at the same time," said Sager. Of those who said their security issues have increased, more than half (53 percent) cited their IT staff's difficulties supporting and completing the transition from old technologies to new. Increased compliance reporting was the second-most frequently cited reason


How to detect preinstalled malware in custom servers

Super Micro designs and assembles server components, such as network cards, storage interfaces and CPUs. For the Super Micro operating system to run on modern systems, it interfaces with the BIOS and firmware and, many times, the BIOS and firmware include significant functionality. These tools could be from an additional third-party contracted by the manufacturer. The BIOS and firmware may need to be updated, and can still be compromised. Despite being custom servers, many of the server's components are similar to that of mass market servers, and Super Micro uses similar firmware and drivers to keep costs low. As more third parties get involved, the server attack surface grows larger, and responsibility for hardware security of the finished product gets less clear.



Quote for the day:


"Life is too short to waste time waiting for other people's approval on how you live it." -- Steve Maraboli


Daily Tech Digest - September 10, 2017

Why You Need a (Big) Data Management Platform for Your Digital Transformation

The organizations and businesses of today must think far beyond the traditional confines of an enterprise and need to consider the entire ecosystem to ensure that they are making the right decisions which can help with survival. It is now essential for organizations and businesses to take several factors into consideration, the most prominent of which are the customers, suppliers, competitors, and consortiums which the organization or business might be a part of. Fortunately for many, a digital transformation makes all of that—and much more!—possible.  The importance for organizations and businesses of evaluating and analyzing data streams in the world today cannot be emphasized enough.


How can creative industries benefit from blockchain?

In the creative economy, blockchain can redefine how artists are remunerated by acting as a platform for creators of intellectual property to receive value for their work. A common complaint lodged by artists is that, as performance-rights organizations and new intermediaries such as YouTube and Spotify increasingly insert themselves into the value chain between artists and their audiences, artists receive smaller cuts of revenue and have less say over how their creative works are priced, shared or advertised. For example, on Spotify it would take between 120 to 170 streams for rights holders to receive their first penny. “Today, when anyone wants to pay for the right to play a song at a concert or the right to play a song in a movie, this causes quite a lot of transaction friction and takes time,” says Wences Casares, CEO of Xapo, one of the largest custodians of Bitcoin.


How Quantum Computers Will Revolutionize AI, Machine Learning And Big Data

Once one of these industry leaders succeed at producing a commercially viable quantum computer, it’s quite possible that these quantum computers will be able to complete calculations within seconds that would take today’s computers thousands of years to calculate. ... That will be critical if we are going to be able to process the monumental amount of data we generate and solve very complex problems. The key to success is to translate our real-world problems into quantum language. The complexity and size of our data sets are growing faster than our computing resources and therefore place considerable strain on our computing fabric. While today’s computers struggle or are unable to solve some problems, these same problems are expected to be solved in seconds through the power of quantum computing.


How to Keep Your Company’s Information Organized

While plenty of businesses start out with a relatively well-organized information system, it's essential that the company's organization protocol continually adapts and evolves. Businesses need to make a point to ensure that their system of organization is constantly reviewed and improved to compensate for the biggest areas of weakness. All of the policies that a company puts in the place in order to educate employees about proper information organizations should be expanded and systematically sharpened on a regular basis for maximum efficiency. The more committed that your company is to constantly improving its organization efforts, the safer its information will ultimately be. By making sure to establish the most stable control points for information monitoring, your company is always in the best position to counteract any potential security breaches.


How Blockchain Revolutionizes Supply Chain Management

Blockchains make it possible for ecosystems of business partners to share and agree upon key pieces of information. But they can do it without having to appoint an intermediary and deal with all the complex negotiations and power plays that come with setting the rules before handing over really critical business information. Instead of having a central intermediary, blockchains synchronize all data and transactions across the network, and each participant verifies the work and calculations of others. This enormous amount of redundancy and crosschecking is why financial solutions like bitcoin are so secure and reliable, even as they synchronize hundreds of thousands of transactions across thousands of network nodes every week.


Seven aftershocks of the Equifax breach: What bankers need to know

"This is about fraudsters being able to go out and open a brand new account in your name, and potentially selling Social Security numbers," Clements said. "The thing that wakes people up, at least wakes me up, is that it's a lot of numbers and the nature of the information means the type of damage that could be done is a lot more serious than just taking over a credit card." Equifax said that it hasn't seen any unusual activity among any of the 143 million victims. To Clements, this is cold comfort. "This stuff takes time," he said. "If names and Social Security numbers and dates of birth are out there, they will be used at some point. No one should take reassurance that a few weeks in, they don't detect a high level of activity." When he worked at Citi, "you'd see, months later, stolen information turning into new accounts or fraudulent activity. There's a long shelf life here."


A Small Oversight by Equifax In the Middle of a Massive Data Breach

So, what was this oversight? Well, it is highly likely that the folks managing the rollout of the website https://www.equifaxsecurity2017.com/ forgot to consider that scammers would very quickly look to register very similar domain names to spoof their victims. Luckily, they caught this error quickly and appear to have taken corrective action. Here are the facts behind this assertion. The domain name of their primary site was registered on August 22nd, 2017 at around 22:07 UTC. This domain was registered through MarkMonitor, Inc. and points Cloudflare name servers. All standard stuff. However, when I was doing my research I ran a quick lookup using the tool URLCrazy. This tool processed 251 different versions of the original domain name and I started to see some interesting results.


Cryptographic vulnerabilities in IOTA

Though the technology is exciting, the due diligence required to make sound investments in the technology isn’t keeping up with the pace of the hype. Aside from the financial risk, I don’t think developers and investors are thoroughly evaluating these systems technically, either. Many investors are relying on signaling — if enough well-known institutions like universities or large companies sign on as investors or advisors, it indicates approval of the project and its software. The problem is that some of these technologies have serious issues, and the large companies and well-known individuals either aren’t doing due diligence and investing the resources and time needed to evaluate the projects with which they are partnering, or aren’t sharing their findings with everyone else. The cryptocurrency space still doesn’t have a good way to assess these projects.


How big data can build better customer relationships

By utilizing big data for business intelligence and customer insights, an element of ‘dangerous guesswork’ is eliminated. Instead of hunches, benchmarked metrics help corroborate findings and guide marketing decision-making and idea formulation. Landing pages, launch ideas, social media campaigns — all these can be sent out en-masse, with the incoming data analyzed for effectiveness and ROI. At the same time, real-time data also compels businesses to be able to change their minds and pull back from campaigns quickly if initial feedback is negative. From a customer experience point of view, data is all about joining up the dots between a business’s disparate channels and services. With evidence-based segmentation and reporting in place, adjustments further down the line can justified and implemented easily, providing a more fluid and user-driven customer experience.


Understanding your network of continuous delivery tools

The Continuous Delivery Map is designed to help you make sense of all the different tools available, providing you with a simple visual guide of where they sit in the overall Devops landscape. Each line represents a different technology category and includes products that are available within that category. We’ve based the map on a simple metro system, akin to the London Underground, with each line representing a specific catgory. You can click on any ‘stop’ and learn more about the tool, in what context it can be used and its capabilities. It also offers insight into where the different tools can integrate with one another. The map also highlights the fact that, as with a distribution network, a central hub exists, from which the various tools can be orchestrated – much like an assembly line. This hub enables processes which have been planned, structured and defined to be repeated.



Quote for the day:


"It is the framework which changes with each new technology and not just the picture within the frame." -- Marshall McLuhan


Daily Tech Digest - September 09, 2017

3 Possible Application of Machine Learning in finance

One area of fascinating area of technological advancement is machine learning and artificial intelligence. Even in India, Technology has enabled Finance more accessible and the result is Reserve Bank of India is finalising draft for Peer to Peer Lending License in India. Let’s evaluate some future financial areas that can really benefit from machine learning Evaluating credit score of clients It is becoming extremely hard to correctly determine the eligibility of a loan borrower. Even after careful evaluation of all available parameters, some successful companies and individuals still default their bank loan. This is not a nice trend. Loan eligibility evaluation tasks will be taken over by the smart machine learning technology. To determine the credit score of a client, machine learning can apply regression algorithms which are accurate.


The Future of the Bitcoin Market

Nobody takes dollars at 100% interest at exchanges, even though BTC is growing faster. And no wonder – cheaper dollars can be gotten locally in any country, the same cannot be said for the BTC, whose market is international, somewhat transparent as far as exchange price dynamics are concerned and visible to all, except in cryptopyramids, of course. A currency with such a swap rate should lose its value over a long period of time, e.g. as we have seen, historically, on the USDRUR graph. But a looming fall does not mean there can be no lengthy perk-up periods with so-called carry trade. Or let us point to how the Italian lira showed strong vs. The German mark in 1996-1999, when the swap rate reached 11% annual. An even more immediate example is carry trade with USDRUR in 1999-2008 and 2016-2017 at higher interest rates


The role of DevOps and its connection to enterprise architecture

Every DevOps model should be linked to any application that it supports, and businesses should then identify the EA business processes that those applications support in turn. This lets enterprise architects map out a zone of business impact for each DevOps process, and this mapping should be as fundamental a part of DevOps documentation as the target applications or components impacted would be. That way, the impact of DevOps changes on business processes -- even if the impact is simply a risk of disruption during the change -- can be assessed. That requirement will also insure that development teams understand the business process lifecycle, or even lifecycles, that their application lifecycles may impact.


How can CIOs help create the next generation of IT leaders?

"The connection between the CIO and business partners is now occurring at a much higher level," he says. "That's the direction we're heading in -- the digital leader as an agent of change is on the rise, while overhead and service provider roles are on the wane. CIOs are now truly embroiled in business strategy and the direction of the company." This emphasis on change has led some experts to suggest that CIOs could be surpassed by new up-and-coming C-suite positions, such as chief digital officer and chief data officer. The rise of these new roles might leave up-and-coming IT professionals to conclude that their senior career objectives would be better served by avoiding the CIO role. Mitchell is unconvinced. While he has heard anecdotal evidence of firms appointing CDOs to lead digital change, there are executives in other organisations who believe a CIO's hard-won experience of running transformation is worth its weight in gold.


Using machine learning to improve patient care

“The system could potentially be an aid for doctors in the ICU, which is a high-stress, high-demand environment,” says PhD student Harini Suresh, lead author on the paper about ICU Intervene. “The goal is to leverage data from medical records to improve health care and predict actionable interventions.” Another team developed an approach called “EHR Model Transfer” that can facilitate the application of predictive models on an electronic health record (EHR) system, despite being trained on data from a different EHR system. Specifically, using this approach the team showed that predictive models for mortality and prolonged length of stay can be trained on one EHR system and used to make predictions in another.


Top 5 traits of highly effective data scientists

Using data to solve problems is an essential element of the job, but data scientists must be able to ‘think outside of the box’ in other aspects of the position as well. Because the industry is so new, data scientists might find themselves without the proper tools and resources to complete a certain task. According to the CrowdFlower survey, 14 percent found themselves without adequate tools. HR managers should look for candidates that can get around this problem and use resources at hand to complete data tasks. Alternatively, data scientists that know what resources are necessary to get the job done and can request these tools are strong candidates as well. As the industry catches up with the need, this will change, but data scientists should be able to cope with the lack of technology and still complete necessary projects.


Why is data integration critical for business success?

As they attempt to support their digital transformation, companies and governments have to face the fact that expectations are continuing to increase exponentially; therefore they need to support increasing data volumes, more data types and data sources, more complex use cases and to deliver data insights out to more and more end users. Also, organisations face problems as data reside not only on-premise, but also in different applications, databases, file formats, and as well as in the cloud. We help them to get value out of that data by leveraging next generation technologies like real-time, machine learning, and self-service capabilities. We are seeing a lot of our customers moving to multi and hybrid cloud environment, and we can help ease this migration.


What Is IaaS? The Modern Data Center Platform

Similar to other cloud computing services, IaaS provides access to IT resources in a virtualized environment, across a public connection that’s typically the internet. But with IaaS, you are provided access to virtualized components so that you can create your own IT platforms on it—rather than in your own datacenter. The pool of IaaS services offered to clients is pulled from multiple servers and networks that are generally distributed across numerous datacenters owned and maintained by the cloud provider. IaaS resources can be either single-tenant or multitenant, and they are hosted at the service provider’s. “Multitenant” means multiple clients share those resources, even though their systems are kept separate. This is the most common way to deliver IaaS because it is both highly efficient and scalable, allowing cloud computing’s generally lower costs.


True Democratization of Analytics with Meta-Learning

The democratization of analytics has become a popular term, and a quick Google search will generate results that explore the necessity of empowering more people with analytics and the rise of citizen data scientists. The ability to easily make better use of your (constantly growing) pool of data is a critical driver of business success, but many of the existing solutions that claim to democratize analytics only do so within severe limits. If you have a complex business scenario and are looking to get revolutionary insights using them, it’s easy to come away disappointed. However, the democratization of analytics isn’t just a buzzword that refers to a narrow approach. It’s possible to do so much more. Let’s quickly review the current state of the market that you’re likely familiar with, and then dive into our proposed solution.


Artificial Intelligence And Big Data: Good For Innovation?

The most dramatic advances in AI are coming from a data-intensive technique known as machine learning. Machine learning requires lots of data to create, test and “train” the AI. Thus, as AI is becoming more important to the economy, so too is data. The Economist highlighted the important role of data in a recent cover story in which it stated “the world’s most valuable resource is no longer oil, but data.” In this sense, both the ability to obtain data about customers, together with the ability to program AI to analyze the data, have become important tools businesses use to compete against each other, and against potential entrants. A potential entrant that lacks access to good data faces substantial hurdles, and this has led some regulators to question the extent to which control over data creates barriers to entry



Quote for the day:


"When a person can no longer laugh at themself, it is time for others to laugh at them." -- Thomas Szasz


Daily Tech Digest - September 08, 2017

IT disruption hits outsourcing’s legal profession

IT infrastructure outsourcing deals in the large enterprise sector, usually high value and long term, are today largely cloud deals using utility-like services from the likes of Amazon Web Services and Microsoft Azure. This is often cited as a new form of outsourcing, but while IT outsourcing service providers are all offering cloud services, it is a different competency. Lewis says even the Financial Conduct Authority, which regulates some of the world’s biggest technology users, sees outsourcing and the cloud as being the same. “But we know they are different,” he says. “Cloud and automation deals are not outsourcing because they are not about complex service provision. There are complex services being provided, but you are not buying bodies – it’s a product you have to license, customise and integrate, which is not outsourcing.”


FinTech: The Genie Is Out

“Payments and lending solutions continued to drive a significant amount of fintech investment. While ticket-sizes were relatively low, there have been numerous deals focused on personal lending and small-business loans. Those focused on providing short-duration loans (up to 15 to 90 days) attracted the most attention in the lending space, as bridge-financing is considered a relatively large issue for both individuals and businesses,” says Neha Punater, Head-Fintech, KPMG (India). While there are block-chain firms too, a viable model is a mirage. As for insurtech, “While it has not gained a significant amount of traction (in India), the tide may be starting to turn,” adds Punater; Acko may be a harbinger.


Stop pretending you really know what AI is and read this instead

At the very least, we might want to avoid the word “intelligence” when referring to software, because nobody really knows what it means. For example, Google’s Go-playing computer system was “smart” enough to beat the world’s best human players—but if you try to get it to generalize what it “learned” about Go to any other domain, you’ll find it’s dumber than a houseplant. Even Alan Turing, the genius who mathematically defined what a computer is, considered the question of defining intelligence too hard; his eponymous Turing test dodges it, essentially saying “intelligence is as intelligence does.” So what should we call “AI”, if not that? Orwell suggests that the cure for words that cloud our thinking is better words: simpler ones, crisper ones. Some commentators suggest merely using “software”; personally, I think “automation” does the trick.


If Blockchain Is the Answer, What Is the Security Question?

The brilliance of blockchains is that a transaction has truly happened only when it is captured in the ledger and thus recorded forever. This means there is a one-to-one link between the action and the audit log — perfect forensics evidence. However, this perfection requires your business transaction to be modeled as a blockchain transaction (perhaps using smart contracts on Ethereum or Burrow). If you merely post an audit entry to a blockchain afteryour business transaction completes, that magical property is lost. There's no guarantee that every business transaction was posted to the chain, or that every element in the chain is the result of a real business transaction. If your software is merely posting audit logs to a blockchain, you should ask yourself why a blockchain is the right answer, versus a database or some other data structure.


Hackers gain access to switch off the power in America and Europe

The attackers, a group called Dragonfly, has been conducting cyber attacks on energy companies for years — since at least 2011. The group went quiet after being exposed in 2014. The Dragonfly 2.0 campaign first started in at least December 2015. But over the past year, using malicious email campaigns to harvest network credentials, the hackers managed to penetrate energy firms in the U.S., Switzerland and Turkey. According to a new report by Symantec, they now have the ability to “severely disrupt affected operations.” Earlier Dragonfly campaigns are believed “to have been more of an exploratory phase,” but Symantec is concerned Dragonfly 2.0 campaigns could be aimed at “access to operational systems, access that could be used for more disruptive purposes in the future.”


Hackers send silent commands to speech recognition systems with ultrasound

First, you can defeat DolphinAttack simply by turning off wake phrases. That way you’d have to have already opened the voice recognition interface for the attack to work. Second, even if you keep the wake phrase on, many devices restrict functions like accessing contacts, apps and websites until you have unlocked them. An attacker could ask about the weather or find nearby Thai places, but it couldn’t send you to a malicious website. Third, and perhaps most obviously, in its current state the attack has to take place within a couple of feet and against a phone in the open. Even if they could get close enough to issue a command, chances are you’d notice right away if your phone woke up and said, “OK, wiring money to Moscow.”


What is IaaS? The modern datacenter platform

Organizations that use IaaS can self-provision the infrastructure services, and pay for them on a per-use basis. ... In some cases, providers charge clients for infrastructure services based on the amount of virtual machine (VM) capacity they’re using over a period of time. Similar to other cloud computing services, IaaS provides access to IT resources in a virtualized environment, across a public connection that’s typically the internet. But with IaaS, you are provided access to virtualized components so that you can create your own IT platforms on it—rather than in your own datacenter. The pool of IaaS services offered to clients is pulled from multiple servers and networks that are generally distributed across numerous datacenters owned and maintained by the cloud provider.


HTTPS interception gets a bad rap; now what?

Earlier this year, a group of researchers from Google, Mozilla, Cloudflare, the University of California at Berkeley, the University of Michigan, the University of Illinois at Urbana-Champaign and the International Computer Science Institute published a detailed study, "The Security Impact of HTTPS Interception." The research looked at the heuristics of HTTPS interception "in the wild" on three networks: Mozilla Firefox update servers, a group of e-commerce sites and the Cloudflare content distribution network. Researchers found notable security gaps: In the course of analyzing corporate middleboxes and client-side security software, we uncovered a range of TLS implementation errors, many of which allow connections to be intercepted by a man-in-the-middle attacker.


What Is JSON? JavaScript Object Notation Explained

JavaScript Object Notation is a schema-less, text-based representation of structured data that is based on key-value pairs and ordered lists. Although JSON is derived from JavaScript, it is supported either natively or through libraries in most major programming languages. JSON is commonly, but not exclusively, used to exchange information between web clients and web servers.  Over the last 15 years, JSON has become ubiquitous on the web. Today it is the format of choice for almost every publicly available web service, and it is frequently used for private web services as well. The popularity of JSON has also resulted in native JSON support by many databases. Relational databases like PostgreSQL and MySQL now ship with native support for storing and querying JSON data.


How can CIOs help create the next generation of IT leaders?

"It can be tough to find people and to convince them that a technical background isn't everything when it comes to the next generation of IT leadership. When you find those people, they can require a lot of reassurance." Informal activities are important, too. As part of his technology leadership programme, Shiraji has introduced a shadowing system, where nominees within the IT team attend senior leadership team meetings. There is no prerequisite in terms of skills and capabilities. The key, says Shiraji, is that shadowing allows people to contribute. "Shadowing builds appetite and helps IT professionals understand the role of the next-generation information leader," he says. "The indicators for success for me will be that we will have a very different make-up at senior IT gatherings in the future.



Quote for the day:


"People who enjoy meetings should not be in charge of anything." -- Thomas Sowell


Daily Tech Digest - September 07, 2017

WhatsApp turns its attention to business

WhatsApp has been steadily enhancing its business-to-consumer capabilities for some time now. Last week, the firm announced a business verification system, with a green badge indicating WhatsApp has confirmed a phone number belongs to an authenticated business account - similar to Facebook’s own grey badge for business pages. WhatsApp has previously announced plans to allow businesses to contact customers with marketing messages. In its blog post, WhatsApp said it will work with business users as part of a closed pilot program to test additional new services ahead of a wider launch.  One of the companies testing the enterprise service, UK-based ecommerce firm Yoox Net-a-Porter, said in a blog post that many of its customers prefer to use WhatsApp rather than email to complete transactions and get product suggestions.


SEC chief says cyber crime risks are substantial, systemic

The SEC has a number of active investigations into companies that have claimed to be in the blockchain and digital currency space but which are really just trying to steal people’s money, Peikin said. “As with any kind of newsworthy event, roaches kind of crawl out of the woodwork and try to scam money off of investors,” he said of the rapidly growingly popularity of ICOs. The SEC has a distributed ledger technology working group made up of about 90 people across the commission to help keep abreast of emerging developments and technologies, Peikin said. From an enforcement perspective, Clayton said there not be any sort of dramatic shift in priorities at the SEC and that the protecting retail investors from harm would be remain the top goal.


6 Data Analytics Success Stories: An Inside Look

Commercial purchases of hardware, software and services intended to support big data and analytics are expected to exceed $210 billion. IDC analyst Dan Vesset notes that big data analytics solutions have become key pillars of enabling digital transformation efforts across industries and business processes worldwide. But there is a dark side to this delirious spending: Most data analytics projects fail to yield measurable value. Legacy systems and business-line bureaucracies have spawned data siloes and perpetuated poor data quality. And CIOs are still struggling to fill the gaps in talent required to manipulate data for insights. The war for talent is fierce and the rise of university analytics programs isn’t producing qualified candidates fast enough.


CISOs, A New Deliverable On Your Platter: Customers' Privacy

While delivering the historic judgment, the judges have explicitly recognized the need for a legislation protecting individual data. “Informational privacy is a facet of the right to privacy. The dangers to privacy in an age of information can originate not only from the state but from non-state actors as well. We commend to the Union Government the need to examine and put into place a robust regime for data protection. The creation of such a regime requires a careful and sensitive balance between individual interests and legitimate concerns of the state,” Justice DY Chandrachud noted in his judgment on behalf of himself and three more judges, including the CJI. Justice Sanjay K Kaul too strongly endorsed it in his judgment.


Users review the top cloud data integration tools

As the world of cloud computing becomes more globalized, IT professionals need multiple levels of security and transparency to manage cloud relationships. Using a cloud data integration solution, an enterprise can configure a number of disparate application programs sharing data in a diverse network, including cloud-based data repositories. This allows enterprise tech professionals to manage, monitor and cleanse data from various web-based and mobile applications more effectively. IT Central Station users have identified agile data transformation, a clear, customizable dashboard and efficient data replication as valuable features when looking for a cloud data integration solution. According to their reviews, the IT Central Station community has ranked Informatica Cloud Data Integration, Dell Boomi AtomSphere, IBM App Connect and SnapLogic as leading cloud data integration solutions in the market.


It's time to rethink the software-defined storage market

The real abstraction benefit the software-defined storage market offers isn't the ability to select hardware for deployment. It's the ease with which you can change hardware when workload demands change. When new technology or an upgrade comes out, or you need more performance or capacity, if you have to do a data migration, that's a nonstarter. Storage products that maximize the benefits of SDS enable the hardware to evolve to the needs of the data. ... This is similar to the first benefit, but you also should be able to use SDS-enabled technology for whatever infrastructure and workload you want. You can consolidate data on fast SSDs, higher-capacity hard drives and even the public cloud, while having the intelligence to automatically allocate the right infrastructure to the right workload, with any of it changing on the fly, nondisruptively.


What is ‘anticipatory IT’? An IT strategy for staving off digital disruption

Tuning the opportunity antenna to the anticipatory channel is not any easy task for IT leaders. CIOs, many of whom are juggling roles that require them to be transformational, functional and strategic, are busy reacting and responding to threats and challenges to their businesses. And when CIOs do spy opportunity, getting the C-suite and board to buy into what they're selling is a tough task. Burrus offered some strategic recommendations to help CIOs get executive buy-in and fend off disruption. To avoid disruption, CIOs must be aware of hard and soft trends. A hard trend is a projection based on measurable, tangible, and fully predictable facts, events, or objects. It’s a future fact that cannot be changed. A soft trend is a projection based on statistics that have the appearance of being tangible, fully predictable facts. Think of it as a future maybe.


Businesses can no longer think of cybersecurity as just a ‘tech problem’

Paine said this turns the focus to the user’s relationship with technology, rather than relying on software to find a “needle in a needle stack”. “The old idea of security was like castles and moats. You build really strong walls and then the bad guys won’t get in and we’ll be able to protect everything inside the castle, and that’s great. It used to work really well,” Paine said. “But over time, attacks increased in volume and it became harder to identify friend from foe. “The bad guys were simply faster than the good guys and the technologies couldn’t keep pace with the bad guys ability to adapt.” Paine said that regardless of scale or sophistication, cyberattacks are always motivated by one of two things: “there’s the commercially motivated attacker or the disruptive, hacktivist style attacker”.


Fixing, upgrading and patching IoT devices can be a real nightmare

Ensuring cybersecurity for computers and mobile phones is a huge, complex business. The ever-widening scope and unbelievable variety of threats makes keeping these devices safe from cyber criminals and malware a full-time challenge for companies, governments and individuals around the world. But at least the vast majority of those devices are easily accessible, safe in the pockets or sitting on the desktops of the very people who want to protect them. The Internet of Things (IoT) devices that need protection, on the other hand, could be almost anywhere: sitting in a remote desert, buried deep in coal mine, built into a giant truck. Or, even implanted inside the human body.


Investing in technology for your business

Investing in technology for the business does not always come cheap but it is something that you need to do in order to ensure you move with the times. You can get a small business loan if you need to raise some funds to invest in tech for your business. This will enable you to invest in all of the technology that you need for your business in one go rather than having to do it gradually. Most businesses these days rely on computers for their day to day running. However, computers can be hacked and cybercrime can cause huge issues for your business. Therefore, if you do use computers, you need to ensure you have proper security and protection in place. You can get business antivirus software for a very reasonable price these days, so make sure you have protection in place.




Quote for the day:


"If you are always trying to be normal you will never know how amazing you can be." -- Maya Angelou