Daily Tech Digest - February 11, 2018

How data scientists can improve their careers in 2018


Many data scientists emerged from the world of business intelligence and data warehousing; in the 1990s, we were doing what many data scientists are, at least in part, doing today. As skilled and knowledgeable as we were about data warehousing, I doubt many people doing that work knew anything about artificial intelligence. If this sounds similar, take time in 2018 to master machine learning, neural networks, genetic algorithms, expert systems, and all the wonderful techniques that will eventually teach computers how to take over the world. Conversely, a number of data scientists entered the profession from the artificial intelligence and/or advanced mathematics world--it seemed to be a logical progression. These professionals felt they had the hard part figured out, and now it was only a matter of learning about databases. The reality is becoming a data professional is not as easy as it looks. So, when faced with the frustrations of long-running queries and outer joins gone wild, most data scientists revert back to their comfort zone of Bayesian data analysis and stochastic calculus. 


Building a CI System With Java 9 Modules and Vert.x Microservices


Developers familiar with JavaScript can probably recall the single threaded event loop that delivers events as they arrive to registered handlers. The multi-reactor pattern is a related approach, but to overcome the inherent limitation of a single threaded event loop, vert.x employs multiple event loops based on the available cores on a given server. Vert.x also comes with an opinionated concurrency model loosely based on the actor model where “actors” receive and respond to messages and communicate with others using messages. In the vert.x world, actors are called “verticles” and they typically communicate with each other using JSON messages sent over an event bus. We can even specify the number of instances of each verticle that should be deployed by vert.x. The event bus is designed such that it can form a cluster using a variety of plug and play cluster managers like Hazelcast and Zookeeper.


AI Enhanced Smart Homes Reduce Power Grid Demands

sensors
Power companies currently have to charge higher peak-usage rates for drawing power from the grid at times when demand is high. Solar panels have become increasingly popular – thanks in no small part to the many government grants available to homeowners. While solar panels help reduce demand on the grid for power needs, it’s unlikely that a single solar roof installation can provide all the power a home needs. Therefore, power is still drawn from the grid. This is especially true at night when the sun goes down. Batteries can be installed at a home to help store excess energy created by solar panels during low-usage times. The beauty of this is that instead of tapping into the grid while peak-usage rates are in effect, an AI powered grid could do the calculation – taking into account up-to-the-minute power costs – and deploy reserve power from batteries. In fact, AI could go so far as to perform calculations constantly to decide whether it makes more sense to consume cheap power from the grid, while redirecting all of the solar power to the battery packs.


Back to Basics: AI Isn't the Answer to What Ails Us in Cyber

AI has a great PR machine behind it and may hold good long-term potential. But it's not the answer to what ails us in cyber. In fact, I'd put AI in the same camp as advanced persistent threats (APTs) — sophisticated cyberattacks usually orchestrated by state-sponsored hackers and often undetected for long periods of time (think Stuxnet). Both are really intriguing, but in their own ways they're existential distractions from the necessary work at hand. At the crux of just about every high-profile breach and compromise, from Yahoo to Equifax, sits a lack of foundational cyber hygiene. Those breaches weren't about failing to use some super-expensive, bleeding-edge, difficult-to-deploy and unproven mouse trap. In cyber, what differentiates the leaders from the laggards isn't spending millions and millions of dollars on sexy bells-and-whistles interfaces. It's about organizations setting a culture in which security matters.


What’s needed to unlock the real power of blockchain and distributed apps


It’s a great irony that right at the very moment everyone is talking about unlocking parallelization and writing multi-threaded and hyper-efficient code, we suddenly have to figure out how to write efficient single-threaded code again. This goes back to the distributed nature of blockchain’s architecture and the consensus mechanisms that verify activity on the blockchain. In this environment, the infinite parallel execution that comes from every node on the network computing every transaction means that compute costs are extremely high. In other words, there is very little excess compute power available to the network, making it an exceptionally scarce resource. It’s a fascinating challenge. Programmers today are used to having access to cheap and virtually unlimited processing power. Not so with blockchain. Today, we’re seeing all this effort to relearn how to write extremely efficient software. But efficient code will only get us so far. For blockchain to gain widespread adoption, processing power will need to get much cheaper.


The Data Science Puzzle, Revisited

Broken data science puzzle
Though machine learning, artificial intelligence, deep learning, computer vision and natural language processing (along with a variety of other applications of these "intelligent" technologies) are all separate and distinct fields and application domains, even practitioners and researchers have to admit that there is some continually evolving "concept creep" going on any more, beyond the regular ol' confusion and confounding that has always taken place. And that's OK; these fields all started out as niche sub-disciplines of other fields (computer science, statistics, linguistics, etc.), and so their constant evolution should be expected. While it is important on some level to ensure that everyone who should have a basic understanding of their differences indeed possesses this understanding, when it comes to their application in fields such as data science, I would humbly submit that getting too far into the semantic weeds doesn't provide practitioners with much benefit in the long term.



6 machine learning success stories: An inside look

4 machine learning success stories: An inside look
Ed McLaughlin, president of operations and technology at Mastercard, says ML “pervades everything that we do.” Mastercard is using ML to automate what he calls “toil,” or repetitive and manual tasks, freeing up humans to perform work that adds productivity and value. “It's clear we've reached a state of the art where there is a clear investment case to automate workplace tasks,” McLaughlin says. Mastercard is also using ML tools to augment change management throughout its product and service ecosystem. For example, ML tools help determine which changes are the most risk-free and which require additional scrutiny. Finally, Mastercard is using ML to detect anomalies in its system that suggest hackers are trying to gain access. McLaughlin also put a “safety net” in the network; when it finds suspicious behavior it trips circuit breakers that protect the network. “We have fraud-scoring systems constantly looking at transactions to update it and score the next transaction that's going in,” he says.


Innovation Isn't About What You Know, But What You Don't


When Steve Jobs first came up with the idea for the iPod, it wasn't actually a machine he had in mind, but "a thousand songs in my pocket." It was, at the time, an impossible idea, because hard drives of that capacity and size just didn't exist. In fairly short order though, the technology caught up to the vision. That kind of singular focus and drive helps explain Jobs' incredible success, but what about his failures? The Lisa, a precursor to the Macintosh, flopped. So did his first venture after Apple, NeXT Computer. Even at the height of Apple's dominance, there were failures such as iAds. Apple TV still hasn't really gained traction. "It's not what you don't know that kills you," Mark Twain famously said, "it's what you know for sure that ain't true" and that's the real innovator's dilemma. Innovation, necessarily, is about the future, but all we can really know is about the past and some of the present. Innovation is always a balancing act of staying true to your vision and re-examining your assumptions.


Does artificial intelligence have a language problem?


If AI were truly intelligent, it should have equal potential in all these areas, but we instinctively know machines would be better at some than others. Even when technological progress appears to be made, the language can mask what is actually happening. In the field of affective computing, where machines can both recognise and reflect human emotions, the machine processing of emotions is entirely different from the biological process in people, and the interpersonal emotional intelligence categorised by Gardener. So, having established the term “intelligence” can be somewhat problematic in describing what machines can and can’t do, let’s now focus on machine learning – the domain within AI that offers the greatest attraction and benefits to businesses today. The idea of learning itself is somewhat loaded. For many, it conjures mental images of our school days and experiences in education.


The Kubernetes Effect


The container and the orchestrator features provide a new set of abstractions and primitives. To get the best value of these new primitives and balance their forces, we need a new set of design principles to guide us. Subsequently, the more we use these new primitives, the more we will end up solving repeating problems and reinventing the wheel. This is where the patterns come into play. Design patterns provide us recipes on how to structure the new primitives to solve repeating problems faster. While principles are more abstract, more fundamental and change less often, the patterns may be affected by a change in the primitive behaviour. A new feature in the platform may make the pattern an anti-pattern or less relevant. Then, there are also practices and techniques we use daily. The techniques range from very small technical tricks for performing a task more efficiently, to more extensive ways of working and practices.



Quote for the day:


"Keep your face always toward the sunshine - and shadows will fall behind you." -- Walt Whitman


Daily Tech Digest - February 10, 2018

Think, Do We Rule Technology, or Does Tech Rule Us?

Image: Shutterstock
As CompTIA notes, we can see the dark side of technology every day. Companies misuse or fail to protect data from hackers. Bad data leads to bad decisions. Then, consider our personal lives. Walk into almost any restaurant and see couples on "date night." No talking, just two people looking at their screens. I wonder if some people spend more time talking to Alexa than they do to other humans. "Balance" is about spending an hour without tech. It also means questioning tech decisions. Balance also is about applying the right technology solution to the right problem or opportunity. The saw about "technology for technology's sake" rings true when you see data scientists working on a corporate island soaking up data that holds no relevance to the business. It surfaces when executives say, "We need the IoT," when they have no clue as to why they need it or what IoT really is. The vast majority of technology adoption is for the better, but we still need to ask a few simple questions along the way. Does everyone need it? In fact, does anyone need it?


What Is Cryptojacking? How To Prevent Detect & Recover From It

vulnerable cryptojacking hacking breach security
Hackers have two primary ways to get a victim’s computer to secretly mine cryptocurrencies. One is to trick victims into loading cryptomining code onto their computers. This is done through phishing-like tactics: Victims receive a legitimate-looking email that encourages them to click on a link. The link runs code that places the cryptomining script on the computer. The script then runs in the background as the victim works. The other method is to inject a script on a website or an ad that is delivered to multiple websites. Once victims visit the website or the infected ad pops up in their browsers, the script automatically executes. No code is stored on the victims’ computers. Whichever method is used, the code runs complex mathematical problems on the victims’ computers and sends the results to a server that the hacker controls. Hackers often will use both methods to maximize their return. “Attacks use old malware tricks to deliver more reliable and persistent software [to the victims’ computers] as a fall back,” says Vaystikh.



Generating new revenue streams through intelligent IoT connectivity

Low-bandwidth messaging can be used to send small quantities of data across the core GSM network, which is embedded across the world in 2G and LTE networks. An MQTT-SN-based messaging protocol provides a globally connected network to support the development of new revenue streams. Because this type of connection doesn’t require any form of internet connection that would otherwise leave it prone to external intrusions, greater stability is offered for IoT devices, keeping connectivity levels high and costs low. ... As IoT technology continues to develop, we will gradually see fully automated solutions – which only send data when parameters change – become increasingly commonplace, minimising the need for human interaction. This will enable easy, wide-scale implementation of new, intelligent IoT solutions, presenting increased cost savings for existing streams, while offering further scope to build new business models. It is now crucial that organisations adapt their business models accordingly, allowing them to utilise IoT in further monetising these services.


Governments eye their own blockchain cryptocurrencies

bitcoin security vault
"They've been pretty emphatic," said Brian Behlendorf, executive director of Hyperledger, a collaborative formed to create blockchain technologyfor business use. "They're talking about third-party cryptocurrencies, like bitcoin and the 1,300 other cryptocurrencies out there. But they're not talking about blockchain technology. They're still extremely bullish on that. "They're pushing hard, as many countries are, for using distributed ledgers - using blockchain - to implement their own domestic digital token," Behlendorf added. While blockchain is the foundation for cryptocurrency, it is not anchored to digital currencies. Blockchain distributed ledgers are used for a myriad of business applications, such as authenticating real estate transfers or for digitizing supply chains or tracking international shipments in real time. A government-backed, blockchain-based digital token would offer the benefits of an international currency usable for settlement of global trade and holdings.


Cyber Warranties: What to Know, What to Ask

A cyber warranty is for all services provided by a solutions provider to their customer base. It covers the cost to re-perform services associated with the system update following an external data breach caused by a vendor's product, explains Matt Kletzli, management liability leader at Schinnerer, which recently launched a warranty for tech solutions providers. Schinnerer, an underwriting manager, teamed up with Guidewire, which builds software for the property and casualty (P&C) insurance industry. Its Cyber Warranty uses Cyance, a risk analytics tool from Guidewire, to gauge the risk of vendors' customers so they can customize strategies. The warranty is for small and mid-size solutions providers making $40M maximum each year. "What we're doing is providing the solutions providers with a tangible contractual agreement with every one of their clients where they have a service agreement in place," says Kletzli.


Key iPhone Source Code Gets Posted Online in 'Biggest Leak in History'

Someone just posted what experts say is the source code for a core component of the iPhone’s operating system on GitHub, which could pave the way for hackers and security researchers to find vulnerabilities in iOS and make iPhone jailbreaks easier to achieve. The GitHub code is labeled “iBoot,” which is the part of iOS that is responsible for ensuring a trusted boot of the operating system. In other words, it’s the program that loads iOS, the very first process that runs when you turn on your iPhone. It loads and verifies the kernel is properly signed by Apple and then executes it—it’s like the iPhone’s BIOS. The code says it’s for iOS 9, an older version of the operating system, but portions of it are likely to still be used in iOS 11. Apple has traditionally been very reluctant to release code to the public, though it has made certain parts of iOS and MacOS open source in recent years.


Could Machine Learning Help Startups Beat the Odds?

machine learning helping entrepreneurs
And technology is rapidly reducing the overall cost of starting up. One hundred years ago, the cost to start a business was immense – goods were difficult to transport over long distances. You were limited to a market that immediately surrounded you, and everything had to be done with the help of manual labor. There’s a reason that the average work week was 45.6 hours in 1918, with some estimates placing it at nearly double as industrialization took over later in the century. Today, technology isn’t just industrial in nature. Computer technology is advancing rapidly. Startups can harness the web to gather information and present useful visual data to consumers – just look at how the online gaming industry has become more transparent thanks to big data and ML technology that provides real-time insights. Your smartphone has more technological horsepower than the first space program to successfully reach the moon. Artificial Intelligence (AI) and Machine Learning (ML) allow cars to drive themselves, and computers to beat humans at chess.


Most remain dissatisfied with threat intelligence quality and accuracy

Lack of accuracy and timeliness is among the top complaints about threat intelligence, which in turn hinders its effectiveness and security teams’ ability to quickly mitigate threats. In fact, only 31 percent of respondents cited threat intelligence as actionable. But exchanging threat intelligence amongst peers, industry groups, IT vendors and government bodies can result in more holistic, accurate and timely threat intelligence and a stronger security posture. Two-thirds of respondents (66 percent) reported that threat intelligence could have prevented or minimized the consequence of a data breach or cyber attack, indicating that more infosecurity professionals are realizing the importance of threat intelligence. “Cybersecurity takes a village, and this survey spotlights a real need for the cybersecurity community – and public sector to better cooperate and communicate to share intel on security threats,” said Dr. Larry Ponemon, Chairman of the Ponemon Institute.


The Belgian Federal Computer Crime Unit (FCCU) was able to locate a command and control centre in one of Belgium’s neighbouring countries. Led by the federal prosecutor’s office, the Belgian authorities seized the command and control servers and other servers, while forensic analysis worked to retrieve the decryption keys. ... By sharing the keys with No More Ransom, the Belgian Federal Police becomes a new associated partner of the project, the second law enforcement agency after the Dutch National Police. In recent years, ransomware has eclipsed most other cyber threats, with global campaigns indiscriminately affecting organisations across multiple industries in the public and private sector, as well as consumers. ... The release of the Cryakl decryption keys is yet another successful example of how cooperation between law enforcement and internet security companies can lead to great results, said Europol. 


When should an organization report a data breach?

Notwithstanding requirements, organizations will sometimes notify authorities as soon as possible when there is evidence of a data breach. Doing so always looks good, because it shows you care about your customers’ privacy and ensures your organization is protected. Prompt notifications can also help remedy the situation if data breach details escalate. However, if details worsen, or multiple breaches are involved, notifying the public of each step can lead to unnecessary ‘breach fatigue’. Fallout may occur, as consumers lose trust in an organization beset by confusion. It may also prevent state legislators from incentivizing on cybersecurity regulations, as they become the norm and are considered less urgent. According to databreachtoday.com, “it depends.” Organizations should have established information security management policies and processes well in advance of a data breach.Quote for the day:



Quote for the day:


"Every great movement must experience three stages: ridicule, discussion, adoption." -- Voltaire


Daily Tech Digest - February 08, 2018

What is quantum computing? A machine learning supercharger businesses can’t ignore
CIOs interested in the potential of quantum computing should take stock of early adopters. Volkswagen in March 2017 began using quantum machines from D-Wave Systems to optimize traffic flow for 10,000 taxis in Beijing, China. Volkswagen CIO Martin Hofmann says that his team had to program a quantum chip to address every bit on the chip. "Quantum computing in the next five years will be a dominating technology," Hoffman says. Accenture and 1Qubit are working with Biogen to speed up drug discovery by accelerating the rate at which they can simulate molecules and chemical reactions. J.P. Morgan Chase is working with IBMto use quantum computers for risk analysis and trading strategies. In looking where to apply quantum computing, Brisse says CIOs should identify problems involving large data sets that can't be solved by classic computers, including NP-hard problems, such as the travelling salesman optimization problem. Analyzing death and mortality tables in insurance and calculating risk in securities are a couple of common problems for which Brisse fields inquiries.


Identity fraud enters a new era of complexity

identity fraud complexity
While credit card accounts remained the most prevalent targets for new account fraud, there was significant growth in the opening of new intermediary accounts, such as email payments (e.g. PayPal) and other internet accounts (e.g. e-commerce merchants such as Amazon) by fraudsters. Although not as easily monetized alone, these account types are invaluable in helping fraudsters transfer funds from the existing accounts of their victims. The study also found three significant changes in data breaches in 2017. Nearly a third (30 percent) of U.S. consumers were notified of a breach in the past year, up from 12 percent in 2016. For the first time ever, Social Security numbers (35 percent) were compromised more than credit card numbers (30 percent) in breaches. Data breaches are causing consumers to lose trust in institutions. These trends combined to cause consumers to shift the perceived responsibility for preventing fraud from themselves to other entities, such as their financial institution or the companies storing their data.


Cybersecurity PTSD affects many security professionals

Cybersecurity PTSD affects many security professionals
70 percent of cybersecurity professionals say the cybersecurity skills shortage has had some impact on their organization. Of course, they are living this impact; 63 percent of cybersecurity professionals say the cybersecurity skills shortage has increased the workload on existing staff. More work and stress at the same salary is a surefire recipe for dissatisfied employees and high attrition; 41 percent of cybersecurity professionals say the cybersecurity skills shortage has led to a situation where the infosec staff spends a disproportional amount of time dealing with high-priority issues and incident response. This means that many cybersecurity pros face a high-stress workplace from the beginning to the end of their workdays; 68 percent of cybersecurity professionals believe that a cybersecurity career can be taxing on the balance between one’s personal and professional life. In other words, infosec pros are taking the pressure of their jobs home with them. It’s safe to assume that this can leads to issues like substance abuse and others.


Aryaka enhances SD-WAN with Radware DDoS protection


With this new partnership, Aryaka said users will gain another layer of data security and threat mitigation with Radware DDoS protection. For example, Radware offers its Attack Mitigation service, which protects against DDoS attacks with "always-on detection and mitigation," according to a statement made by Aryaka. In the statement explaining the need for Radware DDoS, Gary Sevounts, Aryaka's chief marketing officer, said, "Today's ever-changing threat landscape necessitates a layered, defense-in-depth approach to security that scales to global enterprise networks and combines advanced threat detection, mitigation and perimeter protection." Aryaka's private network offers customers a foundational layer of security since traffic isn't exposed to the public internet, thereby, avoiding potential outsider threats. Aryaka then offers end-to-end encryption for another layer of protection.


What is Cython? Python at the speed of C

What is Cython? Python at the speed of C
Cython code looks a lot like Python code, by design. If you feed the Cython compiler a Python program, it will accept it as-is, but none of Cython’s native accelerations will come into play. But if you decorate the Python code with type annotations in Cython’s special syntax, Cython will be able to substitute fast C equivalents for slow Python objects. Note that Cython’s approach is incremental. That means a developer can begin with an existing Python application, and speed it up by making spot changes to the code, rather than rewriting the whole application from the ground up. This approach dovetails with the nature of software performance issues generally. In most programs, the vast majority of CPU-intensive code is concentrated in a few hot spots—a version of the Pareto principle, also known as the “80/20” rule. Thus most of the code in a Python application doesn’t need to be performance-optimized, just a few critical pieces. You can incrementally translate those hot spots into Cython, and so get the performance gains you need where it matters most.


More POS malware detected in the wild


The researchers said it is still unclear whether the malware is currently being used in campaigns in the wild, but the co-ordinated use of LogMeIn-themed filenames and command and control (C2) server addresses in Switzerland, coupled with evidence of an earlier Intel-themed variant, suggest that it may well be. The researchers noted that they have been in contact with LogMeIn throughout the investigation to help determine whether its services or products may have been abused as part of the malware deployment process, but no evidence of this was found. “It appears that the use of LogMeIn-themed filenames and C2 domain by the actors behind the malware is a simple lure and ‘camouflage’ technique,” they said, adding that LogMeIn has not been affected or infected in any way. LogMeIn has also issued a statement saying that all legitimate updates for LogMeIn products, including patches, will always be delivered securely in-product.


Ticking Time Bombs in Your Data Center

Programming is the linchpin of the modern data center, the building block for developing all manner of software that makes navigating enterprise IT easier. That being said, one of the data center's biggest threats lies in this foundation of its composition: complex legacy code. If you look at the flaws that lead to most breaches, they aren't so much on algorithmic levels as they are on primary levels, rooted in the legacy code. As the data center moves to the cloud and is forced to update existing protocols, reining in the small but powerful lines of stray programming becomes more critical than ever. In order to compensate for these Achilles' heels, IT teams must ensure that there are proper measures in place to both spot these errors and revise them. If the software is too far down the rabbit hole to be revised at a foundational level, additional layers of security can be enforced through management


5 reasons digital twins matter to your IoT deployment

twin suns
A digital representation of a physical object, digital twins allow businesses to create a crystal-ball-like-view into the future. They enable simulation, analysis and control to test and explore scenarios in a practice setting before initiating changes in the real world. While digital twins have historically been associated with more complex technology environments, its impressive ability to both eliminate problems and deliver next-level operational performance is making these models a must-have technology in every IoT team’s toolkit. Some of the first digital twin cases I’ve witnessed involved complex—and usually expensive—capital assets such as diesel engines, turbines, and heavy-duty mining and construction equipment. Their digital representations are equally complex, comprising finite state machines with potentially tens of thousands of discrete states. However, digital twins offer even the simplest constructs a vast number of benefits.


Teenager suspected of crippling Dutch banks with DDoS attacks


The attacks began more than a week ago when ABN Amro, one of the Netherlands’ bigger banks, fell victim to the first DDoS attack. Customers could not log into their online banking accounts or use the bank’s mobile app. After the first attacks were fended off, a new wave struck, this time also hitting other banks, such as Rabobank, and some other organisations. The Dutch Tax Authority was attacked, as well as DigiD, the country's login system for governmental services. The attacks on both the banks and institutions continued throughout the week, and later affected popular technology website Tweakers.net. As the waves of DDoS attacks crippled the Netherlands’ financial system, many experts started speculating about who was behind them. Fingers were quickly pointed at Russia. Although no concrete evidence emerged, many found the timing of the attacks to be a little coincidental – a matter of days after the news of the AIVD findings broke, so a retaliatory attack seemed a possibility.


The future of work: How to thrive through IT’s latest revolution

The future of work: How to thrive through IT’s latest revolution
“What does an exponential IT worker look like?” asks Jeff Schwartz, human capital principal at Deloitte Consulting. “What part of her work is problem solving? How much is routine? What communication is required in her job? What supervision is required?” If she oversees several people, consider what that oversight might entail, he says. “Is it scheduling a bunch of people, which could be done by algorithm, or is it people talking and seeing and interacting with each other?” With automation, the scheduling function could be handled by a chatbot. Our hypothetical IT employee might still hold a daily meeting with her team, but now they could spend that time solving work problems or discussing priorities. “I look at it and say there’s an opportunity to boost productivity,” Burns says. “In general, I don’t think people like doing mundane tasks. They genuinely want to focus on adding value and these machines help them add more value than they could on their own.”





Quote for the day:


"It is a fine thing to have ability, but the ability to discover ability in others is the true test." -- Elbert Hubbard


Daily Tech Digest - February 07, 2018

AMD lands Dell as its latest Epyc server processor customer

AMD lands Dell as its latest Epyc server processor customer
AMD scored a significant win in its efforts to retake ground in the data center with Dell announcing three new PowerEdge servers aimed at the usual high-performance workloads, like virtualized storage-area networks (VSAN), hybrid-cloud applications, dense virtualization, and big data analytics. The servers will run AMD's Epyc 7000 series processors. What’s interesting is that two of the three new Dell servers, the PowerEdge R6415 and R7415, are single-socket systems. Usually a single-socket server is a small tower stuck in a closet or under a desk and running as a file and print server or departmental server, not something running enterprise workloads. The R7425 is the only dual-socket server being introduced. AMD said the reason is simple. With up to 32 cores and 64 threads on one CPU, up to 4TB of memory capacity, 128 lanes of PCI Express interconnects, and support for up to 24 direct NVMe SSD drives, the servers can do with one processor what would normally require a dual-socket system.


Security vs. Speed: The Risk of Rushing to the Cloud

There's a lot of assumption when it comes to cloud responsibility. "Some businesses think the whole security issue is something you put into the provider's realm," says Jim Reavis, CEO of the Cloud Security Alliance. "The cloud provider may have security services and capabilities, which you can order as an extra, but a lot of responsibilities shift to the cloud." Cloud providers typically own the hardware, network, host operator, and virtual machines, says Dan Hubbard, senior security architect at Lacework. The customer owns everything above that: operating systems, containers, applications, and all of the related access controls. "This is where things get a little muddy from a corporate perspective," he explains. Most companies have parameters in traditional data centers, and their core principles and rules don't apply in the public cloud.


Identity and the smart city

Smart city internet of things with security camera
Once the smart city blossoms, our smart identity will move out of our homes, into our cars, and onwards through the city walls. Identity is the backbone of digital transactions. And smart innovations can use the power of identity to enable online transactions. Our smart identity will allow us to interact with our smart cars, send money to our partner with a click, use remote patient care by sharing patient-generated data, and secure our entry into the smart airport. Of course, all of this could come with a heavy price – our privacy. All of the transactions are based on sharing identity data of some sort. It is inevitable that our digital identity will be drawn into the machinery of the smart city, but it has to be done with privacy respectful implementation. And, privacy of data and IoT security are intrinsically linked, here is some further reading on the security concerns around IoT devices. But privacy has its own special place in the smart city and our identity may hold the key to the solution.


Six ways by which hackers can crack your password

While you might think of Rainbow Table as eclectic colorful furniture but it is a sinister form of stealing your credentials. The Rainbow Table that we are talking about are used to crack passwords and are yet another tool in the hacker’s evergrowing arsenal. This method requires a good knowledge of computers and coding. Rainbow Tables are basically huge sets of precomputed tables filled with hash values that are pre-matched to possible plaintext passwords. The Rainbow Tables essentially allow hackers to reverse the hashing function to determine what the plaintext password might be. It’s possible for two different passwords to result in the same hash so it’s not important to find out what the original password was, just as long as it has the same hash. The plaintext password may not even be the same password that was created by the user, but as long as the hash is matched, then it doesn’t matter what the original password was.


Oracle’s cloud bravado masks its database despair

Oracle’s cloud bravado masks its database despair
Originally the biggest threat to Oracle’s database dominance seemed to come from the NoSQL crowd, given how data has changed over the past ten years. For decades, the traditional relational database, with its assembly of data into neatly ordered rows and columns, served us well. As data volumes, variety, and velocity changed, the venerable RDBMS seemed outdated. Perhaps it is, but that doesn’t mean enterprises can afford a rush to the exits in favor of the flexible schema that NoSQL offers. As Adrian puts it, “When someone has invested in the schema design, physical data placement, network architecture, etc. around a particular tool, that doesn’t get lifted and shifted easily, something that Gartner calls ‘entanglement.’” As nice as “rip and replace” may sound, once an enterprise has bolted dozens of systems to a particular database, replacing that database may also mean replacing some or many of those interconnected systems.


14 leading tools for predictive analytics and machine learning

Forrester Research has identified 14 leading tools for predictive analytics and machine learning. Venfors included in the research firm's assessment included: Alpine Data, Angoss, Dataiku, Domino Data Lab, FICO, H2O.ai, IBM, KNIME, Microsoft, RapidMiner, Salford Systems, SAP, SAS, and Statistica. Each of these vendors has a comprehensive, differentiated PAML solution; a standalone PAML solution; install base and revenue history; and motivated client inquiries. ... “Angoss KnowledgeSEEKER is a must-have for data science teams that wish to use beautiful and comprehensive visual tools to build decision and strategy trees,” according to Forrester. “It also offers KnowledgeSTUDIO for building models, InsightOPTIMIZER for numerical optimization, and KnowledgeMANAGER for model management. Angoss recently added a coding environment that allows data scientists to use programming languages including R, Python, and the language of SAS.


When is it best to deploy a mesh Wi-Fi network?


While they're still considered inferior when compared with fully wired WLAN implementations, there are a growing number of use cases where a mesh makes sense. In this article, we're going to explore three common scenarios where mesh deployments can prove to be a viable option -- if deployed properly. Before we get into some of these scenarios, it's important to point out a few nuances of mesh Wi-Fi -- and ideal deployment settings where the technology will work best. For one, wireless mesh intelligence has improved significantly compared to years ago. Algorithms have been developed, so wireless repeaters can talk to multiple wireless gateway devices to calculate the optimal path to the wired network based on data such as noise, interferenceand wireless link quality. However, these advancements are gained only when your deployment is configured in a multipoint setting, where repeaters establish connectivity to two or more gateways.


How UN law enforcement tracks global cybercriminals

Like any crime the first point is recognition that it's actually happened. And everything we see around the world, especially in cybercrime is that that often takes a large amount of time. In fact, there's some statistics out there that say that before a cybercrime, for example, an infiltration of the system, is detected could be 13, 14, 15 months, maybe even longer. So a start point is recognition that something has happened, and then if you're a business, what do you do? Do you call the police, or do you not? And some places just choose not to call in law enforcement because they're concerned about their share value, others will then make that call. And then that's where the investigative start point will come to look at what's happened, how has it happened, what are the indicators of compromise, how have cyber criminals or those associated with them done their business?


What is NFV and what are its cost, performance and scaling benefits?

virtualization
Network functions virtualization (NFV) enables IT pros to modernize their networks with modular software running on standard server platforms. Over time, NFV will deliver high-performance networks with greater scalability, elasticity, and adaptability at reduced costs compared to networks built from traditional networking equipment. NFV covers a wide range of network applications, but is driven primarily by new network requirements, including video, SD-WAN, Internet of Things and 5G. According to ETSI, the goal of NFV is to transform the way that network operators architect networks by evolving standard IT virtualization technology to consolidate many network equipment types on to industry standard high-volume servers, switches and storage, which could be located in the data center, in the network or at end-customer premises. NFV replaces traditional, custom-designed network equipment (black boxes) that continues to dominate the installed base of networks.


Cortana explained: How to use Microsoft's virtual assistant for business

“Cortana is always looking out for you, remembering things so you don’t have to, proactively suggesting things you might need to do and helping you do more with less effort,” said Kiesha Clayton, senior communications manager at Microsoft. However, Microsoft’s ability to compete in the increasingly competitive voice assistant market is being tested by rivals with deep pockets and big plans. Amazon, Google and to a lesser extent, Apple, are all adding valuable features to their own voice-activated assistants, increasing interoperability and enabling more complex commands and scenarios. The battle for what many see as the next frontier for computing – and a superior method for interacting with software and hardware – has become fierce. Almost every connected device showcased at CES 2018 in January was equipped with Alexa, Google Assistant or both.



Quote for the day:


"You Can't Lead Just From The Chair In An Office, For People To Follow You, You Have To Be Going Somewhere." -- Gordon TredGold


Daily Tech Digest - February 06, 2018

Logistic Regression Using Python

The goal of a binary classification problem is to predict a class label, which can take one of two possible values, based on the values of two or more predictor variables (sometimes called features in machine language terminology). For example, you might want to predict the sex (male = 0, female = 1) of a person based on their age, annual income and height. There are many different ML techniques you can use for binary classification. Logistic regression is one of the most common. Logistic regression is best explained by example. ... This article explains how to implement logistic regression using Python. There are several machine learning libraries that have built-in logistic regression functions, but using a code library isn't always feasible for technical or legal reasons. Implementing logistic regression from scratch gives you full control over your system and gives you knowledge that can enable you to use library code more effectively.


How to focus on solutions, rather than playing the blame game between business and IT

istock-635719038.jpg
This perennial blame game follows us in our personal lives as well, especially after recent political events. Hop onto your favorite 24-hour cable or radio news show, and it seems the world is on the brink of destruction due to the opposing political party. Every ill in the world, and there are dozens of new ones every day, is the fault of the other side. Take a moment to flip up or down a few channels, and you'll find a station representing the other political party, equally outraged at a world teetering on the brink of destruction due to the actions of your party. ... Amplifying grievances, both real and imagined, has become a big business and surrounds us in our professional and personal lives. It's easy to see why: when you can blame all your professional and personal problems on another party, one that you're unable to change or impact, you're absolved of any accountability or control over your own destiny.


Here's What Happens When Your Mom Or Dad Steals Your Identity

KJ Barnaby Jr. and his mom Trina Patterson.
Minors are attractive targets for identity theft. Because of their young age, they have clean credit reports and often don't discover the theft until they reach adulthood and apply for credit, John Krebs, identity theft program manager with the Federal Trade Commission, told BuzzFeed News. And their social security number and other personal information is easily available to family members — so easily available that there are cases of parents secretly using their adult children's information to open lines of credit. Hailee, a 23-year-old community college student in Pennsylvania, told BuzzFeed News she is working off $500 in debt on a credit card she didn't know existed until recently. Her mother opened the account in her name in 2015 and used it to replace a broken air conditioner. Hailee said she didn't discover the account until Wells Fargo began pestering her about late payments.


Data Science is Changing and Data Scientists will Need to Change Too


There’s a sea change underway in data science. It’s changing how companies embrace data science and it’s changing the way data scientists do their job. The increasing adoption and strategic importance of advanced analytics of all types is the backdrop. There are two parts to this change.  One is what is happening right now as analytic platforms build out to become one-stop shops for data scientists. But the second and more important is what is just beginning but will now take over rapidly. Advanced analytics will become the hidden layer of Systems of Intelligence (SOI) in the new enterprise applications stack.  Both these movements are changing the way data scientists need to do their jobs and how we create value. Advanced analytic platforms are undergoing several evolutionary steps at once. This is the final buildout in the current competitive strategy being used by advanced analytic platforms to capture as many data science users as possible.


Why Linux is better than Windows or macOS for security

Linux, macos and Windows security locks up data
The OS you deploy to your users does make a difference for your security stance, but it isn’t a sure safeguard. For one thing, a breach these days is more likely to come about because an attacker probed your users, not your systems. A survey of hackers who attended a recent DEFCON conference revealed that “84 percent use social engineering as part of their attack strategy.” Deploying a secure operating system is an important starting point, but without user education, strong firewalls and constant vigilance, even the most secure networks can be invaded. And of course there’s always the risk of user-downloaded software, extensions, utilities, plug-ins and other software that appears benign but becomes a path for malware to appear on the system. And no matter which platform you choose, one of the best ways to keep your system secure is to ensure that you apply software updates promptly.

APIs Pose 'Mushrooming' Security Risk

"APIs represent a mushrooming security risk because they expose multiple avenues for hackers to try to access a company's data," explains Terry Ray, CTO of Imperva. "To close the door on security risks and protect their customers, companies need to treat APIs with the same level of protection that they provide for their business-critical web applications.” Nevertheless, APIs remain greatly important for business and IT strategy. "The greatest revenue potential (APIs) provide is removing barriers to growing revenue by integrating platforms and apps so organizations can quickly launch new business models and scale fast," explains Louis Columbus, an enterprise software strategist and principal at IQMS, a manufacturing ERP vendor, in a Forbes piece last year. What's more, APIs are also fueling new methods of developing and deploying software. As organizations seek means to deliver and tweak software faster, they're increasingly breaking up large monolithic code bases into smaller chunks of independent code called microservices.


What is the Industrial IoT? And why the stakes are so high

industrial iot
The industrial internet of things is also referred to as the industrial internet, a term coined by GE, and Internet of Industrial Things. Whatever you call it, the IIoT is different from other IoT applications in that it focuses on connecting machines and devices in industries such as oil and gas, power utilities and healthcare. IoT includes consumer-level devices such as fitness bands or smart appliances and other applications that don’t typically create emergency situations if something goes wrong. Simply stated, there is more at stake with IIoT deployments where system failures and downtime can result in life-threatening or high-risk situations. The IIoT brings computers from IT to operational technology, opening up vast possibilities for instrumentation, leading to major efficiency and productivity gains for almost any industrial operation.


Capacity alone won't assure good cloud performance

Capacity alone won't assure good cloud performance
Truth be told, performance testing is often an afterthought that typically comes up only when there is a performance problem that the users see and report. Moreover, performance usually becomes an issue when the user loads surpass a certain level, which can be anywhere from 5,000 to 100,0000 concurrent sessions, depending on the application. So you discover a problem only when you’re got high usage. At which point you can’t escape the blame. An emerging best practice is to build in performance testing into your devops or cloud migration process. This means adding performance tests to the testing mix and look at how the application workload and connected database deals with loads well beyond what you would expect.  This means looking for a performance testing tool that is compatible with your application, the other devops tools you have, and the target cloud platform where the application is to be deployed. 


securitylock.jpg
Since threat rigidity occurs when FUD is spread, Weeks suggests that a successful cybersecurity professional will carefully communicate to management how prior incidents were handled and convey new ideas on how to eliminate the current threat. "Any message to a group must contain the minimal amount of critical information needed to support the reaction to a threat," explains Weeks. "Not only evaluating all data points, messaging also carefully considers how the recipient perceived those data points. Knowing an audience and what preconceived ideas and hypothesis they may bring is central to proper communications, especially in a threat-response scenario." ... "Ensuring an organization is confident that a cybersecurity professional is managing a response is arguably just as important, if not more so, than implementing a technical control," Weeks writes, adding it is the only way a cybersecurity professional can maintain his or her credibility.


Using blockchain to solve IoT security challenges

In effect, a “permissioned and private” blockchain could be used to safely on-board IoT and other connected devices, registering them in a private blockchain ledger. New devices attempting to access the network would have to be approved, and found to follow the same security policies to be verified and granted access to the chain – thereby eliminating the possibility for “zombie devices” like the ones that carried out the Dyn DDoS attack. Through this model, IoT devices can communicate with like-IoT devices to determine if the “newbie” is up to par on its security settings, making sure that it only has access to data that authorized IoT devices have permissions for, and that it isn’t siloing data or acting as a ‘thingbot’. For instance, if an employee wants to connect their Fitbit while at work, all they need to do is connect it with another IoT device, which would let the Fitbit know what it needs to do in order to be considered secure enough to receive a connection.



Quote for the day:


"You must have long term goals to keep you from being frustrated by short term failures." -- Charles C. Noble