Daily Tech Digest - September 17, 2018

jbl link 300 passive radiator
Oval shaped and available in black or white, the Link 300 has a wrap-around textured mesh grill masking a front-mounted 0.8 inch tweeter and a 3.5-inch woofer, with a large passive radiator in back that’s crucial to that JBL sound signature. The ever-ready Google Assistant wants users to control almost everything by voice. Still, this speaker’s hard plastic and rubbery-surfaced top offers press-deep (not thermal contact) volume and pause/play buttons, as well as the obligatory microphone mute button to tap if you fear Big Brother is listening. Also note the Bluetooth pairing button and a centered home button. Pressing the latter lets you abbreviate a voice command to eliminate the tedium of saying “Hey Google” before calling out a radio station, artist, or action request for news, weather, jokes, movie times, recipes, light switching, door locking, and hundreds of other commands. Although there are just two far-field microphones fitted on the top of the Link 300, they did a good job of hearing my requests, even from across the room.



Cutting through the blockchain hype


“Now, that is very attractive to smaller firms because they have a chance to come together to beat the bigger companies,” he said. “But not so much for the market leaders, without which the blockchain ecosystem won’t spin up fast enough.” Sprenger also touched on the security of blockchain systems that are deemed secure as far as the immutability of information is concerned. However, he said that notion would not apply to data privacy and access management. Citing AdNovum’s Car Dossier project, which uses blockchain as a technological basis to create trust and drive value within the used and second-hand car industry in Switzerland, Sprenger said details such as the location of a car that had been involved in an accident could be captured on a blockchain. “So you have location information and you know who owns the car at a certain point in time – that’s very sensitive information, at least in Switzerland,” he said.



Cloud complexity management is the next big thing

Cloud complexity management is the next big thing
The growing cloud computing complexity was recently documented by the Wall Street Journal that cites a survey of 46 CIOs by KeyBanc Capital Markets. It found that 32 percent said they plan to use multiple vendors to create internal private cloud systems, while 27 percent planned hybrid cloud arrangements. ... Traditional thinking is that cloud computing will replace hardware and software systems, so things will be simpler. You’ll just have to spend a few days moving workloads and data using processes so easy that the applications and data almost migrate themselves. But it turns out to be a complex migration process with many new choices to make and new technology to use. Where you once had five security systems, you now have 20. Where you had three directories, you now have seven. Why? It turns out you cannot just shut down the old stuff, so the hardware, software, and supporting systems remain. At the same time, you are standing up cloud-based systems that used a whole new set of skills and technology. Thus the complexity.


Smart building and IoT technology are highly fragmented

traffic on a city street at sunset surrounded by binary code / smart cars / smart city
One vendor of automation software for, say, elevators might use a much different data format than the manufacturer of a given building’s HVAC systems, making it difficult to integrate these two critical systems into the same framework. Part of what makes the problem of standardization at the building level so difficult is that most systems currently being used for digital facilities administration were originally designed to perform a wide range of functions. For example, the Green Building XML schema, or gbXML, was created to be a standard format for sharing CAD-based information between different building blueprints, but it’s now in use as a tool for live analysis of energy usage in smart buildings, for example. The centralization of these myriad systems is, nevertheless, underway at the National Institute of Standards and Technology. The “IoT-Enabled Smart City Framework,” or IES-City Framework, that NIST is working on with groups in other countries, is largely a conceptual one at this point, but highlights several potential concrete use cases for more unified standards down the line.


Google remotely alters battery settings on some Android 9 Pie devices


If you are using a beta version of Android, the user license agreement gives Google the right to modify system settings for testing purposes, by way of an update sent "over the air" to your device. However, remotely modifying the system settings of devices running the retail version of Android, without informing the user about what's going on, is a new precedent. Under ordinary circumstances, a user can instruct their Android Pie device to start saving battery juice when it reaches 75 percent capacity. This is supposed to be the highest threshold at which power saving can be enabled. Google's unexpected experiment, however, raised this to 99 percent and turned the feature on without notifying the user. When Android Pie's Battery Saver function gets triggered, several strong measures are enforced to reduce drain: Location Services are disabled if the device is locked, apps no longer refresh with new data in the background, and some notifications won't even show up.


Key steps to ensure data protection amidst the growth of mobile apps


It's likely you already have conventional security measures in place to monitor your organization's network, devices and users. That may or may not extend to mobile users entering your system, and if it doesn't, you'll need to look for mobile solutions specifically. This is where a diagnosis of your mobile framework will come in handy. What kind of policies do you have in place to protect your network and users? Are employees forbidden to download and install applications from third-party mobile app stores, for example? Have you instead decided to issue enterprise-exclusive devices and restrict business-related activities to said platforms only? Additionally, consider what can be done to protect the network from users tapping in. For instance, you might look at separate network access between customers and employees. You might also deploy a joint security monitoring and firewall system that can be used to identify, track and block access to various users based on activity.


Cyber security: A work in progress


Whether it is the lack of skills to deal with increasing threats or the fact that many users still fall for scams and click on malicious links or open suspicious documents, one thing has been constant over the past three years. When asked what the biggest problem is – people, process or technology – the results leave little room for ambiguity as to where the challenge lies, with 82% saying that cyber security is a people problem – consistent with the responses of the previous two years. So, what can we conclude from three years of IISP surveys? The ongoing problem that security teams are trying to solve is clear. New attacks continue to emerge and new vulnerabilities are discovered and patched. Data volumes and technology reliance continue to increase and the burden often falls to a team with roughly the same headcount and budget as the year before.


Europe Catches GDPR Breach Notification Fever

Europe Catches GDPR Breach Notification Fever
After notifying authorities, many organizations that have suffered a data breach will be instructed to notify victims, or else choose to do so on their own. Because consumers are already seeing a sharp rise in breach notifications, some have voiced concern that it could lead to "breach fatigue" and perhaps a sense of helplessness at their lack of power to control the fate of their data. "There is an argument that we risk people suffering data breach notification fatigue," says Honan, who is also a cybersecurity adviser to Europol, the EU's law enforcement intelligence agency. "However, I would argue that people are better off knowing that their data is at risk so they can take appropriate action to protect themselves. We should also be aware that breach notifications serve to provide not just the individuals affected by the breach details of what happened but also should be used by other organizations to learn from. If we are more aware of the root causes of breaches in other organizations, we can use that information to better secure our own systems."


What is multi-access edge computing, and how has it evolved?

edge computing
Multi-access edge computing (MEC) is a network architecture that supports compute and storage capacity at the network edge, rather than in a central data center or cloud location. MEC enables rapid and flexible deployment of new applications, and it offers significantly lower latency -- and better performance -- for local applications and data, compared with centralized data center resources. Prototypical MEC applications require ultrafast response times and high availability, and they derive security benefits from localized data flows. MEC provides the intelligence for taking real-time actions and the ability to perform complex data analytics. Applications suited to MEC capabilities include virtual reality, self-driving cars and business-critical IoT applications, all of which require real-time response. Any application that generates a large amount of data can benefit from MEC, as edge computing can make immediate decisions and only transmit aggregate data to central cloud infrastructure, thus significantly reducing network bandwidth requirements.


Hackers wage a new Cold War

The cyber Cold War isn’t just a matter for military and intelligence personnel to ponder. It can easily affect the life of any business. Personal financial information can be stolen and sold for profit by a crime ring, or used to finance a terrorist attack. A company’s intellectual property can be targeted by an industrial rival, or its systems sabotaged, or its stock price manipulated by a fake Twitter account, or its reputation and business relationships ruined through leaks and hoaxes. Citizens can be disenfranchised by hacked voting systems that render polling places inoperable or change recorded votes. Cities can be imperiled by attacks on the electrical power grid, or on the systems controlling large dams, or even on the connected cars and smart homes that fill their streets and neighborhoods. What can you do about it? In our interconnected world, the lines between espionage, war, and business can be all too blurry. If you run a business, work with sensitive data, or work in cybersecurity, you’re already considered fair game—and so are your customers.



Quote for the day:


"Management is efficiency in climbing the ladder of success; leadership determines whether the ladder is leaning against the right wall." -- Stephen Covey


Daily Tech Digest - September 16, 2018

For a digital transformation to be successful, organizations need to have a digital strategy connected with the organization general strategic objectives. This implies that the transformation process should be pervasive through the whole organization, it is no longer and IT or automatization issue. Implies having new digital products and services, a new and more innovative business model, a more complex channel strategy, an aggressive digital marketing and developing the right capabilities to offer customers a good digital experience. All of this of course needs to be supported by technology capabilities and platforms. This can only be achieved if the whole organizational landscape is described and understood. An ‘architectural landscape’ essentially represents the different components of the business – including business processes and information technology resources – making it possible to modify existing operating models in order to harness new technological trends in an efficient and timely manner.


Leveraging Segmentation to Secure IoT

The biggest challenge facing most organizations is simply identifying and tracking all IoT devices connected to the network. Network Access Control allows organizations to authenticate and classify IoT devices securely. Real-time discovery and classification of devices at the point of access allows IT teams to build risk profiles and automatically assign IoT devices to appropriate device groups, along with associated policies. ... Once the network has identified IoT devices, IT teams then need to establish IoT attack surface controls. Segmenting IoT devices and related communications into policy-based groups and secured network zones allow the network to automatically grant and enforce baseline privileges for specific IoT device profiles. While inventory management tools can track these devices, and behavioral analytics can monitor their behavior, Internal Segmentation Firewalls (ISFW) need to be applied to enable organizations to not only quickly and dynamically establish and control network segments but also inspect applications and other traffic that need to cross segmentation boundaries.


CDOs are a crucial hire for any organisation looking to unlock the value of their data. Companies sit on a mountain of data, including marketing and sales, finance, HR and operations and to store, process, analyse and use this data effectively requires a specific set of skills. They have a broad role, encompassing parts of other c-suite roles. But some companies mistake it with the chief information officer (CIO). However, whereas the CIO deals with the technology, infrastructure and software/data engineering of a company, the CDO should be more commercially minded. As Pete Williams, former analytics head at M&S explains: “The CIO can have responsibility to ingest data. But for a CDO, we are talking about a level of commercial awareness that needs to come from the business.” They look at how data can be used by a business to gain a competitive and commercial edge. CDOs are more important than ever, especially now the General Data Protection Regulation (GDPR) has become a business-as-usual requirement. Indeed, the hefty fine for infringing GDPR has helped to elevate data governance to board-level status.


The Future of Networking Is 5G: Businesses Must Prepare Now

Between now and 2020, a few things must still happen: The industry must complete the entire set of 5G standards. Even though most of the radio standards are defined, we have about another year of work on the core network standards. Expect to see both established service providers and startups, even some large enterprises, roll out localized wireless 5G networks over the next year. They will use slight modifications of the 4G core but take advantage of the current patchwork of 5G radio spectrum. Network trials and proof-of-concept applications will represent the bulk of those efforts. The real 5G core, with full network-slicing capability, will start to show up in large-scale production networks around 2020. Understanding 5G and its implications should be high on your company’s priority list. How will setting up a private 5G network slice improve your company’s critical applications, services and security processes? Could new network services open up revenue-generating opportunities?


The Smart City Trailblazers

The Smart City Trailblazers TechNative
Could smart canals ever become a reality? If so, Amsterdam is likely to lead the charge. As an early investor in smart technology, Amsterdam first hired a chief technology officer back in 2004, at a time before some of the foundational concepts of smart cities had terms we would recognize today. As with many smart cities, Amsterdam has long focused on transportation, and the use of satellite navigation technology and other sensor-derived data has provided a more pedestrian-friendly cityscape. The success of these transportation improvements is clear. The city had to update their traffic information in 2016, as the previous data, gathered in 2011, was already obsolete: In that time, the number of cars dropped by 25 percent, and the number of more efficient scooters rose by 100 percent. Amsterdam’s unified approach toward smart technology better enables it to combine both private and public efforts, leading to a cohesive approach that’s already paying off.


Safe Artificial Intelligence Requires Cultural Intelligence


Building machines that can perform any cognitive task means figuring out how to build AI that can not only learn about things like the biology of tomatoes but also about our highly variable and changing systems of norms about things like what we do with tomatoes. Humans live lives populated by a multitude of norms, from how we eat, dress and speak to how we share information, treat one another and pursue our goals. For AI to be truly powerful will require machines to comprehend that norms can vary tremendously from group to group, making them seem unnecessary, yet it can be critical to follow them in a given community. Tomatoes in fruit salads may seem odd to the Brits for whom Kington was writing, but they are perfectly fine if you are cooking for Koreans or a member of the culinary avant-garde. And while it may seem minor, serving them the wrong way to a particular guest can cause confusion, disgust, even anger. ... Norms concern things not only as apparently minor as what foods to combine but also things that communities consider tremendously consequential: who can marry whom, how children are to be treated, who is entitled to hold power, how businesses make and price their goods and services, when and how criticism can be shared publicly.


Bitcoin Blockchain Technology Implementation In India Not An Easy Task

There will be a complete transformation which will cost a fortune in the complete makeover along with a dedicated time. In addition to this, recruiting blockchain experts and data scientists is definitely much costlier as compared to hiring software developers. The biggest applications of blockchain rely on public frameworks such as Bitcoin and Ethereum. All the parties can make transactions within the same network that is monitored. But the entire process is expensive and needs a lot of investment to keep it under operation. For a government projects or any public blockchain-based applications, the role of cost bearer in terms of network maintenance and the validation of transactions is still not clear. Despite all the issues, there is a significant rise in the number of blockchain developer requirement in the market. It is even alleged that cryptocurrency and blockchain jobs are gradually more appealing to job seekers from more conventional sectors especially in Asia.


Onelink: IoT Smoke Alarm Now Alexa-Enabled

First Alarm Onelink IoT Smart Smoke Detector App Notification Alexa Enabled Night Light Home Office
Onelink Safe & Sound is not your ordinary smoke alarm. It is a smart IoT alarm that could detect smoke and carbon monoxide in your home or office. Powered by First Alert’s technology for smoke and carbon monoxide detection, it has an 85-decibel alarm, and it also sends notifications to your mobile phone if the device detects any smoke or carbon monoxide within the premise. It also has a built-in Alexa voice service which allows you to access all the features found on Amazon Echo. You can use voice commands on Onelink Safe & Sound to play your favorite music, audiobooks, control smart devices, and even have it read the news. Also known as an electrochemical gas sensor is a gas detector that measures the density of a target gas by oxidizing or decreasing the target gas at an electrode and measuring the resulting current. To get your very own Onelink Safe & Sound Smoke and CO alarm, check out their product page on Amazon for easy ordering. The device can currently be bought for $241.53. There are also bundles that tie in Amazon Echo devices, in case you’re looking to buy one.


Building the Pillars of Data Modeling and Enterprise Architecture

Enterprise Architecture
Ruff said, “ER/Studio doesn’t do the Data Governance for you,” but Data Governance can’t be done without an Enterprise Architecture solution like ER/Studio as a foundation, “because if you’re not managing your data at the low level, you can’t manage it at a higher level,” she said. Having a complete model of the data gives business users access to that global vision they need and a thorough understanding of the value of that data. “It’s extremely important that every single thing that an organization does has a data representation and a process representation,” in the model, “because it’s really through the modeling that we are able to improve our business processes, improve our data quality, and everything else,” said Huizenga. ... The consequences of non-compliance can be great, so it’s vital to fully understand how regulations affect business practices. “You will need to verify that the safeguards you have in place are indeed sufficient, rather than just assuming they meet the requirements.” Compliance is an active process and it’s imperative that companies implement the appropriate protections proactively.


Transforming The Transformative: The CMO's Role In Leading Digital Transformation

As a CMO, it’s important to remember that technology alone won’t ensure your company’s DX is a success. When Forrester identified the capabilities most vital to DX success, just four out of the top 10 are technology-based.  To accelerate digital transformation and drive revenue growth, CMOs must develop and redesign organizational capabilities like strategy, culture, change management, digital experiences, innovation management and customer journey mapping. Reshaping your culture to be customer-centric is essential in order to support continuous innovation and drive effective change throughout the organization. Unsurprisingly, data and analytics capabilities are most critical among technologies that drive digital transformation success. Modern marketers are data-driven, and in an age where customer experience is the ultimate factor that can make or break a brand, CMOs often rely on customer datawhen strategizing how to meet and exceed high customer expectations.



Quote for the day:


"Great leaders don't need to act tough. Their confidence and humility serve to underscore their toughness." -- @SimonSinek


Daily Tech Digest - September 14, 2018

Apple Watch - Series 4 > Athletics / health / fitness > ECG / heartrate / sinus rhythm
Apple has very clearly focused on healthcare, steadily building an in-house team of experts, most notably around medical devices who know how to work with regulators, researchers and IT. With the introduction of HealthKit, ResearchKit and CareKit, Apple has been at the forefront of unlocking personal health data and allowing users to share it with care teams, researchers and even first responders. Some of the broadest health studies ever conducted have relied on ResearchKit. iPhones and Apple Watches make it possible to contact emergency services and care-givers in seconds, and they provide key information about us using the emergency medical information card that can be accessed on an iPhone – even when the phone is locked. And increasingly, they alert us to signs of danger and disease that might otherwise go unnoticed. Apple is not slowing its efforts; in fact, it’s just getting started. The announcement this week of fall detection, complete with an understanding of different types of falls, is a major improvement aimed directly at older users.



Is Pattern Recognition Killing Innovation?

Underrepresented founders face greater challenges in convincing a fairly homogeneous industry that issues they are solving are significant enough, that the services they provide are widely needed and that they are the ones to take this vision into a multibillion dollar company. Katrina Lake, founder of Stitch Fix, and Shan Lynn Ma, founder of Zola (both multibillion dollar companies) have spoken out about their struggle to raise funding and felt it was due to the lack of diversity in the VC industry. "You can't blame the kind of individual for having that preference, but then you step back and realize 94% of venture investors are male and have similar preferences. And so, I think that it unquestionably made it harder," says Lake. In a sector that is driven by business ‘intuition’ and ‘gut feeling’ based on past patterns, female founders and other underrepresented founders, lose out. This is, to some extent, due to what experts call “homophily” in which similarity breeds connection, which means VCs prefer to hire, invest in, or co-invest with those that are similar to themselves.


Outcomes-based security is the way forward


“We are still finding the same problems every year that we have found in previous years, with things like credential theft and abuse still common, and multifactor authentication – especially for privileged accounts – still rare, even though this would reduce the attack surface massively,” he says. The only real change, he adds, is that there is now a lot more on the corporate IT network, with “almost everything” connected and online as business processes become increasingly digital and the dependency on IT is greater than ever before. “But businesses still assume that if they have spent millions on security products everything is fine, but bad guys usually work out what has been done to make something more secure and will find a way around it, so it is a continual arms race,” he says. As a result, Raeburn believes most cyber security technology innovations tend to provide a false sense of security for organisations because they will be effective only for a limited period of time.


Fighting the fear of new tech with the chief technology evangelist

Training is also paramount, and should be conducted in virtual or test environments as much as possible, long before the new technology goes live. It’s also important to remember that every employee will need to transition to a new technology at a pace that works for them which won’t interfere with their primary objectives. This can be especially important in organizations like healthcare, where doctors and other clinicians can’t be pulled away from their patients, or afford to slow down the treatment process due to the implementation of a new technology. Getting buy-in and acceptance from the workforce that will be using any new system is critical, since they will ultimately make or break the project. And for that to happen, the new technology needs an advocate, someone who can rally the troops and make people actively excited about the pending change long before the wheels start to turn on a new project.


Mobile fraud is increasing, attack rates rising 24% year-over-year

mobile fraud increase
Financial institutions were besieged with 81 million cybercrime attacks in the first half of 2018 on the ThreatMetrix global network. Of these, 27 million were targeting the mobile channel as fraudsters turn their attention to the success story that is mobile banking adoption. Financial services mobile transactions are growing globally, with China, South East Asia and India showing the strongest regional growth. This indicates that the mobile channel is a key enabler for financial inclusion in emerging economies. Overall, the biggest threat in financial services comes from device spoofing, as fraudsters attempt to trick banks into thinking multiple fraudulent log in attempts are coming from new customer devices, perhaps by repeatedly wiping cookies or using virtual machines. Mule networks also continue to negatively impact the global banking ecosystem, particularly as financial crime becomes an ever-more sophisticated and hyper-connected beast. The challenge for financial institutions is detecting mule activity even when individual account behavior may not trigger red flags.


Smartwatches finally evolve into a viable platform

snapdragon wear 3100
The Qualcomm Snapdragon Wear 3100 platform allows for a pervasive display, and the watches have battery life measured in days, not hours. This means that a watch maker can create a watch with a pervasive, attractive face designed to work with the watch case and look good to others, not just the watch user. Therefore, companies like TAG Heuer and Louis Vuitton (who owns TAG Heuer and Hublot) are now planning on releasing smartwatches by year’s end.  Finally, we have smartwatches that embrace the idea of a watch being a showcase of wealth and status. The part the watchmakers need to address is collectability…and that suggests a modular approach, where the movements and the cases are separate. That way you can buy and collect cases and then insert your up-to-date smartwatch component (which will then morph its display to match the case it’s placed in). I’m aware that TAG Heuer was working on a project like this about a decade ago, so my money is on them getting this right first.


Supermicro unveils an insanely fast, insanely thin storage server

Supermicro unveils an insanely fast, insanely thin storage server
The new Supermicro product, the SSG-1029P-NMR36L, has 36 18TB NF1 drives in its 1U chassis, doubling the capacity of a model introduced in January with 288TB. The server also comes with two 28-core Xeon SP processors and holds up to 3TB of memory in 24 DIMM slots and dual 16-lane PCIe network cards. The NF1 drives are all front-loaded and hot-swappable using the NVMe protocol for high-capacity network storage and very low latency performance. The optimized power profile of the fully hot-swap-capable NF1 devices means more processing power can be reserved to drive IO with the fastest CPU and memory available. "At Supermicro, we consistently offer our customers early access to the very latest and best technologies," said Charles Liang, president and CEO of Supermicro, in a statement. "Our 1U NF1 storage server features the most power-efficient, next-generation flash technology with the highest storage density and best IOPS performance. This provides a real time-to-value competitive advantage for users with data-intensive workloads like big data, autonomous driving, AI, and HPC applications."



When to use a CRDT-based database

Everything looks good with the eventual consistency model until there are data conflicts. A few eventual consistency models promise best effort to fix the conflicts, but fall short of guaranteeing strong consistency. The good news is, the models built around conflict-free replicated data types (CRDTs) deliver strong eventual consistency. CRDTs achieve strong eventual consistency through a predetermined set of conflict resolution rules and semantics. Applications built on top of CRDT-based databases must be designed to accommodate the conflict resolution semantics. In this article we will explore how to design, develop, and test geo-distributed applications using a CRDT-based database. We will also examine four sample use cases: counters, distributed caching, shared sessions, and multi-region data ingest. My employer, Redis Labs, recently announced CRDT support in Redis Enterprise, with conflict-free replicated data types joining the rich portfolio of data structures—Strings, Hashes, Lists, Sets, Sorted Sets, Bitfields, Geo, Hyperloglog, and Streams—in our database product.


14 Things I Wish I’d Known When Starting with MongoDB


MongoDB’s security checklist gives good advice on reducing the risk of penetration of the network and of a data breach. It is easy to shrug and assume that a development server doesn’t need a high level of security. Not so: It is relevant to all MongoDB servers. In particular, unless there is a very good reason to use mapReduce, group, or $where, you should disable the use of arbitrary JavaScript by setting javascriptEnabled:false in the config file. Because the data files of standard MongoDB is not encrypted, It is also wise to Run MongoDB with a Dedicated User with full access to the data files restricted to that user so as to use the operating systems own file-access controls. MongoDB doesn’t enforce a schema. This is not the same thing as saying that it doesn’t need one. If you really want to save documents with no consistent schema, you can store them very quickly and easily but retrieval can be the very devil. 


Four key considerations for evaluating graph warehouses

Organizations should also evaluate graph databases in terms of how much reading and writing they’ll require. GOLAP systems mostly read data for query purposes. Since data warehouses are usually batch jobs, their writing capabilities aren’t as important as their ability to swiftly query data for answers. However, the performance of batch loading is crucial. OLTP systems are constantly updating small portions of their transactional data via their writing capacity. For example, tollbooths are continually reading the license plates of vehicles and updating transactional data for passing motorists. Other examples include point-of-sale (POS) checkout systems, either for e-commerce or physical shopping locations. The same data from the tollbooths or consumer checkout is subsequently used by OLAP systems for establishing highway systems improvements, or pricing and marketing options for POS. Another defining attribute of OLTP and OLAP systems is the type of query required. In general, OLTP systems are primed for answering narrow, well-defined questions. 



Quote for the day:


"It's very important in a leadership role not to place your ego at the foreground and not to judge everything in relationship to how your ego is fed." -- Ruth J. Simmons


Daily Tech Digest - September 13, 2018


As the Internet of Things (IoT) and edge computing continue to evolve, doors open for conducting business in new ways, especially when it comes to data management on the edge. Until recently, most data collected on the edge (at or near the collection point) was sent to the cloud or a data center for analysis and storage or discarded. A new, third option has become available: Databases that operate on edge hardware. However, not just any database will do. It should be a database that is specifically built for use in the unique environment of the edge. A database that is truly built for use on the edge will empower organizations with the ability to store and process their data at or near the collection point, setting the stage for mission-critical, and possibly, life-saving decisions to be made much faster and very reliably, without the need to rely solely on the cloud. There is no single database solution that fits all, rather each business should look to its unique case on the edge in order to determine the best choice. Having said that, there are a number of questions that should be asked when choosing a database for use on the edge:



NCSC issues core questions to help boards assess cyber risk


The NCSC’s advice comes after the FTSE 350 Cyber governance health check report 2017 found almost 70% of boards have no training in how to deal with cyber incidents, and 10% have no plans in place should they face a cyber threat. Martin claimed that since cyber security is now a major business risk, board members should aim to understand it “in the same way they understand financial risk, or health and safety risk”. This means encouraging boards to ask questions about the state of cyber in their businesses to make sure they are as much a part of the discussion around security as they are other parts of the firm. Boards were used as focus groups by the NCSC to develop appropriate guidelines that teach board members and their staff to understand, recognise and address threats to their businesses. Martin said these were a “taster of the sort of simple, useful but technically authoritative guidance we will be putting out to business” before the launch of a broader toolkit, developed by experts in cyber security, which will be released later this year.


6G will achieve terabits-per-second speeds

mobile wireless network
“Millisecond latency [found in 5G] is simply not sufficient,” Pouttu said. It’s “too slow.” One of the problems that will be encountered in 5G overall is related to required scalability, he said. The issue is that the entire network stack is going to be run on non-traditional, software-defined radio. That method inherently introduces network slowdowns. Each orchestration, connection or process decelerates the communication. It’s a problem in part because the thinking is that “there will be 1,000 radios per person in the next ten years.” That’s going to be because the millimeter frequencies that are being used in 5G, while being copious in bandwidth, are short in travel distance. One will need lots of radioheads and antennas—millions—all needing to be connected. And it is why one needs to think up better ways of doing it at scale—hence 6G’s efforts. ... “Data is going to be the key,” Pouttu said. The algorithm’s connection needs a trusted, low-latency and high-bandwidth application. That is where 6G comes in.


Everything You Need to Know About AutoML and Neural Architecture Search


Many people are calling AutoML the new way of doing deep learning, a change in the entire system. Instead of designing complex deep networks, we’ll just run a preset NAS algorithm. Google recently took this to the extreme by offering Cloud AutoML. Just upload your data and Google’s NAS algorithm will find you an architecture, quick and easy! This idea of AutoML is to simply abstract away all of the complex parts of deep learning. All you need is data. Just let AutoML do the hard part of network design! Deep learning then becomes quite literally a plugin tool like any other. Grab some data and automatically create a decision function powered by a complex neural network. Cloud AutoML does have a steep price of $20 USD and unfortunately you can’t export your model once it’s trained; you’ll have to use their API to run your network on the cloud. There are a few other alternatives that are completely free, but do require a tad bit more work.


10 Questions To Ask Before You Use Blockchain

According to Gartner (via PwC), 82% of use cases for blockchain were in the financial industry in 2017, but 2018 has seen a broadening out of use cases, with only 46% related to financial services. Other big verticals where blockchain experimentation is going on include transportation, retail, utilities, manufacturing, insurance, health care and government. The biggest use cases are asset tracking in transportation and government; record-keeping in utilities, health care and insurance; provenance in retail; and securities trading. Because of the hype surrounding blockchain, we are increasingly seeing it being used in situations where better or simpler methods may suffice, such as a database with application logic. Brian Scriber's recent paper in issue No. 4 of IEEE Software gives a great framework for evaluating if a blockchain is applicable in a given situation. Based on that paper and framework, we developed the following simplified list of 10 questions leaders should ask before they embark on using blockchain to address a specific need


Digital Twins Concept Gains Traction Among Enterprises

Digital replicas of industrial equipment in industries ranging from food and beverage to manufacturing and health care will be widespread, says Schneider Electric CIO Elizabeth Hackenson.
Digital twins are software models of sensor-enabled physical assets and designed to monitor performance and help reduce costly unplanned equipment outages. The convergence of advanced technologies such as sensors, cloud services, big data and machine learning has brought this idea to fruition. By 2020, at least half of manufacturers with annual revenues in excess of $5 billion will have at least one digital twin initiative launched for either products or assets, according to Gartner Inc. Schneider is among several companies selling software to help customers develop digital representations of physical assets, such as pumps and motors at oil and gas plants and machine building companies. One part of the software also allows customers to calculate the long-term maintenance and estimated potential profit of operating, say, a turbine for a few hours more a day. This is a new source of revenue for the company, with business has accelerating after Schneider’s reverse takeover of British engineering software provider Aveva Group PLC


AI is fueling smarter collaboration

The first is improving the ability of individuals to access data. "Today, finding a document could be tedious [and] analyzing data may require writing a script or form," Lazar said. With AI, a user could perform a natural language query -- such as asking the Salesforce.com customer relationship management (CRM) platform to display third quarter projections and how they compare with the second quarter -- and generate a real-time report. Then, asking the platform to share this information with the user's team and get its feedback could launch a collaborative workspace, Lazar said. The second possible benefit is predictive. "The AI engine could anticipate needs or next steps, based on learning of past activities," Lazar said. "So if it knows that every Monday I have a staff call to review project tasks, it may have required information ready at my fingertips before the call. Perhaps it suggests things that I'll need to focus on, such as delays or anomalies from the past week." Another example is improving the use of meeting tools. 


Blockchain Is Changing How Media and Entertainment Companies Compete
In particular, several new business models are emerging in the media and entertainment industries, where monetizing value has been — and continues to be — a significant challenge. Newspapers and magazines, for instance, still struggle to monetize value in the face of plentiful free content and limited mechanisms for protecting intellectual property. Advertising revenue, long an important income source for publications, has shifted to social media and search platforms, and media companies must figure out how to compensate. In the music world, to cite another example, digital content distribution via streaming is beneficial to major record labels and top-tier artists. But it isn’t commercially viable for smaller labels or average musicians, who receive only a tiny fraction of the revenue generated from their music. Some experts think blockchain may increase the share of revenue captured by content creators and producers by introducing new mechanisms for monetization. However, the current hype about blockchain, the diversity of use cases being proposed, and their potential disruptive effects make it difficult for companies to judge what might be possible for them and what’s merely a pipe dream.


The Four X Factors of Exceptional Leaders


In defining “best-performing leaders,” we focused on a number of factors, but gave priority to actual delivery against the organization’s strategy: the clarity and alignment those leaders generated and the pace of the transformation they were able to drive successfully. In other words, we prioritized the “how” of their leadership, while also considering the “what” of their results. Although our analysis did consider share price as a factor, we weighted it lower than actual performance against strategic goals. For example, one tech company in our data set announced a major shift to mobility and the cloud, and subsequently initiated a round of expensive acquisitions, most of which ended up being wound down or spun off at a discount because they weren’t scalable. The share price remained steady during the period, mainly because of efficiencies created in managing the legacy business, but the future planks of its strategy remained largely unrealized. Our analysis discounted leadership’s effectiveness based on that failure.


Tech Companies Poach AI Talent from Universities

It's not a new trend, and many companies have done it, from Microsoft to Google to Facebook. But it seems to have picked up steam in recent years as organizations are scrambling to hire machine learning and AI talent in a very tight market. "We've done it too," said Eric Haller, executive vice president and global head of Experian DataLabs, an analytics and machine learning R&D organization inside the credit reporting bureau company. He recently spoke with InformationWeek in an interview. "We've recruited professors in London and Sao Paulo. Our chief scientist there was a top professor and still teaches at the University of Sao Paulo…It's definitely a trend." For some academics, making a move to industry can mean a big boost in pay -- after all, AI and machine learning skills are in high demand and highly paid. Even universities that pay their top professors well won't be able to compete with the likes of Google and Facebook. There are benefits beyond financial rewards, too.



Quote for the day:


"The mediocre leader tells The good leader explains The superior leader demonstrates The great leader inspires." -- Buchholz and Roth


Daily Tech Digest - September 12, 2018

Smart Cities: How They’ll Make Us Healthier

Smart Cities: How They'll Make Us Healthier TechNative
Pollution is inevitable in large cities. However, smart cities will be better equipped to detect pollution and enable experts to reduce it. Already, cities are installing air quality sensors to find out where air quality can be improved, enabling cities to detect sources of pollution that might have gone undetected in the past. Sensors have already revealed that pollution hot spots can occur in unexpected places, and steps taken to reduce air pollution will improve the health of all residents. Smart cities are also better able to tackle water pollution. Sensors can detect where water is being polluted, letting planners uncover where pollution is entering nearby bodies of water. Furthermore, sensors can be installed to detect lead and other pollutants in drinking water on a more fine-grained basis, enabling health officials to act more promptly and prevent infections and poisoning.... Television and radio are often used by cities to provide health information to residents. However, people are increasingly turning to the internet for information, and they might miss out on local health alerts.


RabbitMQ in Microservices


Image title
RabbitMQ is one of the simplest freely available options for implementing messaging queues in your microservices architecture. These queue patterns can help to scale your application by communicating between various microservices. We can use these queues for various purposes, like interaction between core microservices, decoupling of microservices, implementing failover mechanisms, and sending email notifications via message brokers. Wherever two or more core modules need communicate with each other, we should not make direct HTTP calls, as they can make the core layer tightly coupled and it will be difficult to manage when there are more instances of each core module. Also, whenever a service is down, the HTTP call pattern will fail, as after a restart, there is no way to track old HTTP request calls. This results in the need for RabbitMQ. In microservice architecture, for this demonstration, we will use an example pattern of sending email notifications via various core microservices. In this pattern, we will have a producer, any of the core microservices, which will generate the email content and pass it on to the queue.


Why Python is so popular with developers: 3 reasons the language has exploded

istock-802780432.jpg
Python has the best claim to being the fastest-growing major programming language right now, said Stack Overflow data scientist Julia Silge. Developer Stack Overflow visits to Python have grown very quickly, she added: This year, it became the most visited programming language in the world on the site. The rate of growth is high across industries including academia, manufacturing, electronics, finance, energy, tech, and government, Silge said. It's not shrinking in any industry, she added. "The rise of Python is linked to businesses understanding that they are generating all this data all the time, and if they either train people internally or hire people who have these skills, they can use that data to make better decisions, and it can help their businesses thrive," Silge said. "It's a great first programming language to learn, and also it is a center of one of the most impactful trends driving how businesses are adding value to what they're doing right now."


Multi-cloud strategy: Determine the right cloud for your workloads

The skills revolve around managing, configuring and maintaining the different cloud service provider’s environments. So, for AWS it is being able to handle and manage all of the AWS configurations, deployment and features that are being brought in. Same thing for Azure and Google Cloud. It’s setting up the network infrastructure, setting up the firewall, setting up the virtual cloud environments. Each one of the vendors does that in a different way; there’s no one-size-fits-all that will work across all of the environments. My highest recommendation for anybody going into the cloud is automating their environment as much as possible, but the script automations are different in each one of those environments. I can automate building my workload in AWS, but I can’t take that same script and run it in Azure to build my workload environment there.


8 Cryptomining Malware Families to Keep on the Radar

Image Source: Adobe Stock (TTstudio)
Cryptojacking activities that bleed off victims' compute power to mine for cryptocurrency have skyrocketed, as cybercriminals find it to be one of the most profitable low-key attacks on the Web today. It has even pushed out ransomware as cybercriminals' favorite means of raking in cash. While cryptomining malware may not be calibrated specifically to steal data, it should remain on the radar of enterprise defenders. Campaigns carried out by these malicious tools do real damage to computing equipment and siphon off vast amounts of electricity, never mind the fact that their infections are the perfect foothold to carry out other kinds of devastating lateral attacks. Here are some of the most prevalent and powerful cryptomining malware families active today. Ericka Chickowski specializes in coverage of information technology and business innovation. She has focused on information security for the better part of a decade and regularly writes about the security industry as a contributor to Dark Reading.


Alternatives to Nmap: from simple to advanced network scanning

Alternatives to Nmap: from simple to advanced network scanning
There are alternatives – not many – that range in technical sophistication from tools with GUIs that can ease you into performing the essentials of network maintenance to more advanced software that is similar to Nmap itself. ... You don't need to install either one on a computer. Each is an executable that you can launch right away, running from a USB flash drive, for example. Advanced IP Scanner is designed to scan LANs. Through its GUI, it shows you all the computers and other devices connected to your LAN. Scan results can be exported to a CSV file. You can also access shared folders on a computer or device, control them remotely (using RDP and Radmin), or shut down a computer or device. Advanced Port Scanner scans for open ports on network computers and other devices, and it shows any version information it finds for programs running on detected ports. Commands can be executed on remote computers or devices, and resources can be accessed from them via FTP, HTTP, HTTPS or shared folders. As with Advanced IP Scanner, you can remote-control a computer or device on the network using RDP and Radmin, or you can shut it down.


What is Microsoft’s Intune – and how well does the UEM tool really work?

mdm
Intune is designed to give IT admins an easy way to manage a variety of devices – whether corporate or personal – in a way that protects corporate data while still allowing employees to get their jobs done. It combines mobile device management (MDM) capabiltiies with mobile application management (MAM) features and puts them all in a single console. Though obviously tied to Windows 10 and other Microsoft products, it is designed to manage hardware running other operating systems. Intune's arrival seven years ago came as companies were being forced to manage a sudden onslaught of devices accessing corporate data and networks – fallout from the bring-your-own-device (BYOD) trend that took off after the release of Apple's iPhone in 2007. "Even if the workers are not mobile all the time, the way we do business today requires a different approach, and that's where Intune comes in," said Maura Hameroff, Microsoft's director of security product marketing. As a subscription service, Intune charges companies on a per user/per month basis. It can be purchased as a stand-alone product for $6 per seat or for $8.74 per seat as part of Microsoft's Enterprise Mobility Suite



Scaling Business Agility: Three Essential Pillars for Being Vs. Doing Agile

If each business unit within an organization operates as a separate function, this has to be the first candidate for transformation. Even before we align the cadence and processes, it’s important to ensure everyone understands the purpose of working together. System thinking evolves as we help the team understand the vision and purpose. Top management must be aligned before a team gets involved. Transparency and working agreements within and across teams are vital in building a healthy culture. It’s at all levels, not just top or middle management. This is about enabling and adding value at every level in the ecosystem. It starts with product management who plays a crucial role in identifying and communicating value to the entire stream. From Engineering and Support to Program Management and Sales, everyone has a role to play in the value ecosystem. Those leaders must be identified and nurtured by management and the leaders need to hone their skills, not just to show or lead, but to be part of the journey.


Are You the Barrier to Innovation?


Risk aversion gets embedded in a culture and often reflected in structure, unspoken values, and the architectures that support it. Such architectures are heavily redundant, often held in datacenters controlled by the organization, monitored to within an inch of life (which can also lead to the Sisyphean chore of wringing out every ounce of performance), and protected by layers of security and abstraction. The goal is stability, but its price is stagnation. The fear of additional complexity also leads to risk aversion in trying new technologies even for small, non-critical projects. All too often, these projects can grow into core pieces of functionality that other systems rely on. An organization with an agile mindset will isolate such systems and abstract their functionality behind an API, but traditional IT operations would prefer to avoid them completely as they require knowledge dependencies that complicate the hiring process and add to the list of expertise the team must gain.



7 Costly Mistakes Entrepreneurs Make in The Digital World


In theory, SEO is very simple. Find and use the right keywords and Google will rank it near the top of any searches--thus making your business easily found by potential customers. But like many things, while the theory is simple and straightforward, the practical implementation of it is anything but. The rules for SEO are constantly changing and the internal workings can often be complex enough to give even Einstein a headache trying to figure it out. And once you have figured it out, you need to get the balance right between not enough SEO and too much SEO. Unless your business is SEO, then you're not going to have the skills to keep up, nor the time to divert from your core business to deal with it. A bit like plumbing, it seems easy, but it's much easier to get an expert in than it is to clear up the potentially costly mess getting it wrong. If you want to get your website found, then you need to make sure that you have the right keywords. These are the words or phrases that people are searching for on Google. The better your SEO keywords, the higher your business will rank.



Quote for the day:


"You have to lead people gently toward what they already know is right." -- Phil Crosby