Daily Tech Digest - February 14, 2019

Stumbling with your public cloud deployments? An industry analyst offers advice.

advicecloud
Yuen went on to say lines of business (LOB) or other groups are not working with core IT as they deploy to the public cloud; therefore, they are not getting all of the advantages they can. “You want to maximize the capabilities and minimize the inconvenience and cost. Planning is absolutely critical for that -- and it involves core IT,” says Yuen. To ensure the best results possible, you should involve key players in the organization. For example, the organization’s procurement experts should be consulted to ensure you get the best deal for your money. Budgeting is also important. “Companies very quickly realize that they don’t have variable budgets,” continues Yuen. “They need to think about how they use cloud and the consumption cost for an entire year. You can’t just go about your work and then find that you are out of budget when you get to the second half of the fiscal year.” The beauty of an as-a-service model is you only pay for what you use. The risk is you have a virtually unlimited capacity to spend money.


Using the SharePoint Framework with Teams to build simple custom apps

SPFx goes further than integrating your Teams applications with SharePoint, building on the growing Microsoft Graph APIs to integrate with Office 365 and Microsoft 365. Like older SharePoint development technologies, you can use web parts from Microsoft, third parties, a growing set of open-source community components, or custom components developed by your own SharePoint development team. More complex code can be written in TypeScript, Microsoft's JavaScript-based language, which gives you strong typing and tools that make it easier to build and manage large-scale web applications. Using TypeScript will make it easier for server-side developers who've been using C# to build SharePoint applications to transition to client-side in-browser code, as TypeScript builds on many familiar C# development concepts. Using SPFx 1.7 you can now also use web parts to handle data connections, so you can extract information from a page and send it back to a server, and link different web parts in the same page.


Gartner: debunking five artificial intelligence misconceptions

Gartner: debunking five artificial intelligence misconceptions image
What is artificial intelligence? Well, these days, the answer depends on who you ask. For some, it means computers have finally achieved, just like us, general intelligence; what Ray Kurzweil would call the “singularity“. For others, it’s merely a conglomeration of existing tools; it’s machine learning, natural language processing, deep learning and so on. But, with AI technology making its way into the real world of business, it is crucial that business and IT leaders fully understand how AI can create value for their business and where its limitations lie. As Alexander Linden, research vice president at Gartner, said: “AI technologies can only deliver value if they are part of the organisation’s strategy and used in the right way.” ... human intervention is always required to develop AI-based machines or systems. The involvement may come from experienced human data scientists who are executing tasks such as framing the problem, preparing the data, determining appropriate datasets


The Short Life of Enlightened Leadership (and How to Extend It)


The history of socially responsible companies shows that when virtuous programs and policies exist primarily because an individual leader cares about them, his or her successors have no problem removing them. These practices are far more likely to last when they are institutionalized in rules of governance. Thus, a few enlightened capitalists have attempted, in one form or another, to institutionalize their practices in an organizational structure. Sometimes this involves a family business structure; sometimes, as with England’s 174-year-old Economist magazine, it involves a board of independent trustees charged with safeguarding its corporate and editorial independence. It can also rely on an independent trust or foundation that owns most of the company stock. Among the companies that have tried this solution are the Encyclopedia Britannica; the tea company Camellia; and some of Continental Europe’s largest corporations, including IKEA, Heineken, and Bertelsmann.


Ransomware warning: That romantic message may hide a nasty surprise


Subject lines used in this GandCrab campaign all relate to romance. Examples include 'This is my love letter to you', 'Wrote my thoughts down about you', 'My letter just for you' and 'Felt in love with you'. The body of the email only contains a * symbol and comes with an attachment - a zip file containing a JavaScript file. The file name follows the same pattern in every malicious email - 'Love_You_2018_' followed by seven or eight random digits. If the user chooses to extract and execute the JavaScript file, it'll download and excute GandCrab ransomware form a malicious URL embedded in the script. Before the ransom note is presented to the victim, they're asked to select a language to see it in – English, Korean or Chinese, something which researchers suggest indicates the main targets of those behind GandCrab. After this, the user is directed to a ransom note explaining that their computer has been encrypted and that they need to pay a ransom in Bitcoin or DASH cryptocurrency in order to get them back.


Continuous Delivery - It’s Not All About Tech!

Changing habits is hard. A habit is something you automatically do so, you have to work at stopping doing the old habit and replacing it with a new one. Publishing the data that highlighted the problems in our release cycle helped create an acceptance of the problems, plus a will to fix them.  We tried a few things to help us form good habits. For example, we had hours of delay due to the people involved in the release process sending emails as the primary communication method. An email would get sent, a message was communicated, job is done. However, until the recipient has read and understood the email, you haven’t communicated anything. If they are in a meeting, or only check their emails once or twice a day (a good habit!), then it could be hours before they see it. To quote a friend, Rob Lambert (@Rob_Lambert), “communication is in the ear of the listener”.


That VPN may not be as secure as you think

VPN, security, network security, internet security
That’s more serious than unintended leaks, the team explains — users trust providers not to snoop. The point of a VPN is to be private and not get monitored. VPN use ranges from companies protecting commercial secrets on public Wi-Fi to dissidents. Some botches are actually “defeating the purpose of using a VPN and leaving the user’s online activity exposed to outside spies and observers,” the researchers say. Other problems the team discovered include that some VPNs allegedly lie about the server locations. “We found some VPNs that claim to have large numbers of diverse Internet connections really only have a few servers clustered in a couple of countries,” the researchers wrote. They say they found at least six VPNs faking routings through certain countries when they were actually going through others. That possibly creates potential legal issues for the user, depending on local laws. Other trouble areas included privacy policies. Fifty of the 200 VPN providers that were tested had no privacy policies published on their websites at all, the group says.


Impending takeover of Ultimate Software leaves its RPA solution for HR undiminished

RPA for HR: Impending takeover of Ultimate Software leaves its RPA solution for HR undiminished image
Before we go any further, we must deal with the elephant in the data centre: Ultimate Software is subject to an $11 billion bid from a group of investors led by private equity outfit Hellman & Friedman. In a statement, the company said: “Our customers will benefit from our ability to bring new features and services to market more quickly, while still enjoying the same high level of service they have with Ultimate today, or better, with new innovations to our offerings.” Or to put it another way, whatever happens next — and by the way, the agreement the company has with the prospective investors allows it a 50-day ‘go-shop’ period, to look for alternative deals — it’s in no ‘would be’ purchaser’s interest to limit the product offering. The bid represents a 19% premium on the share price before the offer. And the company says that post purchase, its existing management under the leadership of Chief Executive Scott Scherr, will still be at the helm.


A Look Back at 2018 and What’s to Come in 2019

On the topic of certification, one of the significant changes we made during 2018 was actually in our Professional Certification Programs for Open Certified Architects (Open CA) and Open Certified Technical Specialists (Open CTS). Using The Open Group Open Badges digital credentials program, individuals seeking professional certification as either a Certified Architect or Certified Technical Specialist can now achieve their certification in stages by working toward a requisite number of badges required for each program. We’re very proud of the work that has gone into creating milestone badges for these certifications—and we are looking forward to the launch of a new professional standard for Data Scientists early in 2019, as well. Open Badges for certification to many of our standards, such as TOGAF, ArchiMate, IT4IT, and Open FAIR are also now available.


OIG identifies risks related to NIH’s sharing of sensitive data

The agency also agreed with OIG’s recommendations to ensure security policies keep current with emerging threats and to make training and security plans a requirement. Nonetheless, NIH disagreed with the OIG’s call for additional controls to ensure training and security plan requirements have been fulfilled. In addition, the agency also informed auditors that it recently established a working group to address and mitigate risk to intellectual property, as well as to protect the integrity of the peer-review process. “We maintain that our findings and recommendations are valid,” concluded OIG. “We recognize that NIH reported that it is already taking certain actions, such as the working group that was recently established, that may address our recommendations. We also provided NIH with other potential actions to address our findings and recommendations. If NIH determines that it does not need to strengthen its controls, it should document that determination consistent with applicable federal regulations and guidance.”



Quote for the day:


"A company is like a ship. Everyone ought to be prepared to take the helm." -- Morris Wilks


Daily Tech Digest - February 13, 2019


It’s an opportunity to build a mutual relationship, with the trainee benefiting from funded training and the opportunity to apply their knowledge in a real business. The competitive market for the brightest cybersecurity talent has seen the value of training certifications soar. In fact, a recent study found six of the twenty highest-paying IT certifications were in security, including the top certification, CISSP. However, as cyber threats are constantly changing and growing more complex, there’s no one certification that covers all aspects of cybersecurity. The cyber landscape is continually changing, so there is always something new to learn. Existing courses are frequently updated and new courses are frequently being bought to market. This is part of what makes cybersecurity specialists such a sought after talent, as they must have such a versatile skillset and adapt to a growing number of new threats. Organisations willing to fund the constant development of cybersecurity specialists place themselves in a solid position to both attract and retain the best talent.



No, you can't take open-source code back

More specifically, the downstream license grant says "the recipient automatically receives a license from the original licensor to copy, distribute or modify the Program subject to these terms and conditions." (GPLv2§6). So in this step, the contributor has granted a license to the downstream, on the condition that the downstream complies with the license terms. That license granted to downstream is irrevocable, again provided that the downstream user complies with the license terms: "[P]arties who have received copies, or rights, from you under this License will not have their licenses terminated so long as such parties remain in full compliance" (GPLv2§4). Thus, anyone downstream of the contributor (which is anyone using the contributor's code), has an irrevocable license from the contributor. A contributor may claim to revoke their grant, and subsequently sue for copyright infringement, but a court would likely find the revocation was ineffective and the downstream user had a valid license defense to a claim of infringement


3 Digital Strategies for Companies That Have Fallen Behind


Of these three, agility is the glue for ensuring positive revenue and EBITDA success in digital adoption — even if the growth is lower than the potential from an all-out digital reinvention. Agility seems easier to achieve than speed: more than twice as many companies in our survey (35% of the total) are agile than those that are fast moving, Second, digital M&A can be a way to get back into the race. Merging with or buying digital firms can enable firms to catch up on scale and add missing digital competencies. Currently, when engaged in M&A, more than half of incumbents are still thinking about doing analog M&A. This can simply slow down transformation efforts. But of those looking to use digital M&A, 45% say they are doing so for scale, and 55% are doing so to acquire crucial missing digital capabilities. The latter is especially accretive to profitable growth. Finally, there is the question about how to react to the emergence of digital native platforms: resist them or cooperate.


Resolving the Blockchain Paradox in Transportation and Logistics

The highly fragmented value chain of multiple unrelated parties makes the industry well-suited for blockchain application. But this fragmentation also hinders the adoption of a common blockchain standard. Of the executives we surveyed, 60% believe that a lack of coordination among industry players and the absence of an ecosystem are major barriers to blockchain adoption. Fragmentation also impedes the selection of a common technical standard. The absence of such a standard means that blockchain applications pursued by companies and consortia as standalone initiatives will likely not be compatible with each other. The limited scale of these initiatives increases the cost of adoption and diminishes the potential returns. The challenges of the fragmented value chain are exacerbated by regulatory complexity. T&L companies typically operate in multiple countries and jurisdictions with varying, and often complex, regulatory requirements. More than one-third (35%) of surveyed executives cited regulatory compliance issues as an important barrier to blockchain adoption.


Coming soon: On-premises 5G gear for enterprises

5g 4g wireless wireless network devices
With all major mobile carriers expected to offer 5G this year, enterprises that want to take advantage of this next-gen mobile data service need to start thinking about how to support it on site. Anticipation is keen for 5G, given that it promises to deliver faster speeds and lower latency than the current premium wireless technology, 4G LTE. Ideally, 5G networks could deliver fast internet to areas of the country where wired broadband is unavailable, and more reliable connections to a variety of devices including not only computers and smartphones but also appliances, automobiles and security systems. ... More details emerged in December, when a 5G hub device developed by HTC was revealed for use on Australian carrier Telstra's 5G network. The HTC 5G Hub for Telstra has a display about the size of a small smartphone to show status information for 5G and Wi-Fi signals, and the devices connected to it. It's speculated that the display – larger than usual for a hotspot – could also be used to show pictures and video.


Positive discrimination needed to remedy shocking under-investment in fintechs founded by women

VCs, which are male dominated, even ask women and men different questions when interviewing them about their businesses. “A study from Harvard found that the questions they ask men a geared towards success such as ‘what are you going to do when you achieve this valuation’ whereas the questions for the females were ‘what happens if you do not achieve the valuation. She said if 15% of total venture capitalist investment was in female led fintechs the industry would have to work on strategies to address this but as it is 3% positive discrimination might be the only way. The problem is that to attract investment to a fintech the founders need to have years of experience at the most senior level in the finance, which itself has a lack of diversity and is dominated by men. Fintech needs to overcome this problem. She gave me some other great insights which I will expand upon in an analysis article.


New Raspberry Pi challenger promises 7x the speed at 2x the price

odroidn2board.jpg
As with most single-board computers, the Odroid N2 is a board for developers working on software and hardware projects, but has a wide range of potential uses, including as a media center, file server or even as an everyday computer. The Odroid-N2 trumps the specs of the Raspberry Pi 3 Model B+, using far faster DDR4 memory clocked at 1320MHz and offering up to 4GB RAM, four times that of the Pi's flagship board. Graphics and display wise, the 846MHz Mali-G52 GPU promises better 2D and 3D performance, and designed for smooth playback of 4K video, specifically 60FPS of H.265-encoded footage, as well as supporting various HDR video formats. There's also four USB 3.0 ports, compared to USB 2.0 on the Pi 3 B+, and true Gigabit Ethernet, compared to a max throughput of about 300Mbps on the Pi 3 B+. One downside for the Odroid-N2 relative to the Pi 3 B+, however, is the lack of wireless connectivity. For storage, you can add up to 128GB eMMC Flash via a module connector, alongside the Odroid's microSD card slot. 


AI ethics: Time to move beyond a list of principles image
Indeed, ‘an ethical approach to the development and deployment of algorithms, data and AI (ADA) requires clarity and consensus on ethical concepts and resolution of tensions between values,’ according to a new report from the Nuffield Foundation and the Leverhulme Centre for the Future of Intelligence at the University of Cambridge. Organisations and governments need help, and this report provides a broad roadmap for work on the ethical and societal implications of ADA-based technologies. The roadmap identifies the questions for research that need to be prioritised in order to inform and improve the standards, regulations and systems of oversight of ADA-based technologies. Without these, the report’s authors conclude the recent proliferation of various codes and principles for the ethical use of ADA-based technologies will have limited effect. ... This will require identifying how these terms are used in different disciplines, sectors, publics and cultures, and building consensus in ways that are culturally and ethically sensitive. 


Many analysts are forced to wait in line to get data cleaned, passing specs back and forth, and iterating endlessly before they can interrogate the data or run the algorithms that will improve their business. It’s time to ask why people who know the data best can’t do the preparation. Why aren’t the users with the business context in their heads, in a position to take care of data preparation? Trying to meet the needs of an exploding number of analysts and data scientists at a time when IT budgets are flat or shrinking is not efficient. IT organisations simply can’t scale to meet the data provisioning needs of the business. Enterprises need to shift the burden of the work to end users. It’s the only way to keep up and the only way to stay competitive. Here’s the secret: organisations shouldn’t covet this work anyway. Remember, it’s janitorial work — cleansing, structuring, distilling, enriching, validating, etc. Organisations should give this work to those doing the analysis and they’ll be grateful for it.


The long, slow death of commercial Unix

unix slow death headstone rip cemetery
Unix’s decline is “more of an artifact of the lack of marketing appeal than it is the lack of any presence,” says Joshua Greenbaum, principal analyst with Enterprise Applications Consulting. “No one markets Unix any more, it’s kind of a dead term. It’s still around, it’s just not built around anyone’s strategy for high-end innovation. There is no future, and it’s not because there’s anything innately wrong with it, it’s just that anything innovative is going to the cloud.” “The UNIX market is in inexorable decline,” says Daniel Bowers, research director for infrastructure and operations at Gartner. “Only 1 in 85 servers deployed this year uses Solaris, HP-UX, or AIX. Most applications on Unix that can be easily ported to Linux or Windows have actually already been moved.” Most of what remains on Unix today are customized, mission-critical workloads in fields such as financial services and healthcare. Because those apps are expensive and risky to migrate or rewrite, Bowers expects a long-tail decline in Unix that might last 20 years.


4 Techniques Serverless Platforms Use to Balance Performance and Cost

Serverless functions are designed to have almost no performance tuning knobs; the performance model is supposed to give the impression of an infinitely scalable, infinitely reliable computer. However, in reality there are practical limits. For example, all serverless computing systems have the “cold start” problem-the latency of starting a function (more on this later). Even so, a large number of real world applications find these constraints acceptable. ... it is useful to have an understanding of what the most basic Function-as-a-Service (FaaS) platform looks like under the covers - as functions are the building-blocks and execution units of serverless computing. Let’s review a reference architecture for a ‘representative’ FaaS platform, which we have been developing in collaboration with a number of companies and universities within the SPEC RG CLOUD group. Covering the entire reference architecture is worth an article on its own (which we are working on!).



Quote for the day:


"Little value comes out of the belief that people will respond progressively better by treating them progressively worse." -- Eric Harvey


Daily Tech Digest - February 12, 2019

A.I. Shows Promise as a Physician Assistant


Using the technology, Dr. Kang Zhang, chief of ophthalmic genetics at the University of California, San Diego, has built systems that can analyze eye scans for hemorrhages, lesions and other signs of diabetic blindness. Ideally, such systems would serve as a first line of defense, screening patients and pinpointing those who need further attention. Now Dr. Zhang and his colleagues have created a system that can diagnose an even wider range of conditions by recognizing patterns in text, not just in medical images. This may augment what doctors can do on their own, he said. “In some situations, physicians cannot consider all the possibilities,” he said. “This system can spot-check and make sure the physician didn’t miss anything.” The experimental system analyzed the electronic medical records of nearly 600,000 patients at the Guangzhou Women and Children’s Medical Center in southern China, learning to associate common medical conditions with specific patient information gathered by doctors, nurses and other technicians.


Why CIOs must become CHROs for successful digital transformation

In the next two years, CIOs will be tasked with changing company culture, adopting the title of chief HR officers (CHROs), according to a Gartner report released on Monday. Setting the values and cultural missions of an organization typically falls on the HR representative, but partnering IT and HR together may help uncover more efficient strategies for completing the same goals, the report noted. The union of IT and HR can help create business processes that align with the desired company culture, the report said. However, cultural change won't be achieved quickly or easily, so companies should start small, said Elise Olding, research vice president at Gartner, in a press release. In the next two years, 80% of midsize to large companies will shift their culture in a way that propels their digital transformation efforts, the report found.


Introducing Adiantum: Encryption for the Next Billion Users


Most new Android devices have hardware support for AES via the ARMv8 Cryptography Extensions. However, Android runs on a wide range of devices. This includes not just the latest flagship and mid-range phones, but also entry-level Android Go phones sold primarily in developing countries, along with smart watches and TVs. In order to offer low cost options, device manufacturers sometimes use low-end processors such as the ARM Cortex-A7, which does not have hardware support for AES. On these devices, AES is so slow that it would result in a poor user experience; apps would take much longer to launch, and the device would generally feel much slower. So while storage encryption has been required for most devices since Android 6.0 in 2015, devices with poor AES performance (50 MiB/s and below) are exempt. We've been working to change this because we believe that encryption is for everyone.


3 reasons you shouldn’t use chatbots

First, you really need to have a use for them. For example, building systems that are installed in cars and motorcycles that converse with people using voice interaction because the people are driving is a great use case. But generally, talking to a chatbot instead of using a keyboard and screen, which is typically how we interact with applications, is not as productive as you might think. While it makes us feel very advanced, productivity may be tossed out the window. Second, chatbots don’t always get things right. I would hesitate to tie some vital function such as braking to a chatbot. I’d live in fear that it would brake at the wrong time if I said something it misinterpreted, such as, “I need a break.” Third, chatbots are costly to build and deploy, so they increase the budget for most application development projects. Bottom line: If chatbots aren’t really needed, do not use them.


What is 5G? All you need to know about the next generation of wireless technology

180430-03-itu-5g-usage-scenarios-pyramid.jpg
Today, 3GPP specifies which technologies constitute 5G Wireless and, by exclusion, which do not. 5G is an effort to create a sustainable industry around the wireless consumption of data for all the world's telcos. One key goal of 5G is to dramatically improve quality of service, and extend that quality over a broader geographic area, in order for the wireless industry to remain competitive against the onset of gigabit fiber service coupled with Wi-Fi. The 5G transition plan, once complete, would constitute an overhaul of communications infrastructure unlike any other in history. Imagine if, at the close of the 19th century, the telegraph industry had come together in a joint decision to implement a staged transition to fax. That's essentially the scale of the shift from 4G to 5G. The real reason for this shift is not so much to get faster as to make the wireless industry sustainable over the long term, as the 4G transmission scheme is approaching unsustainability faster than the industry experts predicted.


The Healthcare CIO's Role in Strategy

The primary problem identified by CIOs is in the gap between where the position reports to and how it is being utilized in the company. Essentially, most CIOs are not a priority in the company because the majority still do not report to the CEO. As a result, CIOs are stretched quite thin because they are getting pulled in many different areas without alignment to the CEO. This prevents them from being able to focus on a particular aspect of the business and manage it effectively. It also prevents CIOs from being able to develop and drive an effective long-term strategy for the company, since their attention is so divided. Many CIOs feel they are not being included in the important strategic discussions. When they are involved in these discussions, they are not the kind of conversations that CIOs can use to drive long-term strategy. Instead, they focus on short-term goals or financial planning without addressing major strategic issues that should be addressed before short-term solutions can be implemented. 


Is AI the Next Frontier for National Competitive Advantage?


Although data security is always a major concern, AI algorithms add a new level of complexity. The more granular the data that is fed to an AI algorithm, the better the algorithm is at personalizing a given experience for the user. And consumers typically appreciate it when companies can provide personalized experiences tailored to their needs. However, in the process, users’ privacy or the confidentiality of their data might be compromised, leading to conscious trade-offs being required in security policies. Another major concern with respect to AI algorithms is the potential for these algorithms to institutionalize bias. Machine learning algorithms use historical data to detect patterns and make inferences. Thus using historical data, even if it is factual, can lead to biased outcomes. ... Some countries have started exploring a series of trade-offs that AI presents in an attempt to address them in their policy documents, acknowledging that all of society — businesses, individual consumers, and academics alike — plays a role in how these issues are managed.


A Conversation About ZipSlip, NodeJS Security, and BBS Hacking

Shifting security to the left as much as you can is a great start to take security seriously. To begin with, it’s a security mindset and the understanding that security is everybody’s job, as Tanya Janca says. Embracing security concerns as part of your design and code-review processes, and then continuing to integrate a good set of processes and tooling that supports it within your everyday development workflows. Some examples are adopting static code analysis plugins as part of your build process, or scanning your project for vulnerabilities in open source dependencies, which Snyk does best due to its comprehensive vulnerabilities database as well as it’s pro-active approach of not only reporting vulnerabilities but also automatically opening Pull-Requests with the minimal semver change required to upgrade a dependency.


What You Need to Know About Augmented Analytics

Image: Shutterstock
Rip and replace is a bad idea here because BI and analytics products still provide a lot of value. More importantly, augmented analytics requires users to be data literate. Instead of planning a wholesale shift, leverage what’s in place while experimenting with augmented analytics so you can better understand the differences and how your analytics strategy should unfold over time. “Companies will need to start looking very carefully at the vendors’ roadmaps [whose products] they already use to see where they are with respect to incorporating or adding or innovating with augmented analytics,” said Sallam. “Particularly early adopters will take a look at new, innovative vendors and bring them in alongside of their existing investments to see how they can enhance their analytic activities.” Be sure to include analysts and data scientists in the validation process because they’re in a better position to know what questions should be raised and what tests should be used to validate the product.


Microservice using ASP.NET Core


The term microservices portrays a software development style that has grown from contemporary trends to set up practices that are meant to increase the speed and efficiency of developing and managing software solutions at scale. Microservices is more about applying a certain number of principles and architectural patterns than it is about architecture. Each microservice lives independently, but on the other hand, also all rely on each other. All microservices in a project get deployed in production at their own pace, on-premise, on the cloud, independently, living side by side. This section will demonstrate how to create a Product microservice using ASP.NET Core step by step with the help of pictures. The service will be built using ASP.NET Core 2.1 and Visual Studio 2017. ASP.NET Core comes integrated with VS 2017. This service will have its own dbcontext and database with an isolated repository so that the service can be deployed independently.



Quote for the day:


"People ask the difference between a leader and a boss. The leader works in the open, and the boss in covert" -- Theodore Roosevelt


Daily Tech Digest - February 11, 2019

RPA: Driving mainstream innovation

Like any IT deployment, internal auditing must come first, and this is true for RPA installation. Mapping existing operations and analyzing processes are essential and should be recorded at a granular level. Some organizations make the error at this stage of not asking staff at the coal face, preferring to refer to managers who are often a step or more removed from operational practicalities. The final considerations comprise of how the new, virtualized workforce is to be managed: is this to be an IT function, or will there be a delegation of monitoring and control to individual work groups or departments? Analogous to those concerns, support structures also need to be put in place to handle daily issues such as software updates (an IT concern) or change requests (operational management). Finally, the governance of the whole structure needs careful definition, setting out the rules of change management, documentation, data security, and the predicted maintenance requirements.


The SWOT Guide To Blockchain Part 2

With blockchain technology’s decentralisation, individuals can be coordinated on a large scale to undertake activities without a middleman. This technology offers governance and interaction without a third party to oversee it. Some social networks have already been developed that operate in a decentralised manner using blockchain. Some examples include Akasha, Steem.io and Synereo. The rules of operating are configured in the blockchain, fees are paid and fees can be earned by contributors via this type of platform. Looking at sharing economy examples specifically, platforms for car pooling have already been built that are decentralised – and thus differ significantly from Uber. Examples are ArcadeCity and Lazooz. Again, the rules that govern them are built into the blockchain infrastructure, and these manage interactions between those that need a ride, and the car drivers. Drivers are rewarded via the blockchain technology, and gain tokens that offer them a share in the platform. Thus, drivers are motivated to help the platform build in its success, because in doing so, they have more to gain personally as well. 


The AI research agenda for the next 20 years is being made now

“If you want to do common sense knowledge, if you want to do true natural language semantics, you need a good knowledge base; a good, large knowledge graph in a sense, but the knowledge graph, for example, that Google is developing is in house and not accessible to academic research. So we need a very large, shared resource that will be developed across the country, then shared via some institute or center that would manage that,” Selman said about the idea of a national AI platform. What surprised me watching the town hall was the number of times fundamental knowledge about people came up, things like understanding human intelligence. Also surprising was the number of times words like “trust” was used. If you’re interested in taking a closer look at initial findings and workshop results, you can watch the town hall video or read through this CCC blog. Stick with VentureBeat to hear the final recommendations and the challenges and opportunities researchers see for AI in the years ahead.


Cryptocurrency-stealing Clipper malware caught in Google Play Store

This is not the first time Clipper malware variants have been spotted, though it is the first time they have been found in the Google Play Store. Clipper payloads have been available on Dark Web marketplaces since at least August 2018, appearing periodically in what ESET characterizes as "several shady app stores" for Android. Variants of clipper first appeared in 2017 on Windows. Avoiding Android malware is relatively straightforward for informed consumers. Using only the official Google Play Store to download apps is a great first defense in most cases. Using other app stores requires explicitly disabling a security setting in Android. This can leave your device vulnerable. That said, in cases like this where cybercriminals have permeated the Google Play Store, it is important to check the publisher's website to ensure the app is genuine. In the case of MetaMask, as there is no Android (or iOS) version, that should be taken as a sign that the app is not genuine.


What is low-code development? A Lego-like approach to building software

building blocks of computer hardware
Low code differs from no-code development, in which so-called citizen developers, often business analysts with little to no programming experience but who are knowledgeable about business processes and workflows, use similar drag-and-drop tools to arrange applications. With low code, developers may still need to do some coding to integrate access to older applications, for reporting, and for special user interface requirements, Forrester Research analyst John Rhymer wrote in an October 2017 research report. (For a deeper look at low code, read technologist Steven Koh's explanation, here, and Jason Bloomberg's article distinguishing low code from its no-code cousin, here.) The total market for low-code development platforms, offered by vendors such as Salesforce.com, Appian, Mendix and others, will hit $21.2 billion by 2022, growing at a compound annual growth rate of 40 percent, according to a vendor report Forrester published in November 2017.


Athens At The Center Of European Cyber Security Strategy

The agreement stipulates that the premises of the Agency shall be located in the metropolitan area of Athens, with a branch office in Heraklion, Crete and that the role of professional cybersecurity staff working for the Agency will be upgraded. According to the Agency web site, the professional cybersecurity team mounts to 65 experts, but the new agreement will attract more and possibly help the repatriation of Greek scientists. To quote Mr. Pappas, ‘The new seat agreement opens new high-level job opportunities in the critical field of cybersecurity contributing to brain-drain control and the enticement of new top scientists from all over Europe. ... The European Union needs to be ready to adapt to and reap the benefits of these technologies and reduce the cyber-attack surface. In this regard and in the context of the recent political agreement on the new draft Cybersecurity Act, which proposes to grant ENISA a permanent mandate with more human and financial resources, ENISA is expected to increase its support to the E.U. Member States, in order to improve capabilities and expertise, notably in the areas of cyber crisis coordination and the prevention of cyber incidents.


IoT for retailers: opportunities and challenges

retail experience
Many retailers have successfully exposed inventory information by store to create an "availability to promise" capability so that when mobile users "buy" something, that specific item in inventory is immediately set aside for them. The next major step, Archer said, is consolidating selling platforms so store employees, customers, field technicians, and customer service personnel all see the same catalog of product information, pricing, and promotions, so they can facilitate new orders or update existing ones. The rise of apps and digital wallets promises to let retailers know who is in their store at any given time. This will help them move beyond pilot implementations and one-off testing to actually track the ROI of their IoT investments. Also, Archer points out, once retailers know a customer is approaching the store, instead of just sending ad notifications, they can have the buyer’s purchase ready for pickup, so the don’t have to get out of the car or disentangle their child from their car seat.


Who is in Charge of Quality in Software Development

This is where perspectives most vary. As Gregory said, “Different people choose different things. They have different wants, different needs. If we’re trying to let the customer choose, make the customers happy.” But don’t forget to keep in mind, she continued, “We are also making a big assumption that the consumers have enough information that they can make a qualified decision.” She spoke of an app she once used that she found super unfriendly. It turned out the users loved it because it followed exactly how they worked. She didn’t work in that field. It’s all about meeting the specific users’ specific use cases. ... Finally the most immeasurable quality — transcendence. Gregory said that’s because it’s hardest to measure emotion, making transcendent quality a blend of artistry, engagement, and customer loyalty. How do we measure the quality of software? Overall, if you accept Garvin’s quality scale, it’s difficult to measure most parts of software quality.


Where automotive cybersecurity is headed in 2019

Where automotive cybersecurity is headed in 2019
According to cybersecurity firms, connected vehicle risks have grown significantly in the past few years, enough to prompt the FBI to issue a warning, and the UK last December to issue new cybersecurity standards for self driving vehicles. OEMs — the companies that put their nameplates on the vehicles — have begun to realize that it is they that consumers, and regulators, will be looking towards for security answers. OEMs no longer rely only on their component suppliers to solve their security concerns, they are looking towards experts in the cybersecurity field for assistance. Security companies working with OEMs are taking a variety of approaches, from monitoring the network to examining ECU for anomalous activity. OEMs who haven’t made this a priority yet will certainly do so in the coming year; they don’t really have a choice. The FTC, the NHTSA, and likely a passel of other government organizations, are examining connected vehicle systems for cybersecurity and privacy issues.


What is phishing? How this cyber attack works and how to prevent it

phishing threat
Phishing is a cyber attack that uses disguised email as a weapon. The goal is to trick the email recipient into believing that the message is something they want or need — a request from their bank, for instance, or a note from someone in their company — and to click a link or download an attachment. What really distinguishes phishing is the form the message takes: the attackers masquerade as a trusted entity of some kind, often a real or plausibly real person, or a company the victim might do business with. It's one of the oldest types of cyberattacks, dating back to the 1990s, and it's still one of the most widespread and pernicious, with phishing messages and techniques becoming increasingly sophisticated. "Phish" is pronounced just like it's spelled, which is to say like the word "fish" — the analogy is of an angler throwing a baited hook out there (the phishing email) and hoping you bite. The term arose in the mid-1990s among hackers aiming to trick AOL users into giving up their login information.



Quote for the day:


"The mark of a great man is one who knows when to set aside the important things in order to accomplish the vital ones." -- Brandon Sanderson


Daily Tech Digest - February 10, 2019

© Getty Images
To teach the vocoder to interpret brain activity, the researchers worked with a group of epilepsy patients who were already undergoing brain surgery. The patients’ brain activity was recorded as they listened to someone recite the numbers zero through to nine. The signals their brain activity generated were then run through the vocoder, which turned the signals into speech. The researchers then used neural networks, a type of artificial intelligence that mimics the workings of the human brain, to analyse and clean up the sound produced by the vocoder. What they were left with was a robotic-sounding voice that recited the numbers the patients were hearing. About three-quarters of the time the numbers were correct and understandable, which lead author Dr Nima Mesgarani described as being “well above and beyond any previous attempts”.  


80% Of Enterprise IT Will Move To The Cloud By 2025

The revenue flow is what matters most, he says, “and it has to keep running under every scenario,” and that includes tech problems—whether an outage, a security breach, or spike in demand. “And it has to deliver a less than one-second response time for a very complex account activation process,” Heller says. The company “won’t make any decision that threatens that performance.” That’s not to say these IT teams aren’t looking to cut costs—they always are. In fact, he says, IT teams “feel a responsibility to always provide three things: effectiveness, efficiency, and risk mitigation,” Heller says. “Does it do what it’s supposed to? Is it a reasonable cost to buy and maintain? Does it avoid risk and ensure business continuity? Every decision they make, every attribute of a solution, should include all those things.” With rare exceptions, businesses won’t put these mission-critical workloads on first-generation clouds. “They just weren’t built for it,” Heller says.


As a data scientist, it’s vital to understand what you can bring to an enterprise - whatever their business is, however big they are. An intelligently-designed data-collection campaign can reveal detailed demographics for a company’s customer base so that they set their marketing teams in the right direction. By wasting less time and money on random advertisements, institutions can expect a more significant ROI, happier clients and better branding. Branding is vital for any company, and the more endorsements pop-up with a company’s name, the more likely an individual is to recognize the name and buy it. A data scientist can understand trends in the market, identify patterns, and suggest best practices. They are problem-solvers and analysts, so businesses across America rely on them to provide the best information. Of course, to be an asset a data scientist also has to understand the industry they’re working in.


Hack Attack Breaches Australian Parliament Network

Hack Attack Breaches Australian Parliament Network
Smith and Ryan cautioned that it's too soon to try and attribute the attack (see Stop the Presses: Don't Rush Tribune Ransomware Attribution). "Accurate attribution of a cyber incident takes time and investigations are being undertaken in conjunction with the relevant security agencies," Smith and Ryan said. "We are not in a position to provide further information publicly at this stage. Updates will be provided to members and senators and the media as required." The head of the Australian Cyber Security Center, Alastair MacGibbon, declined to speculate about the identity of the attacker. "My primary concern is making sure we get that offender out and we keep the offender out," he told Australian Associated Press. Addressing reporters on Friday, Prime Minister Scott Morrison likewise declined to speculate about the identity of the attacker, and he reiterated that the attack appeared to be limited to targeting Parliament's network. "I should stress that there is no suggestion that government departments or agencies have been the target of any such incursion," Morrison said, Associated Press reported.


How quantum terrorists could bring down the future internet


A lone-wolf attacker cannot overwhelm the quantum state with random information. “The correct state (i.e. initial state) can in principle be recovered using purification or distillation schemes,” say Johnson and co. But if quantum terrorists work in unison, an entirely different scenario unfolds. Johnson and co show that if several attackers inject their quantum information into the network at the same instant, they can disrupt the global quantum state. In that case the initial state of the system cannot be retrieved, even in principle. How many terrorists are needed for this to happen? The shocking conclusion is that it requires only three or more quantum terrorists working in unison. “Our findings reveal a new form of vulnerability that will enable hostile groups of [three or more] quantum-enabled adversaries to inflict maximal disruption on the global quantum state in such systems,” say the team. What’s more, these attacks will be practically impossible to detect, since they introduce no identifying information; they require no real-time communication, since the terrorists simply agree in advance when to attack; and the attack can be over within a second.


Team Human vs. Team AI

Algorithms do reflect the brilliance of the engineers who craft them, as well as the power of iterative processes to solve problems in novel ways. They can answer the specific questions we bring them, or even generate fascinating imitations of human creations, from songs to screenplays. But we are mistaken if we look to algorithms for direction. They are not consciously guided by a core set of values so much as by a specific set of outcomes. They are unconsciously utilitarian. Yet without human intervention, technology will become the accepted premise of our shared value system: the starting point from which everything else must be inferred. In a world dominated by text communication, illiteracy was seen as stupidity, and the written law might as well have been the word of God. In a world defined by computers, speed and efficiency become the primary values. To many of the developers and investors of Silicon Valley, however, humans are not to be emulated or celebrated, but transcended or — at the very least — re-engineered.


Why romance with machines is a foregone conclusion


Phillips points out that robots are already serving comforting roles. The category of home robotics still hasn't extended far beyond robot vacuum cleaners, but in settings like hospitals and senior care facilities there's significant experimentation around companion bots that can brighten days and lift spirits while performing basic care needs.  There's also the increasing "realness" of robots to consider. Phillips points out we may be coming out of the Uncanny Valley as robotics designers make increasingly lifelike robots that feel less creepy than human simulacrums of just a couple years ago. That means robots are becoming increasingly convincing as they pass for human. Couple that with the fact that people are already demonstrating a preference for artificial relationships. Phillips cites a Japanese craze among the Otaku subculture of playing dating video games in which players establish relationships with computer characters. It sounds weird, but given what we know about Attachment theory it's not all that different from the Tomagotchi craze that's more familiar here in the U.S.


Want to master a programming language and become a 10x developer? Here's the secret

Pair programming tasks a couple of developers with working together at a single computer, jointly solving problems and devising code, with one dev typing in code while the other reviews it. "The best way to become a 10x developer is to teach nine other developers to do your job as well, not to get ten times better," she told the O'Reilly Software Architecture Conference NY 2019. "So let's talk about how you scale your skills by sharing your skills, sharing your experience with other people, my favorite way is pair programming." However, Gee isn't just an advocate for developers pairing up, but also for programmers working alongside other employees who play a key role in shaping software. "Pair programming is, in my opinion, the best way to share knowledge around the team, particularly for developers, but not just limited to developers.


3 Mistakes to Avoid When Choosing a Domain Name for Your Tech Startup

Tech Startup Founding New Domain Name Hints How To List Help Guide Laptop Glasses Technology Coding Article Programming Code
As counterintuitive as it may sound, the future is in the past. A sophisticated understanding of the past is one of the most powerful tools we have for shaping the future. When choosing a domain extension, do some research on these two aspects ... The true importance of using a new domain extension is to creatively brand your startup. For instance, if you are a new eCommerce business you can pick a .store domain extension or if you are starting a media business then you can pick a .press domain extension. Similarly, for your tech startup, you can pick a definitive .tech domain extension that is globally associated with the word technology. But before you jump to a name of your choice, do some research to see whether it is free of any political, legal or ethical controversies. ... By not taking suitable measures to protect the domain at the time of registration, you can make your website susceptible to brandjacking. This means that cybercriminals can take over the control of your website with the intention of ruining your reputation.


In a digital world, do you trust the data?

Trust is now a defining factor in an organization's success or failure. Indeed, trust underpins reputation, customer satisfaction, loyalty and other intangible assets. It inspires employees, enables global markets to function, reduces uncertainty and builds resilience. The problem is that - in today's environment - trust isn't just about the quality of an organization's brands, products, services and people. It's also about the trustworthiness of the data and analytics that are powering its technology. KPMG International's Guardians of trust report explores the evolving nature of trust in the digital world. Based on a survey almost 2,200 global information technology (IT) and business decision-makers involved in strategy for data initiatives, this report identifies some of the key trends and emerging principles to support the development of trusted analytics in the digital age. At a time when machines are increasingly working in parallel with people, this report identifies the clear need for improved and proactive governance of analytics.



Quote for the day:


"Every great leader has incredible odds to overcome." -- Wayde Goodall