Daily Tech Digest - August 29, 2019

Waste Management dumps legacy processes, drives digital change
The old IT organization managed infrastructure and powered the business day to day. The new digital organization drives business value. We’ve evolved from a siloed black box operation that did its own thing to a collaborative thought partner that is not just shaping the solution but also shaping the opportunity. We don’t not want to hear our business partners say, “By the way, we are going to run a remote-control dozer. IT, can you figure out how to create a secure private network?” We want to be involved in those conversations up front. That shift requires my team to approach our business partners in a new way. Take cybersecurity, for example. IT needs to talk less about NIST frameworks and log analyses and more about the business risk and brand damage associated with a loss of customer data. Rather than talking about an SD-WAN, we should be talking about network speed’s impact on the user experience. Our “gallery walks” have been particularly effective in helping our technologists develop “business speak.” Here is how it works: On the 17th floor of our Houston headquarters, we’ve set up three stations that correspond to our three levers.


Develop a personal early warning system to avoid making bad leadership choices


Once you’ve identified your unforced errors, be honest with yourself about their effects. Select a few of your most common mistakes and ask yourself these two questions: “If my direct report were making this mistake, how would I react?” and “If a friend were making this mistake, what would I do?” With direct reports, you probably wouldn’t let those mistakes go unacknowledged, because you’re responsible for giving those employees performance feedback and you care about their growth and development. And with friends, you wouldn’t want people you care about to limit their potential due to a fixable issue. In the same way, you should care about how your actions affect your future as much as you would care about the future of your direct reports or friends. Now imagine that somebody you trust saw you repeatedly committing an unforced error. How would you want them to react? You’d probably want that person to prioritize candor over politeness. Increasing your self-awareness and asking for direct feedback can prevent you from being the last one to know about your own unforced errors.



IoT accelerating digital transformation initiatives — Gartner

IoT accelerating digital transformation initiatives รข€” Gartner image
In 2020, revenue from endpoint electronics will total $389 billion globally and will be concentrated over three regions: North America, Greater China and Western Europe. These three regions will represent 75% of the overall endpoint electronics revenue. North America will record $120 billion, Great China will achieve $91 billion and Western Europe will come in third totalling $82 billion in 2020, according to Gartner. “Overall, end users will need to prepare to address an environment where the business units will increasingly buy IoT-enabled assets without policies for support, data ownership or integration into existing business applications,” said Alfonso Velosa, research vice president at Gartner. This will require the CIO’s [and CTO’s] team to start developing a policy and architecture-based approach to support business units’ objectives, while protecting the organisation from data threats.


How To Make Sense Of Digital Transformation If You're A Small Business

The hype is all about robots and AI killing jobs at one extreme end of the spectrum and about an AI-fueled utopia at the other. The reality, of course, is likely far more nuanced. In the business world, you can find a lot of gold in your basic, everyday operations -- the things your people do on a routine basis. Irrespective of your exact circumstances, you simply cannot afford to sit on the sidelines just because you’re a small business. Technology is not going away, so every small business should understand that DX is important. Since digital business transformation involves cultural change, it’s particularly crucial to get business leaders involved. Successful DX initiatives are led from the top. Small business leaders should get out of their comfort zones by making the time for forward-thinking initiatives, being open to risk-taking and understanding that they can't go it alone. Don’t forget about the “transformation” aspect of DX. In my experience, transformations simply don’t happen without a strategy.


4 steps to a blockchain implementation


Smaller companies are more likely to look to a vendor to supply a product. "I would see us working with one of our existing vendors to say, 'Are you forming an advisory panel or exploratory group of existing law firm clients that would want to roundtable about this and how do we see it as a benefit to the firm?'" Caraher said. He said that von Briesen & Roper would most likely work with its niche vendors in the document management space to see how they could incorporate distributed ledger technology into their products. Use of products employing distributed ledger technology would be a competitive advantage for his firm, Caraher said.  For larger companies, once a use case has been identified, Rhodes said, the next step is to identify an architecture to address the use case. And as with all IT projects, IT will need to determine budget, deadline and whether the work can be taken on using internal resources or whether outside help is needed.


Four Traits of Every Top-Tier IT Hire

Image: Olivier Le Moal - stock.adobe.com
Finding and retaining high-quality IT and engineering talent can be challenging, especially when considering just how rare it is to find new hires with a real passion for their work. According to a Deloitte study, 64% of all surveyed workers, including half of executives and senior management, report being neither passionate nor engaged in work. You’ll be able to tell right off the bat if a candidate has a passion for their work by the way they discuss their past accomplishments and future goals. You can uncover enthusiasm by asking questions such as: What made you decide to get into technology? How do you stay positive when a project hits serious roadblocks or setbacks? What has been your biggest career accomplishment so far? If a long pause follows any of those questions, you may need to move onto the next candidate. Candidates with a love for their work can usually cover these answers quickly and will get excited even about the opportunity to talk about past projects. At the end of the day, company leaders know that they have a lot of exciting work to accomplish but if team members stop enjoying it, the workload simply becomes unsustainable.


ECB Warns Banks On Public Cloud Data Security As Hackers Circle


Korbinian Ibel, a director general at the ECB’s supervisory arm, told Bloomberg: “There will be accidents, especially in the cloud. It’s not that clouds are more vulnerable, they’re actually often better protected than in-house systems, but they’re seen as juicy targets.” European banks are stepping up their use of cloud services from the likes of Amazon, Microsoft and Google. Germany’s Deutsche Bank says it eventually wants to move the majority of its applications to the cloud from what it has called “expensive and inflexible physical servers”. Up to now, Ibel told Bloomberg, big banks have tended to avoid putting “highly confidential data” into public clouds, but that may well change in the future as smaller challenger banks with little of their own infrastructure adopt wider cloud operations – enjoying lower costs and greater data flexibility as a result. This is when greater risk comes in. Ibel said: “We see the benefits of cloud computing. [But] the rule is that the banker is always responsible for their data and services.


Channeling AI into Government Citizen Engagement


Problems also arise when government agencies cannot determine customer intent. Response systems at contact centers often send customers around in circles, transferring them between agents. This is both frustrating for citizens and extremely costly for organizations. Despite investing significant amounts of money in automation, agencies continue to spend heavily on recruiting and training personnel to perform basic administrative tasks that, with the right design and planning, could be automated. In fact, training front-line service staff remains one of the biggest expenses for some government agencies. Customers can signal the same intent in many different ways. For example, a bank’s customers may have many ways of requesting their account balance. By developing a detailed library of customer intents, cataloguing how and why customers are reaching out, government can, with the right technology, respond more effectively and efficiently.


Face It -- Biometrics To Be Big In Cybersecurity

Authenitication by facial recognition concept. Biometrics. Security system.
The attraction is users will simply register their login credentials with websites and applications once, then the biometric information will supersede usernames and passwords. Fingerprint information is never stored on Google servers. It is maintained cryptographically on the device. This is a big deal. There are 2.8 billion Android users worldwide. Forbes calculates that 1.7 billion users will get the FIDO2 update. And FIDO2 is already supported across all of the leading internet browsers, including Google Chrome, Microsoft Edge, Firefox and Apple Safari. This follows a decision by Microsoft in 2018 to bring the same capability to 800 million Windows users through its Hello login. Faster, more secure logins make life easier for users. However, the real benefit accrues to enterprises, financial institutions, telecoms, insurance, and the government. Better authentication speeds ecommerce and banking transactions. It protects networks from malicious hackers and reduces the likelihood of fraud.


Privacy 2019: We're Not Ready

The good news is that the public has recognized the gravity of the problem. Breakthroughs in healthcare, smart traffic, connected communities, and artificial intelligence (AI) confer tremendous societal benefits but, at the same time, create chilling privacy risks. The bad news is that we're hardly ready to address these issues. As Berkeley professors Deirdre Mulligan and Kenneth Bamberger wrote in Privacy on the Ground: Driving Corporate Behavior in the United States and Europe, it's one thing to have privacy "on the books," but it's quite another thing to have privacy "on the ground." According to research by the International Association of Privacy Professionals (IAPP), more than 500,000 organizations have already registered data protection officers in Europe. Yet only a fraction of those roles can actually be staffed by individuals who are trained on privacy law, technologies, and operations. To rein in data flows across thousands of data systems, sprawling networks of vendors, cloud architectures, and machine learning algorithms, organizations large and small must deploy highly qualified people, technologies, and processes that are still in the early developmental stage.



Quote for the day:


"One must be convinced to convince, to have enthusiasm to stimulate the others." -- Stefan Zweig


Daily Tech Digest - August 28, 2019


Being able to replicate neural behaviour on an electronic chip also offers exciting avenues for research to better understand the brain and how it is affected by disorders that disrupt neural connections, such as Alzheimer’s disease and other forms of dementia. The human brain is made up of billions of neurons in connected networks. They communicate with each other by using a sequence of electrical signals to express different behaviours, such as learning through sensory organs or more complicated processes like emotions and memory. Any disruption to these signalling sequences can lead to a loss of these vital neural connections, potentially causing memory loss and dementia. Curing these disorders would require identifying the faulty neurons and restoring their signalling routine, without affecting the functioning of other neurons in the network. So by having a computer model of the brain, neuroscientists would be able to simulate brain functions and abnormalities, and work towards cures, without the need for living test subjects. Our technology could also potentially be incorporated into wearable electronics, bionic prosthetics, or smart gadgets imbued with artificial intelligence.



Securing Our Infrastructure: 3 Steps OEMs Must Take in the IoT Age

In the manufacturing world, specifically the operations technology (OT) sphere, legacy operational standards such as OPC and Modbus are still in use today but were designed more than 20 years ago using old technologies, including COM. They were not designed for communication over modern IP networks with multiple security layers and, due to a general lack of cybersecurity sophistication, traditional OT networks have most security options disabled to simplify configuration. By its nature, a large open network of connected devices opens many new attack vector threats, even if individual devices may be secure when used independently. Because the weakest point in the system determines its overall security level, a comprehensive end-to-end approach is required to secure it. The lack of industry standards within the manufacturing space makes it difficult to develop such an approach because hackers concentrate on breaching a specific element within the technology stack.


Ransomware has evolved into a serious enterprise threat


In addition to a ransomware revival, the report highlights that more than 2.2 billion stolen account credentials were made available on the cyber criminal underground in the first quarter and that 68% of targeted attacks used spear phishing for initial access. “This shows how the cyber crime economy works,” said Samani. “Credentials are sold online, other criminals buy the credentials and then use them to get into organisations and use the ransomware they are an affiliate for to infect an organisation and demand tens of thousands of dollars in ransom. “The purpose of the threat report is not just to give the hard stats, but to encourage organisations to look at everything that is going on and see it is all connected and contributes to the wider ecosystem of crime.” The findings on ransomware targeting businesses are consistent with the fact that ransomware and other forms of cyber extortion are currently the most popular forms of cyber criminal activity in the UK, according to Rob Jones


The World Is Taking The Future Of Payments Seriously. Why Isn't The United States?

uncaptioned
Let’s start with the simplest of the three: technological history. When modern-day payment systems were first developed, the United States was at the forefront of innovation and adoption. Debit and credit cards picked up significant momentum in the second half of the twentieth century. While shopping and paying online are now a global standard, it took time to filter into society. At the center were the thousands of e-commerce websites and companies that developed in the United States, particularly in Silicon Valley, in the late 90s and early 2000s. In the United States, all cards operate on the same point-of-sale systems to streamline the process for merchants. These outdated systems have left debit and credit cards as the historic standard, which is difficult to break out of. Point-of-sale systems have made China a fascinating case study. Historically, China has been slow to embrace new technologies, particularly in the consumer sector. Until about 10 years ago, the majority of transactions were made with cash; credit and debit cards were relatively rare in China’s payment ecosystem. When payment alternatives started to develop, it was roughly around the same time smartphones began to flood the market.


Do Self-Service and Low-Code Curb Shadow IT?

Image: Pixabay/Bykst
It’s important to point out there's an entire spectrum of low-code/no-code tools aimed at different audiences. Some are targeted at professional developers while others are targeted to web developers or citizen developers. The latter group tends to use “no-code” tools because the mechanics of writing code have been abstracted into visual drag-and-drop tools. Fintech company NES Financial standardized on Outsystems, which is an enterprise-class low-code platform because NES Financial voluntarily complies with Systems and Organizational Controls reporting (SOC 1), the Bank Secrecy Act (BSA), United States Citizenship and Immigration Service (USCIS) and Securities Exchange Commission (SEC) regulations. "Building systems and controlling data is an art in itself. You have to be aware of new regulations, requirements, and constraints, which is a full-time job," said Izak Joubert, CTO at NES Financial. "I think the ability for a marketing organization to implement something as a shadow IT organization is great conceptually, but it has massive risks for an organization if you look at it from a bigger perspective."


Tracking The Trajectory Of Cloud Computing

cloud
Despite the lack of coherent regulations, clients can use the cloud with confidence provided they know where their data is kept, which data protection laws apply, and whether the provider meets internal security policy. The cloud is multi tenancy by design – in other words, it brings lots of clients and third parties into the same network. Knowing which other organisations exist within the network, and how much data they will be able to access, is also a good move for service users. Cloud computing is changing: it’s smarter, faster, more powerful, and more popular than ever before. As technologies and industries converge, cloud applications will increase. However, the maturity of cloud computing has not been matched by regulations. Users are often uncertain about cloud compliance, and therefore less willing to rely on cloud based systems. Legal bodies and corporations need to come up with a prescriptive regulatory framework to enable the cloud to rise to its full potential.


Mitigating social engineering attacks with MFA


Providing a tool for employees to report phishing incidents, even just an email address for forwarding suspected phishing emails, can also help organisations. ... One technological solution that has proven successful against social engineering attacks, especially when the goal has been for acquiring access details, is the implementation of two-factor authentication. Two-factor authentication (2FA), and multifactor authentication (MFA), are access management systems that require two – or more – pieces of evidence, whether it be knowledge (such as passwords), possession (a physical token for example) or inherence (eg fingerprints) in order for access to be granted. The reason that 2FA/MFA is so successful is that should one of their verification stages (such as a password) become compromised, a hacker will still be unable to gain access to the organisation’s network without the other pieces of authentication.


Creating a 'Defensible' Cybersecurity Program

Business units also need to have input on the security steering committee to ensure that the security team is aligned with business goals. "It's very difficult to convince people that you are governing your security program from a business perspective if the business does not have a seat [on the steering committee]," Scholtz says. Dashboards or scorecards can be helpful for showing how security relates to the business and what the risk position is, Scholtz says. But implementing those takes time. Progress reports for executive boards can be tricky, Scholtz says. Executives don't need day-to-day operational information. Providing too much information may get executives interested in granular details that they ultimately have no control over, he points out. Scholtz's tips seem to offer a helpful start for setting up a cybersecurity program that supports business goals. But are they, indeed, practical? Let us know what you think.


Blurring the lines between RPA platforms and APIs


The capabilities of both RPA platforms and APIs are evolving to support use cases primarily handled by the others. The combination of RPA and APIs is a natural outgrowth of the modern business systems environment, particularly driven by the adoption of SaaS platforms and API-first becoming the new software mantra. Traditionally, RPA has been marketed to work with the complex mix of legacy, third-party and modern business applications that most organizations have accumulated. When delivering an RPA platform, it is nearly always best to use APIs when available, as the combination of these technologies delivers an extensive and change-resistant experience by removing the inherent change-prone UI layer from the equation. "Counter to what some may assume, the existence of an API does not negate the usefulness of RPA," Cottongim said.


A new IOT botnet is infecting Android-based set-top boxes

In a report published today and shared with ZDNet, WootCloud Labs said Ares operates by randomly scanning the internet for Android devices with open ADB ports. When it finds a vulnerable device, the Ares operators download a version of the Ares malware on the exposed device, which then acts as another scanning point for the Ares operators. Ares-infected devices will scan for both other Android systems with open ADB ports, but also for devices running Telnet services, specific to Linux-based servers and smart devices. While Ares operators are obviously trying to infect any device they can, WootCloud said it's seen the botnet infecting set-top boxes from HiSilicon, Cubetek, and QezyMedia. These attacks started in July, Srinivas Akella, Founder & Chief Technology Officer of WootCloud, told ZDNet in an email today. The exec also doesn't exclude the possibility that other types of Android systems were also infected. "To protect against the ADB being misused in these cases where it is left enabled, routers can be configured to block the ingress and egress network traffic to TCP port 5555, which is the ADB port," Akella said.



Quote for the day:


"Enthusiasm is excitement with inspiration, motivation, and a pinch of creativity." -- Bo Bennett


Daily Tech Digest - August 27, 2019

Why blockchain, despite some early success, remains a corporate enigma

binary chains / linked data / security / blockchain
Blockchain is not middleware meant to tie into existing legacy systems, but there are ways of automating the flow of data from ERP systems to a distributed ledger technology. Typically, APIs and data-sharing standards, such as GS1 (best known for the machine-readable barcode protocol), have been used to enable interoperability with legacy data systems. The IBM Food Trust, which is used by Walmart and other big box retailers to track food from farm to shelf, avoids manual data input by leveraging legacy tech investments through the GS1 standard; it automates the transfer and understanding of data between different parties on the electronic ledger. Regardless of how blockchain is implemented, most of the cost and legwork for rolling it out requires business partner participation in the network and involves hammering out business agreements and governance rules, said Kevin McMahon, director of emerging technologies at Chicago-based consultancy SPR. "Putting together the governance model and putting in the effort, time and energy building out a consortium as well as solving business challenges — that's always been the surprise for our clients," McMahon said.


AI Rushes Forward Driven by a Sense of Urgency

Image: sdecoret - stock.adobe.com
Companies and governments are rushing to embrace and integrate AI. Leading AI advocates such as Andrew Ng are encouraging companies to jump into AI use sooner rather than later. Research suggests that companies that fall behind in AI adoption might not ever catch up. Northeastern University professor Nada Sanders said recently that “organizations that take a measured and piecemeal approach to implementing emerging technologies will fall off the map, fade into irrelevance.” A recent op-ed argues that nations should be doubling down on AI research and development to remain competitive. It’s definitely a global race to see who will dominate with AI. Mark Cuban has famously said that the world's first trillionaires are going to come from somebody who masters AI and all its derivatives and applies it in ways we never thought of. All this change and the value it is creating is being driven by “narrow” or “weak AI,” algorithms that are incredibly proficient at a single task. Impressive as these algorithms are for discovering new drugs, forecasting volcanic eruptionsand even for deploying personalized meditations but they cannot share insights across information domains. 


Emerging From The Shadow

Emerging from the Shadow - ITNEXT
Make no mistake. Shadow IT as a challenge remains. The toughness of that challenge does remain—in fact, it has grown.  Gartner estimates that 40-50% of cloud and enterprise application consumption is already happening over uncontrolled and unaccounted for sources, as businesses can no longer rely on slow procurement processes from Central IT. By 2020, half of all IT spending at large enterprises with digital business aspirations will occur at the business-unit level, it says. Also, a 2017 survey by NTT Communications found 83% IT professionals reporting that employees stored company data on unsanctioned cloud services. This suggests how the increase in cloud adoption and prevalence of SaaS and mobile applications, have further facilitated the rise of shadow IT. With Internet of Things (IoT) and other emerging technologies already underway, analysts believe this to be an even starker reality. While shadow IT is used usually without ill-intent, owing to either negligence or for the sake of convenience, it poses a serious threat to data security. In most cases companies are unaware of their use and hence do not know whether their data comes from secured sources or not. 



How Anti-Patterns Can Constrain Microservices Adoption

Microservices create lots of small, distributed single-purpose services, with each service owning its own data. This service and data coupling support the notion of a bounded context and a shared-nothing architecture. Each service and its corresponding data compartmentalize and are completely independent of all other services. The data-driven migration antipattern occurs when you are migrating from a monolithic application to a Microservices architecture. Anti-pattern because of the migration for both the service functionality and the corresponding data together at the start while creating Microservices. There are two primary goals during any Microservices conversion effort. The first is to split the functionality of the monolithic application into small, single-purpose services. The second is to migrate the monolithic data into small databases owned by each service. The important aspect of developing Microservices rather than a monolithic application is inter-service communication. There are two communication styles i.e. synchronous vs asynchronous, one-to-one vs one-to-many mechanisms.


How IT departments can upskill in the new economy


Working in the gig economy works both for small businesses and startups, and large enterprises and public sector organisations. Yorkshire Water is one of the businesses mentioned in the TopCoders report. The water utility firm opened up 12 months of its data through the Leeds Open Data Institute to crowd-source the discovery of new trends or patterns. According to Yorkshire Water, it received a number of interesting submissions, such as an app proposal to use artificial intelligence (AI) to automate the recognition of leak noise, and a Fitbit-like device for monitoring water usage in household water pipes. New research has found that crowd-sourcing ideas for the smart use of public sector data offers a huge economic benefit. In July, the European Union (EU) reported that the total direct economic value of the data held in the public sector is expected to increase from a baseline of €52bn in 2018 to €194bn in 2030.


Measuring CI/CD Adoption Rates Is a Problem

It is also hard to define the market size for CI/CD since most surveys do not measure the depth of adoption. Just because a CI/CD tool is used within a company does not mean it is widely used, nor that its use cases have gone beyond the most basic. A better metric is what percentage of processes are automated Git commit to code to production. A DevOps focused survey from Codefresh reported that a third of companies had automated more than half of their workloads, but only 1% were all the way there. Another way to think about the issue is in terms of the percentage of developers at a company that use a particular product or service. The relevance of measuring CI/CD adoption came up in a recent twitter conversation, in which GitLab CEO Sid Sijbrandijg said about half of the Global 2000 companies have use CI/CD best practices like feature flags and tracing, but that only about 1% of workloads are being handled through this way.


Augmented data management draws more enterprise interest


Augmented data management uses machine learning and AI to make enterprise data management disciplines, such as data quality and integration, metadata management, master data management, and database management systems, "self-configuring and self-tuning," according to Gartner. Gartner included augmented data management in its recent list of top 10 data and analytics trends for 2019.Augmented data management is already starting to change how data professionals prepare and govern data with the help of more advanced machine learning capabilities and AI-driven automation, experts said. "Augmented data management will be an important enabler to faster, more scalable, more intelligent and higher quality augmented business decisions," said Bill Hostmann, research fellow at Dresner Advisory Services. David Menninger, an analyst at Ventana Research in Bend, Ore., said he sees augmented data management as part of a larger trend toward augmented software applications of all types, including analytics, which tends to get more attention.


Microsoft: Using multi-factor authentication blocks 99.9% of account hacks


The recommendation stands not only for Microsoft accounts but also for any other profile, on any other website or online service. If the service provider supports multi-factor authentication, Microsoft recommends using it, regardless if it's something as simple as SMS-based one-time passwords, or advanced biometrics solutions. "Based on our studies, your account is more than 99.9% less likely to be compromised if you use MFA," said Alex Weinert, Group Program Manager for Identity Security and Protection at Microsoft. Weinert said that old advice like "never use a password that has ever been seen in a breach" or "use really long passwords" doesn't really help. He should know. Weinert was one of the Microsoft engineers who worked to ban passwords that became part of public breach lists from Microsoft's Account and Azure AD systems back in 2016. As a result of his work, Microsoft users who were using or tried to use a password that was leaked in a previous data breach were told to change their credentials. But Weinert said that despite blocking leaked credentials or simplistic passwords, hackers continued to compromise Microsoft accounts in the following years.


Why we shouldn’t let AI write for us

letter handwriting cursive mail correspondence
The mainstreaming of AI business writing began with Google Smart Reply four years ago. Google Inbox users were offered a few colorless options for a reply to most emails. The feature still exists in Gmail, and with a single click you can respond with “Thanks!” or “I’ll send it to you” or “Let’s do Friday!” Last year Google added Smart Compose, which finishes the sentences you start. You can choose Google’s words by pressing the tab key. Using Smart Reply and Smart Compose saves time but makes replies dull. They’re dull because Google makes sure the replies are generic and designed to not annoy or offend anyone (for example, Google’s AI never uses gendered pronouns like “he” or “she”), and also because millions of other Gmail users are using the exact same wording for their replies. We all sound the same in our replies. Google is not alone. Lightkey makes a Windows application that works like Google’s Smart Compose. Quillbot is a cloud-based tool that can rephrase what you write (or what you copy and paste from others’ writing). It typically produces awkward prose. Machines have no ear for language.


How CIO Can Become The Boardroom Influencer

How CIO can become the boardroom influencer - CIO&Leader
While CIOs might be in a position of power, their success will depend on how they are developing the right blend of technical, business and influencing skills within their organization. The spotlight is therefore on the CIO’s expertise in solving these problems at hand. A study by MIT’s Center for Information Systems Research (CISR) brings to light that companies with experienced technologists on their board outperform others in areas such as revenue growth, return on assets and market capitalization growth. In other words, the significant contribution that CIO/CTO’s can bring to table gets reflected in the company’s financial outcomes. The analysis shows that out of 1,200 large enterprises with revenues over USD 1 billion, about 24% had board members that were classified as technology experts. These board members included those with experience as a CIO/CTO and expertise in software, digital platforms, big data and innovation, besides substantial years of leadership skills. According to the study, “Revenue growth over three years for boards with three or more such directors was 17.6% compared with 12.8% for boards without technology experts...."



Quote for the day:


"All leadership takes place through the communication of ideas to the minds of others." -- Charles Cooley


Daily Tech Digest - August 26, 2019

Samsung Galaxy Note 10 DeX Windows 10
Just because the Galaxy Note 10 Plus isn't the laptop replacement I've been looking for, it could be the primary computing device for workers who spend most of their time either in the field or moving between branch offices. I can easily see salespeople using the S Pen to click through the slides of a client presentation on a Note 10 Plus that's connected to a conference room TV. Regional managers who travel between stores could work directly from their Note 10 Plus provided their company had an external keyboard/mouse/display combo or loaner computer available at each site. And true field workers who rarely need to type on a keyboard during the day (like officers with the Chicago Police Department, which is running a pilot program with Samsung's DeX in Vehicle solution), could definitely use the Note 10 Plus for most tasks, if their companies take the time to ruggedize the phone...at a $1,099 a device you don't want to drop this thing on a factory floor or have it fall off the back of a truck on a construction site.



NASA Astronaut Accused Of Hacking Bank Account From Space

The New York Times report details how Summer Worden, Anne McClain's estranged spouse, put her skills as a former U.S. Air Force intelligence officer to work when she suspected McClain had been accessing her bank account. Having contacted her bank for details of the locations of logins to the account, Worden discovered one of the computers, where her login credentials were used from, was registered to NASA. McClain was aboard the International Space Station at the time, due to be part of the ill-fated all-female spacewalk, and putting two and two together led Worden to the conclusion that she had found her bank account hacker. McClain, who has since returned to Earth following her six months in space, has admitted that she did, indeed, access the account while aboard the International Space Station. The newspaper report stated that, under oath and via a lawyer, McClain insisted she was making sure there were sufficient funds in the account to care appropriately for the child they had been raising together.


Gartner Hype Cycle deems software-defined networking obsolete


The Gartner report is blunt and refreshing. For instance, check out this part: "Don't get caught up in SDN hype and claims that commercial products are 'SDN' or be persuaded that SDN is the answer to all networking problems since clearly this has not transpired." The same could be said for other hyped networking technologies. Instead, Gartner advised, enterprises should focus on solving specific problems within their networks and evaluate networking services based on their ability to deliver operational value. On a positive note, SDN shook up the networking industry by challenging established vendors and affecting subsequent market developments. SDN, for instance, spurred the rising use of white box switches, open source hardware and the development of independent network switch software providers. Fortuitously, for enterprises, traditional networking vendors also shifted their focus to innovate around network operations and management.


The Death of Agile and Beyond

Despite the cry that from the agilists that agile is dead/failing, it remains popular and is becoming increasingly "fashionable" among the senior executives. Surveys by Deloitte and McKinsey show that more than 90% of the executives believe that "becoming agile" is a high priority. And of course, any high priority aspiration often comes with a mandated time-constraint. The first problem with these aspirations is the imposition; they rob people of the opportunity to choose agile as a way of being. However, the bigger problem is that these aspirations are missing a key element: the sense of why. Think of impact mapping for enterprise agility; impact mapping is a way of mapping any goal using four ordered questions why, who, how and what. Why is the most important aspect; in the case of the need to be agile, answering "Why do we aspire to be Agile" properly and keeping these reasons in the forefront of the discussion invites teams into agility instead of imposing it on them. However, in most mandated enterprise agile transformation the conversation focuses on the who, how and what.


Software-defined perimeter – the essence of trust

millennials trust
Today, the IP address is no longer sufficient to define the level of trust for a user. IP addresses lack user knowledge to assign and validate the trust. There is no contextual information taken into consideration. This is often referred to as the IP address conundrum. Therefore, as an anchor for the network location and policy, we need to look beyond the ports and IP addresses. Network policies have traditionally focused on what systems can communicate with each other. The permit or deny is a very binary framework to use in today's dynamic environment. It has resulted in a policy that is either too rigidly defined or too loosely defined. This is where the software-defined perimeter finds the middle-ground. ... The considerable benefit of using an identity provider is that it acts as a gateway for users to authenticate against the same centralized trust. However, VPNs or other gateway services require a different database with a different management process. This can create an overhead to either add or delete the users from different databases. Having everything controlled in one central database provider is the key to managing a single set of controls of trust. Essentially, in SDP, a user validates against an externally facing IDP and then the user is authenticated against the identity store.


Adopting Agile Principles In Health Care


A core tenet of our approach is that for each innovation, Inception Health establishes an Agile team composed of clinicians, engineers, managers, data scientists, and user representatives. Each team establishes an iterative cycle to improve outcomes and the value to patients, to the health professionals, and to the system overall. While the core team comprises a handful of employees, several hundreds of people from member health care systems have participated in these Agile projects. By embedding Agile principles in the integration process of innovation in the member health care systems, Inception Health has been able to integrate innovations and iterate quickly. In the past two years, Inception Health has implemented 26 innovation projects at Froedtert and the Medical College of Wisconsin Health Network, including online tools for behavioral health, diabetes management, patient engagement, campus wayfinding, and remote monitoring. To enable clinicians to prescribe digital applications at the point of care, Inception Health partnered with a company called Xealth to create a digital health formulary, tying in third-party digital health applications with the electronic health record and clinical workflows.


Hacker Claims He Can ‘Turn Off 25,000 Cars’ At The Push Of A Button

Car immobilizers hacked
Ken Munro, cybersecurity researcher and partner at Pen Test Partners, first described the hack to Forbes at the DEF CON convention in Las Vegas. He found that it was possible to turn the immobilizer on and the car off by sending a simple request via a browser. Once he'd entered the command, it took less than a second for the immobilizer to be triggered. It was as if Munro was acting as one of the SmarTrack call center employees who were permitted to turn the immobilizer on. SmarTrack systems just weren't correctly checking that the commands were being sent by an authorized user, Munro said. Munro warned that it would be impossible for anyone to start the car again with the immobilizer fitted. The only option would be to have the tech removed entirely, he added. "We now control the immobiliser, so only we can de-immobilize the car." And, if the hacker turned the immobilizer on when the car is moving, it would simply prevent the car from running as soon as the engine stopped. As Munro noted, that could be "quite nasty" if the car has an auto start and stop function. ... Munro was also critical of Thatcham Research, the industry body which had given accreditation to the SmarTrack devices, saying it was safe to use.


Choosing SIP vs. PRI: What are the differences?

Because SIP trunks are software-centric compared to PRI, they are far more elastic and scalable. Adding or reducing the number of calls a SIP trunk handles usually only takes a change in configuration on both sides of the trunk. The real limitation in the case of a SIP trunk is the bandwidth between trunk endpoints. That leads us to some drawbacks of SIP trunking. For one, many SIP trunk architectures allow a SIP trunk to ride across the same internet link that employees use to surf the internet, stream video and perform other internet-based tasks. This creates a situation where voice traffic riding across the SIP trunk can be negatively affected if there is insufficient bandwidth to handle both the calls traversing the SIP trunk and standard internet traffic. Thus, it's important to watch internet throughput closely so bottlenecks don't occur. While businesses can opt for running SIP trunks directly over the internet, telecommunications providers prefer to offer dedicated data lines directly to a customer's premises to ensure the quality and stability of their SIP trunks.


The end of project management?

clothes pins organize project management sort by ryan mcguire gratisography
As IT moves to more to a product management run organization, what are the impacts? CIOs say that the addition of product management to the mix has two impacts--increased internal customer delight and increased street cred of the CIO. When IT products are appropriate managed via product management, the impacts for the business should be digital products that are useful, usable, and get used. And CIOs suggest this is the case for both internal and external focused products. Here the business gets better aligned tools from a customer experience/user experience perspective. From this process, CIOs get to point to distinct products making an impact on the business. This is especially the case for customer-facing products where financial impact drawn from them. This makes IT more than just a cost-center that the CFO can't understand. From an organizational design perspective, teams should increasingly be based on products, not technical function. As the glue that ties disciplines to product, CIOs see the potential for clarity and transparency coming from product management and a renewed focus on data, analytics, and elevated maturity for CX, business technology, and soft skills.


Cryptography & the Hype Over Quantum Computing

So, what should we be doing now about the potential "quantum threat"? First, the cryptography research community should be focused on post-quantum secure cryptography. The good news is that this effort has been going on for years and is ongoing. The role of this research community is to make sure that we have the cryptography we need in the decades to come, and they are taking the issue seriously. (As a side note, symmetric encryption and message authentication codes are not broken by quantum computers, to the best of our knowledge.) Second, the cryptography research community should start thinking about standardization so that businesses are ready if the quantum threat does prove real. Once again, the good news is that NIST has already begun the process. But all of this is about what the "community" should do. What should you — as someone who uses cryptography to secure your business — do? Let's start with what you shouldn't be doing. You shouldn't buy post-quantum encryption and the like before standardization is complete.



Quote for the day:


"One of the advantages of being disorganized is that one is always having surprising discoveries." -- A.A. Milne


Daily Tech Digest - August 25, 2019

Accesspoint with notenook
Wi-Fi 6 is a new technology and costs a premium to companies making devices like phones or other devices in your home. The added cost and few clear benefits to in-home users will likely make the industry slow to adopt Wi-Fi 6 chips. It’s no surprise that IDC research indicates mainstream adoption of Wi-Fi 6 will take place only by 2023. As someone who works in the Wi-Fi industry, I’m excited about Wi-Fi 6 and its capabilities. Yes, Wi-Fi 6 has the potential to improve speeds and more. But it’s still early in the adoption phase and too early for consumers to see immediate improvements. In-home Wi-Fi users and small businesses would be better holding off until Wi-Fi 6 costs come down and more devices adopt the necessary, compatible 11ax chips. At that point, we will start to see some of Wi-Fi 6’s benefits deliver meaningful user benefits at the right price points for accessible adoption. In the meantime, you can get the most out of Wi-Fi 5 by being smart about where you place your router, using a mesh system, and following healthy Wi-Fi hygiene, like using a router that auto-updates to the latest software.


NatWest Plans Pilot to Enable Voice Banking via Google Assistant

Google Assistant is a fun tool to use when you want instant access to data to save time. And British bank NatWest wants you to bank on your voice to have such immediate access to your financial data. On Monday, the bank has announced a new pilot scheme for its customers. The three-months long trial would initially be available to 500 customers only. They would be able to communicate with their Google Home smart speaker or smartphone about their financial details. The possible questions would include those about banking balance, recent transactions, pending transactions or contact details of the bank’s helpline. Customers’ existing PIN code and online banking passwords would be the verification required to use the voice assistant. When prompted, a customer would provide a portion of their pin to confirm their identity. The bank expects that the full-scale rollout of voice banking would follow after the trial is evaluated. ... Indeed, NatWest seems to be capitalizing on trends really well, personalization and voice tech being the latest in line.


Waymo is going to share its self-driving data—but it’s still not enough

Waymo
Unlike human drivers, autonomous vehicles don’t have an instinctive understanding of the world. Instead, they rely on training data to learn about conditions they are likely to encounter and how to react to them. The more high-quality data AI models have to train on, the better. ... It contains 1,000 segments, each capturing 20 seconds of continuous driving. The data comes from four locations: San Francisco and Mountain View in California; Phoenix in Arizona (where Waymo has launched a small-scale robotaxi service); and Kirkland in Washington. It also comes from multiple sources, including cameras as well as radar and lidar, which bounce lasers off nearby objects to create 3D maps of their surroundings. Helpfully, the company has labelled things like pedestrians, bikes, and signals in the data set, which means other researchers won’t have to do this grunt work. ... While Waymo deserves some credit for its move, it’s sharing just a tiny sliver of the information it has gathered.


What 5G Really Means For Your Business


Another crucial change heralded by 5G will be the way in which networks are managed. Organisations will be able to simultaneously manage different types of access networks (wired, wireless, optical, copper), technologies (fieldbus, ethernet, wireless), protocols and equipment. This will allow them to create a ‘network of networks’. Even better, private networks can be created to cover a specific area, wherever they make sense. 5G offers the ability for an organisation to have its own dedicated ‘slice’ of a network, putting it in much greater control of its own connectivity, security and quality of service. 5G will enable organisations to have secure, reliable, real time ‘edge cloud’ capabilities. This means that data storage and processing capability can be much closer to the point where they is needed, which reduces reduces latency and increases speed. In applications such as robotics, this can eliminate the need for on-board intelligence, allowing cheaper, smaller, dumber robots to be deployed that are controlled in real time by intelligent processing in the edge cloud.


VMware welcomes estranged sibling Pivotal back home


For customers, the immediate impact of the acquisition is minimal and positive. They can still turn to Pivotal for its leading cross-cloud development platform and application development and transformation services, and they can still turn to VMware for its leading software-defined infrastructure software and growing cross-cloud migration and management software. Both companies were already members of the Dell Technologies "family" of companies and sought to cooperate in servicing customers. Most recently, both Pivotal and VMware were investing heavily in helping customers transition from legacy development processes to modern, Agile software development and from traditional, virtualized, mostly on-premises infrastructure to container-based, cloud-deployed, and Kubernetes-orchestrated infrastructure. VMware can now streamline that cooperation. It already jointly developed Kubernetes products with Pivotal while it steadily added container support to its own vSphere product line -- it hasn't always been clear which company built or sold the emerging container platform products.


Can Artificial Intelligence Generate Corporate Strategy?


Artificial intelligence is very hyped up, and for good reasons, but many pop culture information sources lose the "how" of it all, and instead focus in on the dream of what may come next, in some far-off future. Vaporware is common in the industry. It's not a good state of affairs because regular people don't see the connection between the research and the resulting products, and people fear what they don't understand. ... Artificial intelligence as it is developed today, is primarily programming, data gathering, and mathematics. It isn't sexy and it works poorly at first. Sometimes it doesn't work at all. The scary results you see in demonstrations are the product of a lot of hard work to hide the shortcomings of a narrow machine intelligence. I like to think of the artificial intelligence field like "Charlotte's Web", in the sense that Wilbur (the artificial intelligence agent) gets all of the attention at the fair, but Charlotte (the programmer) stays up all night spinning the web. When Wilbur gets all the attention at the fair, as was intended, you have to ask yourself what exactly the pig did to deserve the attention.


Apple, Google, and Mozilla block Kazakhstan's HTTPS intercepting certificate

firefox-quantam-vs-google-chrome.png
By banning the government's root certificate in Chrome, Firefox, and Safari, the three browser vendors are making sure the Kazakh government won't be able to secretly utilize the certificate in the future and restart its web surveillance program when things quiet down and everyone's attention and scrutiny has moved to other things. "Apple believes privacy is a fundamental human right, and we design every Apple product from the ground up to protect personal information," an Apple spokesperson told ZDNet. "We have taken action to ensure the certificate is not trusted by Safari and our users are protected from this issue." "We will never tolerate any attempt, by any organization—government or otherwise—to compromise Chrome users' data. We have implemented protections from this specific issue, and will always take action to secure our users around the world," said Parisa Tabriz, Senior Engineering Director on Google Chrome. "People around the world trust Firefox to protect them as they navigate the internet, especially when it comes to keeping them safe from attacks like this that undermine theirsecurity.


Constraints on the Cloud: why we need machine learning at the Edge

From on-device security, like face unlock, facepay and fingerprint recognition, to smartphone camera and audio functions that allow users to have more intelligent and fun experiences through apps such as Socratic, Snapchat, FaceApp and Shazam, there are a variety of ML-based features used regularly by consumers. However, for ML-based tasks that create massive amounts of data, these are often shifted to the cloud for processing before being sent back to the device with the action. For example, Socratic and Shazam both use ML processing in the cloud, not on the device. This begs the question: wouldn’t it be simpler and quicker for ML processing to happen on the device? Being able to perform ML-based tasks on the device – or the edge – instead of sending them to the cloud for processing is described by many as the “next stage of the ML evolution.” There are significant constraints that make the back and forth of ML data between the cloud and device impractical – power, cost, latency and privacy.


Data Processing Pipeline Patterns


As a data engineer, you may run the pipelines in batch or streaming mode – depending on your use case. Standardizing names of all new customers once every hour is an example of a batch data quality pipeline. Validating the address of a customer in real time as part of approving a credit card application is an example of a real-time data quality pipeline. You may also receive complex structured and unstructured documents, such as NACHA and EDI documents, SWIFT and HIPAA transactions, and so on. You can receive documents from partners for processing or process documents to send out to partners. This is an example of a B2B data exchange pipeline. Data matching and merging is a crucial technique of master data management (MDM). This technique involves processing data from different source systems to find duplicate or identical records and merge records in batch or real time to create a golden record, which is an example of an MDM pipeline.


Agile Around The World - A Journey of Discovery

It is important to note that the Lewis Model is relative - people in different cultures will show a mixture of behaviour of the three types; it's just a question of how dominant each are. Applied on a national scale, North European countries and the USA are strongly linear-active, Latino countries like Spain, Italy and those in South America are very multi-active, while countries in the far east such as Japan, Vietnam and China are highly reactive. The model is a living artefact and is regularly updated as the global landscape changes. We did see common challenges and patterns all over the world. We did however also observe differences between the cultural types that Lewis describes. A few examples: the companies and teams we visited in Argentina seemed comfortable with experimenting and they really embraced the Agile value of customer collaboration over contract negotiation. Teams were not afraid to come up with ideas, but extra attention was needed to ensure focus.



Quote for the day:


"Never give up on something that you can’t go a day without thinking about." -- Winston Churchill