Daily Tech Digest - September 12, 2019

Developing your AI skills: what AI courses are available?

Developing your AI skills: what AI courses are available? image
According to Kumar, the variety AI courses leads to lots of debate around who should take responsibility for ensuring workers have the right AI skills. He asks, “is it enterprises, institutions, governments or individuals? “While everyone should take their share of responsibility, in the short term, it is essential for enterprises to create internal opportunities for their current employees to upskill. Only by training their current workforce to be AI-ready, can businesses truly take the technology to the next level.” As the technology moves across the hype cycle, AI is scaling and becoming more pervasive in the enterprise. Use cases are emerging and organisations are realising the benefits that can be extracted from AI “and are looking to undertake business-wide initiatives around it,” continues Kumar. “We are also seeing greater depth and complexity when it comes to AI projects themselves since organisations now have a better understanding of it and have defined specific use cases — and are more realistic about budget provisions. As a result, AI is finding use across more technologies and industries than ever before.



IT budgets: If money was no object, how would you spend it?

Roberts says that effort requires significant coordination. The current target in Leeds is to get 8,000 people a year who are digitally excluded and make them digitally included. Roberts says he only has four co-ordinators at the moment, but his team also works with 70-plus third-party organisations. These specialist partners help people – such as the elderly – to get online and to do the things they want to do. "We believe everyone can get involved through that locality-based ecosystem – all we are is the convenors," says Roberts. "But if we could give grants to train people on technology, then I think that change could make a massive difference. People might talk about spending £3,000-plus on something like HoloLens, but just think about how you could use that money to empower the people who deliver digital inclusion." ... Foote says the team's business model relies on outsourcing as much non-core expertise as possible. Technology partnerships can play a key role in F1 – and Haas F1 uses trusted providers to help the team achieve its aims.  "If money was no object, I'd use the cash to both seek out new technology and then to use it to ultimately create benefits for the team," he says.


Mirai descendants dominate IoT threat environment


F-Secure said its honeypot network recorded 12 times more attack events during the first six months of this year than in the first half of 2018, with the increase driven by traffic targeting the IoT Telnet (760 million attack events) and UPnP (611 million) protocols, with most coming from devices infected with Mirai. Meanwhile, the SMB protocol, which is more commonly used by the Eternal exploit family – first used during the 2017 WannaCry outbreak – to spread ransomware and trojans, was behind 556 million events. According to F-Secure, a recent development has been new variants of Mirai that are engineered to infect enterprise IoT devices, such as digital signage screens or wireless presentation systems. This is a source of concern because it allows attackers access to higher-bandwidth internet connections, which means the scale of any resulting DDoS attacks is potentially much higher.


Here's How IoT and AI are Set to Revolutionize the Way We Live and Work

Smart Living: Here's How IoT and AI are Set to Revolutionize the Way We Live and Work
Households today have situations where both spouses are working or are often out of the home, while having kids and elders at home. So safety and security is starting to be an important and basic driver of Smart Living as a means to be warned when things are happening at home or to be able to quickly seek help. Intrusion sensors, Panic buttons, Laser perimeters and more are available through the use of IoT technology to alert the authorities. IP Cameras with AI technologies such as image recognition and interpretation allow for identification of dangerous situations without needing a human being to constantly monitor video feeds. For certain aspects like fire safety in many of these high-rises, there is an increasing concern that unless Smart Living features like smoke or fire sensors detect the safety event early, it may be challenging in many of high rises to control a fire event or even depend on fire engines trying to make their way through impossible traffic. In addition to these from the comfort and convenience perspective, Smart Living can provide many advantages through thermostats, video door bells, air conditioners, motorized curtains and blinds, microwaves, washing machines, coffee makers and more. 


The true cost of network performance issues for your business


Network brownouts are unanticipated and unplanned drops in network quality, which could cost organizations more money than expected, according to a recent survey from Netrounds, a network monitoring software provider based in Sweden. The survey examined common network performance issues organizations face -- network brownouts, in particular -- and the extent of a brownout's potential damage. Netrounds surveyed 400 respondents across the U.S. from companies with over 1,000 employees. Overall, respondents claimed that IT teams didn't notice over 60% of network brownouts, as some alarm systems often didn't detect these network performance issues. This means customers and employees discovered over 40% of brownouts, the survey said, while 14% went unreported. Although 90% of respondents said their network is critical to business operations, network brownouts remain a persistently silent but detrimental foe.


Why saying "yes" to no-meeting days increases productivity

The idea for no meeting days isn't necessarily new, but the issue begins when there's lack of enforcement. It's up to the managers to weave this mindset into the team's culture and lead by example to set the tone. If a meeting is scheduled on a designated no-meeting day, encourage the team to move it or decline it.  I also encourage team members to challenge meetings booked on designated no-meeting days by asking the organizer if the meeting can be moved or if your presence is required. If there's pushback, this is where management comes in.  CTOs and team leaders need to advocate for employees within the company too. It's important to reiterate the benefits at all-hands or staff meetings to ensure employees are well-versed in the benefits and understand why the rule is in place. Lastly, managers should remember to stay flexible and remain open to new ways to the rule can fit into a team's structure and schedule. The more you allow others to be involved in the rule, the more likely they'll stick to it.


Ransomware attacks: Weak passwords are now your biggest risk


"Plain and simply, brute-force attacks are the primary choice for hackers because it works, we're seeing that there are an abundance of accounts that have way too many insecure and weak passwords – making it too easy for hackers to bypass them," Jarno Niemela, principal researcher at F-Secure, told ZDNet. Remote Desktop Protocol (RDP) attacks can also be conducted in this way, with attackers attempting to guess passwords in order to remotely gain control of internet-facing endpoints. It's also possible for hackers to use underground forums to buy the usernames and passwords required to attack previously compromised endpoints. But despite the rise in brute force attacks, spam and phishing remains a highly common attack vector for ransomware: almost a quarter of the ransomware attacks targeting F-Secure honeypots looked to deliver ransomware via email. All it can take for an attack to potentially compromise an entire network is for one user to download a malicious attachment – especially if the network is running unpatched software or doesn't have anti-virus. GandCrab ransomware was commonly distributed by email during the first half of this year.


UN agency Unicef praised for response to accidental data leak


Sam Curry, chief security officer at Cybereason, said the organisation had taken appropriate steps to limit any damage caused. “Kudos to Unicef officials for leaning in and taking steps to limit the damage. The problem is that the word ‘breach’ has a Pavlovian response in the media. We have been trained to treat all breaches the same, and they aren’t. So Unicef is leaning in, taking it seriously, apologising and fixing it,” he said. Curry pointed out that there was a world of difference between hacks targeting confidential data, such as credit card numbers, that they know how to monetise, and an accidental leak. “Just because it’s sensitive and could be very bad doesn’t mean Snidely Whiplash is waiting behind the dumpster and making a run on liquidating the data. It’s sensitive also because it’s children, it’s a not for profit and we never want to think it’s okay to lose data in any way, but there remain degrees of breach and degrees of impact nonetheless.”


To secure industrial IoT, use segmentation instead of firewalls

To secure industrial IoT, use segmentation instead of firewalls
With IIoT, connections can be much more dynamic and traffic can flow between devices in an “east-west” pattern, bypassing where the firewalls are located. That means security teams would need to deploy an internal firewall at every possible IIoT connection point and then manage the policies and configurations across hundreds, possibly thousands of firewalls, creating an almost unmanageable situation. To get a better understanding of the magnitude of this problem, I talked with Jeff Hussey, president and CEO of Tempered Networks, which specializes in IIoT security solutions, and he told me about one of the company’s customers that explored using internal firewalls. After doing an extensive evaluation of where all the internal firewalls would need to go, the business estimated that the total cost of firewalls would be about $100 million. Even if a business could afford that, there’s another layer of challenges associated with the operational side. Hussey then told me about a healthcare customer that’s trying to use a combination of firewall rules, ACL, VLANs, and VPNs to secure their environment, but, as he put it, “the complexity was killing them” and makes it impossible to get anything done because of the operational overhead.


Evolving Role of Artificial Intelligence (AI) in Transforming Talent Acquisition

The core benefits that enterprises implementing AI are seeking are around cost-reduction, enhanced efficiency and actionable insights. While these are significant benefits, enterprises are looking at them in silos. This limits the potential impact of AI, which can be huge, if implemented holistically across the recruitment value chain through a well thought out strategic plan. Enterprises need to look at the potential of AI through two key lenses – what can be achieved with the current maturity of AI technology in the near term and the expectations from AI in the long term as the technology matures and buyers become more comfortable with the concept and use of AI in their recruitment processes. In the first scenario, with the current maturity of AI and other digital technologies, there is potential to digitalize close to 50% of all talent acquisition processes that are currently performed manually. The exhibit below shows the extent of digitalization in high potential processes that can be achieved, from the existing state, by leveraging AI in combination with other digital technologies.



Quote for the day:


The very essence of leadership is that you have to have vision. You can't blow an uncertain trumpet. -- Theodore M. Hesburgh


Daily Tech Digest - September 11, 2019

Is Java the next COBOL?

Is Java the next COBOL?
Java, like COBOL, is relatively easy to read and write. Also like COBOL, Java has maintained its modernity. Every time Java looked like it was fading, something has perked it up. According to Brian Leroux, Android is definitely partially responsible for [Java’s] continued relevance.” A bit later, big data revived Java further. As Nitin Borwankar has highlighted, “Java received [a] second wind due to Hadoop and the whole data science ecosystem including Hive, HBase, Spark, Cassandra, Kafka, and JVM languages such as Groovy and Clojure. All of that is not going away anytime soon.” Indeed, as with COBOL, one of the primary reasons we’re likely to see Java etched on our headstones is because, as Jonathan Eunice writes, it’s “deployed deeply and widely in critical apps, making it worthy of systematic critique.” The more enterprises embed Java into their most mission-critical apps, the less likely it is to be ripped and replaced for modern alternatives. The cost and risk mitigate against doing so. In like manner, Python may well prove its staying power. To Lauren Cooney’s mind, Python will endure because it’s a “GSD [get stuff done] language vs. a cool language.”



Next-Generation Smart Environments: From System of Systems to Data Ecosystems

As the IoT is enabling the deployment of lower-cost sensors, we are seeing broader adoption of intelligent systems and gaining more visibility (and data) into smart environments. Not only are smart environments generating more data, but they are also producing different types of data with an increase in the number of multimedia devices deployed such as vehicle and traffic cameras. The emergence of the Internet of Multimedia Things (IoMT) is resulting in large quantities of high-volume and high-velocity multimedia event streams that need to be processed. The result is a data-rich ecosystem of structured and unstructured data (i.e., images, video, audio, and even text) detailing the smart environment that can be exploited by data-driven techniques. The increased availability of data has opened the door to the use of the data-driven probabilistic models, and their use within smart environments is becoming increasingly commonplace for “good enough” scenarios


Define a continuous improvement process with EA models, practices


One school of thought says that continuous improvement should exist as a new mission for existing EA approaches, not a stand-alone process with tools and software. Continuous improvement simply formalizes how process feedback, a staple of EA-driven businesses, drives change to business processes. In this approach, the organization relies on enterprise architects' well-established integration with software selection and development, so there is no need for new software quality tasks or tools to build out a continuous improvement process. Continuous improvement, at most, might reveal a lack of organization in the way the organization manages feedback. EA teams shouldn't need much additional help from software or changed practices to make continuous improvement work. In a second school of thought, traditional EA work establishes a business process baseline. Once there's a baseline, the continuous improvement process helps keep it aligned with business efficiency and opportunity signals.


Catches of the month: Phishing scams for September 2019

Utility providers were caught out by a rudimentary phishing scam involving a shoe retailer and a former member of the pop group McFly. The scam email is short, with someone called ‘Adam’ providing a PDF attachment containing remittance advice. This is despite the fact that the email comes from Friary Shoes. ... Once users click the attachment, it unleashes Adwind, a type of spyware that: Takes screenshots; Harvests credentials from Chrome, Internet Explorer and Microsoft Edge; Records video and audio; Takes photos; Steals files; Performs keylogging; Reads emails; and Steals VPN certificates. Experts found that Adwind was available as Spyware as a Service, meaning anyone willing to pay for it could use the malware to target organisations. ... the common denominator is your staff. They are the ones who are targeted, and once they open a phishing email, the only thing preventing a data breach is their ability to spot that it’s a scam. Fortunately, there are always clues that reveal the true nature of malicious emails, and our Phishing Staff Awareness E-Learning Course teaches you how to spot them.


The growth economics of artificial intelligence

artificial intelligence, economics of artificial intelligence, AI driven economy, MSME, start-ups, global GDP, Indian economy, information technology services
As the entire world is looking forward to harness the potential of AI for the growth of the industry and for the betterment of society, India has already taken steps to leverage the potential of AI in all walks of life. To foster AI-led growth across all the sections of the society, the government is taking steps to promote Indian tech talent and skills to achieve national goals. With a unique vision of “AI for All”, India can enhance and empower human capabilities to address the challenges of accessibility, affordability and quality of skilled expertise, which, in turn, can help develop scalable solutions for emerging technologies by leveraging collaborations and partnerships among various stakeholders including industry, industry associations, academia, and state and central governments. Besides collaborations, this segment requires a lot of incentivisation and funding support from various stakeholders. As this technology requires massive R&D and innovation, and a highly-skilled manpower for the creation of world-class products, hence sufficient funding is necessary to exploit this technology to its fullest extent.


Data Fabric: Pulling the Covers off the Hype for Business Value

Data Fabric, Business Value
The rate of technological advancement — especially in the data management space — has been astronomical over the last five years. Enterprises find themselves in transit between legacy physical servers and cloud storage, all while streaming data in real-time from various sources in a wide array of formats and file types. These changes provide many unique challenges that can be difficult to navigate without the right data platform. This constant state of flux is the new normal, as technological advancements show no signs of slowing down. Enterprises need to not only adjust to the current evolving data ecosystem but future proof for what tomorrow will bring. At the core of all of this has to be a strong foundation for building around, and adapting to various technologies, architectures, and frameworks. That’s where the idea of constructing a data fabric comes into play. Thinking about interconnectivity, ease of access, clean reliable data and data governance, it cannot be an afterthought. Companies that try to implement a patchwork approach will find themselves unable to adapt, adding new layers of complexity to their data ecosystem each time a new piece of technology is introduced.


Intel Joins Industry Consortium to Accelerate Confidential Computing

consortium 2x1
Confidential computing may take multiple forms, but early use cases rely on trusted execution environments (TEE), also called trusted enclaves, where data and operations are isolated and protected from any other software, including the operating system and cloud service stack. Combined with encrypted data storage and transmission methods, TEEs can create an end-to-end protection architecture for your most sensitive data. Enterprises and cloud service providers can apply confidential computing to a wide range of workloads. The most popular of the early use cases use the trusted enclave for key protection and crypto-operations. But trusted enclaves can be used to protect any type of highly sensitive information. For example, healthcare analytics can be performed so that the enclave protects any data that may contain personally identifiable information, thus keeping results anonymous. Companies that wish to run their applications in the public cloud but don’t want their most valuable software IP visible to other software or the cloud provider can run their proprietary algorithms inside an enclave.


DevOps-as-a-Service: Overcoming Challenges in Large Organizations

Government building
People naturally hate change. It is a law of nature. You can't change that, but you can show people the value of the change so the desire to change overcomes natural resistance. Changing culture can be especially challenging, but it has to be done to properly implement a DevOps culture. As the famed business strategist Peter Drucker said, "Culture eats strategy for breakfast." ... The Authority-to-Operate (ATO) is a specific term for the U.S. government, but the concept can be found across organizations. In essence, security needs to approve an application, or even a subset of a larger application, to operate on the system. ... Janek and Svetlana are implementing DevOp-as-a-Service to solve the aforementioned challenges. It involves a team and a platform with the goal to continuously increase the number and scale of self-service capabilities. Svetlana dove into some specifics of the platform, Monarch, during the presentation. Monarch is a platform that GDIT created for their government client. It is a self-service platform that development teams can use to build Docker containers and deploy them into AWS Elastic Container Service.


What is fileless malware and how do you protect against it?

fileless-taxonomy.jpg
Fileless techniques can be extremely advanced, and they are harder for traditional antivirus software to detect. But not every advanced malware attack is fileless and throwing the term around doesn't help organisations defend against it, Tanmay Ganacharya told TechRepublic. Ganacharya runs the Microsoft Defender threat research team, which analyses new threats and builds models to detect them. "Fileless is such an overused term, and it has gone from the truly fileless threats, to now people wanting to call almost everything that is even slightly advanced fileless and making it slightly buzzwordy," he says. To demystify the term, the threat research team started categorising fileless attacks based on how they get onto a PC and where they're hosted. There are more than a dozen combinations of those 'entry points' and malware hosts being used for fileless attacks — some of which are very sophisticated and are rarely used for targeted attacks, and some of which have been commoditised and are showing up more often for common attacks like trying to run a coin miner on your system. But they fall into three broad groups.


Penetration Testing in the IoT Age

Because IoT objects can lack comprehensive input validation mechanisms, extending the coverage of test payloads is desirable. A widely used method, fuzz testing, employs randomly generated payloads, but this is ine cient due to resources wasted on meaningless inputs. An alternative is to exhaustively or randomly generate syntax-correct inputs. This method provides better test coverage but is still inefficient, as the space of syntaxcorrect inputs is usually large. Intelligently mutating known payloads is a compromise between manual testing and exhaustive/random testing. Combining existing evasion techniques provides greater ability to circumvent validation mechanisms. In this case, conflicting or overlapping techniques should be manipulated carefully to prune unnecessary test cases. On the other hand, converting payloads to syntactically or semantically equivalent payloads is worthy of further investigation. Syntactic mutation generates payloads with slight changes at the syntax level.



Quote for the day:



"Brilliant strategy is the best route to desirable ends with available means." - Max McKeown

Daily Tech Digest - September 06, 2019

It's time for cloud management with automated fixes

It's time for cloud management with automated fixes
What I’m seeing now is a clear demand: a demand that those charged with managing clouds be given the tools not only to find issues with applications, databases, and other cloud-based production processing, but also to automate most simple fixes without bothering humans.This is a mandate for a few core reasons: First, putting humans in the process means that responses will be inconsistent. Different humans will be charged with fixing problems at different times and will do so in different ways. In some cases they won’t get fixed in a timely manner, considering that humans sleep through the phone ringing or find other ways to ignore issues with their applications deployed on the public cloud. Second, we now have automation capabilities that can do some pretty remarkable things. With machine learning we can not only automate some fixes, but do experienced learning as things are being fixed. For instance, once you find out that the database should be reset before the middleware server on your public cloud provider, you can store that knowledge for later. I’ve built nothing but management with automated fix or self-healing capabilities. Why? People need their sleep, and outages get fixed so fast most never even knew they happened. Sound better?



Listen and learn about QA automation, built-in quality

It's more about: How do you get more effective in terms of transformation? Or how do you get more effective in terms of software development delivery? Because there's no shortage of good ideas. There's just really a shortage of people being able to get things done fast enough, quick enough, efficiently enough for the dollars they have, and a lot of organizations struggle with that. There's a lot of different ideas out there from the Agile community, the DevOps community. They say, 'Do these practices, and you'll get better.' What I found is that I'm in a somewhat unique industry in that I'm a thought leader, but also, when I work with organizations, I don't work with them unless I can stay with them through the journey and help coach them along the way. That gives me a couple of advantages. One is I don't know exactly what to tell them up until they start running into problems. Two is that I get to learn from them along that journey. So, I get to see what's working and what's not working.


COBOL turns 60: Why it will outlive us all

dw-82pfuqaamzno.jpg
"While market sizing is difficult to specify with any accuracy, we do know the number of organizations running COBOL systems today is in the tens of thousands. It is impossible to estimate the tens of millions of end users who interface with COBOL-based applications on a daily basis, but the language's reliance is clearly seen with its use in 70 percent of global transaction processing systems." What does that mean? Britton explained: "Any time you phone a call center, any time you transfer money, or check your account, or pay a mortgage, or renew or get an insurance quote, or when contacting a government department, or shipping a parcel, or ordering some flowers, or buying something online at a whole range of retailers, or booking a vacation, or a flight, or trading stocks, or even checking your favorite baseball team's seasonal statistics, you are interacting with COBOL." That's because the largest number of businesses using COBOL are financial institutions. This includes "banking, insurance and wealth management/equities trading. Second is government services (federal, provincial, local)."


Police use of controversial facial recognition technology deemed lawful


According to Liberty lawyer Megan Goulding: “This disappointing judgment does not reflect the very serious threat that facial recognition poses to our rights and freedoms. “Facial recognition is a highly intrusive surveillance technology that allows the police to monitor and track us all. It is time that the government recognised the danger this dystopian technology presents to our democratic values and banned its use.” Despite their ruling, the judges said “the future development of AFR technology is likely to require periodic re-evaluation of the sufficiency of the legal regime,” leaving the door open for further conflict over use of the technology. “I recognise that the use of AI and face-matching technologies around the world is of great interest and, at times, concern,” said South Wales chief constable Matt Jukes. “I’m pleased that the court has recognised the responsibility that South Wales Police has shown in our programme. With the benefit of this judgment, we will continue to explore how to ensure the ongoing fairness and transparency of our approach.”


Why Red Hat sees Knative as the answer to Kubernetes orchestration


Knative allows organizations to run their own serverless architecture on their own servers—in practice, this is more normal than it sounds. "There are many, many reasons… the most common one we hear from our customers is around security," William Markito Oliveira, senior manager of product management at Red Hat, told TechRepublic. "Financial institutions, healthcare, they would prefer to [be] running on their own data centers, or they can't move all the data that they have to the cloud." "The other is around portability, and the vendor lock-in story, where they want to do serverless but on their own terms," Oliveira continued. "They want to be able to run the same kind of workload… without having to rewrite all their applications for that specific implementation of serverless." "One of the key benefits that you get out of Kubernetes," according to Oliveira, is consistency. "For every Kubernetes cluster, that application is going to behave exactly the same way regardless of which Kubernetes distribution you are using, or regardless of where that particular Kubernetes [cluster] is running. [Moving] from Cloud provider A to Cloud provider B, there is always some rework that you have to do at the application level."


Data Analytics in the World of Agility

A learning process is required in order to expand on different points of view when observing a customer, and this is already being introduced in the education sector; at Deusto Business School within the Master in Business Innovation (MBI) for example, 15 students travel every year to Florence in order to learn from artistic work. You do learn in a very different way listening to the voice of Lorenzo de Medici (1449-1492). It is not a data-driven, but a data-inspired industry that we are heading for today, brought together with a wide variety of perspectives, if we want to see our customer as a human being and not just a consumer of mass-production. What we need is a healthy mix of big-data analysis, ethnographical research, anthropological views, and continuous education to expand the vision on our business! The digital industry has learned this lesson, and you can already find ethnographic observation in many sectors, which is near to becoming a market standard already.


Why hybrid blockchains will dominate ecommerce

IBM blockchain Walmart
"There are two different worlds. You have business-to-business [B2B] transactions and business-to-consumer [B2C] transactions. If you look at B2C, many times people will substitute convenience for privacy," Woods said. "This is one of the big issues we have in today's world, where all these tech giants are out there in social media and consumers will say, 'I'll give my personal information away to Facebook, Google, Apple or Amazon and they'll give me services in return.'" Much in the same way IT shops control which employees can access sensitive information within a business through rights management and permissions, businesses want to segregate information they may not want rivals to see. In the B2B world, where privacy and confidentiality are prized over convenience, companies don't do business with partners they don't know – hence a permissioned blockchain. "So, if you look at the B2B environment for blockchain, it pretty much looks the same way. You need to be permissioned and everyone needs to know everyone else," Woods said. "All companies go through know-your-customer and anti-money laundering processes to ensure all players are who they say they are. Businesses do business based on trust."


HPE's vision for the intelligent edge

The challenge is how to inject automation into areas such as data centers, IoT and granting network access to endpoints. In the past, automation and manageability were afterthoughts, he said. “The wired network world never really enabled native management monitoring and automation from the get-go.” Melkote said HPE is changing that world with its next generation of switches and apps, starting with a switching line the company introduced a little over a year ago, the Core Switch 8400 series, which puts the the ability to monitor, manage and automate right at the heart of the network itself, he said. In addition to providing the network fabric, it also provides deep visibility, deep penetrability and deep automation capabilities. "That is where we see the wide network foundation evolving," he said. In the wireless world, speeds and capacity have also increased over time, but there remains the need to improve network efficiency for high-density deployments, Melkote said.


First long-distance heart surgery performed via robot

corindus.jpg
During the remote procedures, Dr. Patel used Corindus' CorPath GRX robot and a hardwired internet connection, manipulating the robot with a set of joysticks and a video monitor. Corindus has performed several remote test cases in the U.S. since, but Dr. Patel's procedure marked a major milestone in medicine. "Remote procedures have the potential to transform how we deliver care when treating the most time-sensitive illnesses such as heart attack and stroke," says Mark Toland, President and Chief Executive Officer of Corindus Vascular Robotics. "The success of this study paves the way for large-scale, long-distance telerobotic platforms across the globe, and its publication in Lancet's EClinicalMedicine demonstrates the transformative nature of telerobotics. While remote robotic procedures are still in the early stages of development, it is clear we are on track to expand patients' access to care, while reducing their time to treatment."


Low-code goes mainstream to ease app dev woes

Surging interest in low-code/no-code adoption comes not just to help increase developers' productivity, but also to empower enterprise business users. A Gartner report on the low-code space, released in August 2019, predicted that by 2024, 75% of large enterprises will use at least four low-code development tools for both IT application development and citizen development, and over 65% of applications will be developed with low-code technology. Upwork, the web platform for matching freelance workers with jobs, recently identified low-code development skills as rapidly gaining in popularity, particularly for developers familiar with Salesforce's Lightning low-code tools to build web apps. Low-code analyses from Gartner and Forrester in 2018 did not rank Microsoft as a leader, but the software giant shot up in the rankings with the latest release of its Power Platform and PowerApps low-code environment that broadly supports both citizen developers and professional developers.



Quote for the day:


"No matter what accomplishments you make, somebody helps you." -- Althea Gibson


Daily Tech Digest - September 05, 2019

Charity on the Internet: How to identify scammers

We tell you how to distinguish genuine fundraising groups on Facebook from scammers preying on people's kindness
Facebook has been experiencing a wave of fake fundraising campaigns. The pattern is familiar: Attackers create groups from scratch to which they add a couple of posts. They provide bank transfer details along with a bunch of tear-jerking comments. The groups tend to follow a template. The group’s name contains an appeal for help, and the posts provide emotional stories, usually about terminally ill children whose suffering is illustrated by photos and videos that are posted on the page. Some of the posts are practically word-for-word copies of posts in other fraudulent groups. The only details that differ in each group are the child’s name, his or her diagnosis, and the name of the hospital where they are receiving treatment. Frequently the contact information and the bank transfer details are the same for multiple groups — which, by the way, is the most reliable indicator of the scam. New scam groups appear every month, and even though complaints shut them down quickly, some users are inevitably taken in and transfer money to the scammers.



Artificial intelligence and machine learning are the next frontiers for ETFs, says industry pro

The thinking behind this is that the collective wisdom of every smart beta ETF out there — including Goldman’s — is better than the mindset of any individual set of stock pickers. “You’re going to add the data to it that, quite frankly, a human brain just can’t digest,” said Tull. So, the key question becomes, is there any evidence that machine learning can actually outperform when it comes to picking stocks? Dave Nadig, who runs ETF.com, says there is. He points to the AI Powered Equity ETF (AIEQ), which has risen 17%, besting the S&P 500 this year. The fund, run by Equbot, uses both A.I. and IBM Watson to find opportunities in the market. “I think this is the next generation, frankly, of financial product development,” said Nadig. “Machine learning sounds big and scary, but all it is, is really just taking data and things you already know, how things perform, to generate rules – as opposed to hiring a bunch of CFAs to come up with those rules about what you’re going to buy and sell based on fundamentals.”


Not worried about unethical AI? You should be

Not worried about unethical AI? You should be image
Millennials (ages 18-38) are the age group most comfortable with AI, but they also have the strongest opinions that guard rails, or ethical practices, are needed. Whether it’s anxiety over AI, desire for a corporate AI ethics policy, worry about liability related to AI misuse or a willingness to require a human employee-to-AI ratio — it’s the youngest group of employers who consistently voice the most apprehension. For example, 21% of millennial employers are concerned their companies could use AI unethically, compared to 12% of Gen X and only 6% of Baby Boomers. “Our research reveals both employers and employees welcome the increasingly important role AI-enabled technologies will play in the workplace and hold a surprisingly consistent view toward the ethical implications of this intelligent technology,” continued Leeson. “We advise companies to develop and document their policies on AI sooner rather than later – making employees a part of the process to quell any apprehension and promote an environment of trust and transparency.”


Continuous Delivery for Machine Learning


Regardless of which flavour of architecture you have, it is important that the data is easily discoverable and accessible. The harder it is for Data Scientists to find the data they need, the longer it will take for them to build useful models. We should also consider they will want to engineer new features on top of the input data, that might help improve their model's performance. ... We then stored the output in a cloud storage system like Amazon S3, Google Cloud Storage, or Azure Storage Account. Using this file to represent a snapshot of the input training data, we are able to devise a simple approach to version our dataset based on the folder structure and file naming conventions. Data versioning is an extensive topic, as it can change in two different axis: structural changes to its schema, and the actual sampling of data over time. Our Data Scientist, Emily Gorcenski, covers this topic in more detail on this blog post, but later in the article we will discuss other ways to version datasets over time.


Data Governance and Machine Learning


The advanced AI system providers seem to think that only ML-powered solutions will ultimately satisfy both the regulatory and compliance requirements. Let’s take the example of the banking sector. Currently, the lack of consistency in data definition and quality is a serious deterrent to business operations across the enterprise. ML can help solve regulatory and compliance issues, specifically those related to Data Governance and data security and privacy, faced by different divisions within an enterprise. Now with General Data Protection Regulation (GDPR) requirements in most parts of the world, the advanced technologies are viewed as welcome transitions in global businesses. ... Gartner believes that by 2020, at least 50 percent of Data Governance policies will be driven by metadata. The greatest strengths of metadata are the implementation of accountability at every step, a common vocabulary, and an auditable process for compliance. Then ML technologies can move from the science labs to business halls. ... Surprisingly, during a survey of business executives, only 12 percent of the respondents acknowledged the presence of a defined Data Strategy in their enterprises.


Meet FPGA: The Tiny, Powerful, Hackable Bit of Silicon at the Heart of IoT

Image Credit: elen31 via Adobe Stock
In a CPU, the configuration of the chip is established at the chip foundry. Programming governs the movement of bits through the pre-set architecture. In an FPGA, though, the configuration is defined by hardware-definition language (HDL) that's loaded from storage — frequently static random access memory (SRAM) — at device boot time. This means the architecture of the device can be optimized for a particular task — and updated or upgraded as vulnerabilities are discovered or new capabilities are licensed. The ability to update the FPGA is seen as a positive security step because vulnerabilities can be addressed with new definitions. FPGAs are growing in popularity among device manufacturers because they fit more easily into an "agile" work process than do ASICs. While ASICs have to be defined in a manufacturing process that can take weeks or months in production quantities, FPGAs are defined by software that can be revised as frequently as releases can be dropped — many times a day during development.


How Robot CEOs Could Save Capitalism


In the wake of Big Tech, as questions about ethics dominate national conversations and the technology industry focuses on more ethical approaches to A.I., Wallis’ recommendation that the private sector fixes itself through the checks and balances of competition could prove to be a valuable and effective solution to rebuilding America’s middle class. While America’s largest companies begin to deliberate a new definition for the purpose of corporations, technologists and startups seeking to create ethical technology would be wise to explore ways A.I. can improve our economy while doing the least harm to the human workforce. By creating new technology to replace exorbitantly paid CEOs with A.I. that can do their jobs more efficiently while potentially offering more stability to companies, America’s corporations could benefit while the overall workforce remains intact. In turn, billions of dollars that would have gone to CEOs could be freed up to be redistributed through the economy directly, allowing companies to pay sensible wages that can keep pace with inflation without borrowing from the Federal Reserve.


Securing Your Kubernetes Pipeline

Image title
Automation is the answer to this challenge. It is nearly impossible to track changes manually, so you have to automate some parts of the process for maximum efficiency. This is done by integrating security compliance into the development and deployment processes. To be able to take this step, however, you have to define clear security and compliance policies first. Integrating security and compliance as early in the pipeline as possible is also highly recommended. This means securing not just the app or code, but also the CI/CD pipeline itself. Fortunately, there are more ways to achieve this. You can, for instance, use the IaC approach to create a standardized deployment stack. Since infrastructure is baked into the deployment package, it is much easier to make sure that a consistent cloud infrastructure is maintained. Another approach is adding (and enforcing) security policies, which we will get to in a second. Using tools like Kritis, Ops can enforce security policies at a much early stage in the development process. The policies govern how new updates and micro-services are deployed.


Using cloud, big data and biometrics to build the airport of the future


Ibbitson's vision of a joined-up airport system has been shaped by the position he holds within Dubai Airports. A focus on integration is inherent to this role: one year after joining the company as CIO, Ibbitson added responsibility for engineering services, taking on his current title of executive vice president for technology and infrastructure. His role is to bring IT and engineering together, helping the organisation make more efficient use of data across its business environment. Considerable progress has already been made and some of this preparatory work will form the foundation for the airport of the future. ... This platform, which supports a move toward multi-factor authentication, provides an integrated access point for accessing the organisation's data. Ibbitson's work on data integration forms part of his ongoing efforts to refine identity management processes and to introduce biometrics for the airport of the future. The aim is that airlines across DXB and DWC will be able to automate identity checks, allowing passengers to use their verified identity to move smoothly around the airports.


Darktrace unveils the Cyber AI Analyst: a faster response to threats

Darktrace unveils the Cyber AI Analyst: a faster response to threats image
Typically, a human analyst will spend half an hour to half a day investigating a single suspicious security incident. They will look for patterns, form hypotheses, reach conclusions about how to mitigate the threat and share the findings with the rest of the business. The AI cyber security company claim its new solution accelerates this process, continuously conducting investigations behind the scenes and operating at a speed and scale beyond human capabilities. And crucially, Darktrace say it can conduct expert investigations into hundreds of parallel threads simultaneously and instantly communicate its findings in the form of an actionable security narrative. “Cyber AI Analyst emulates the human thought processes that take place when a security analyst performs an investigation on a security incident. It’s like having an extra member of staff that is an expert in their field, and reports on issues in seconds, instead of hours.” 



Quote for the day:


"People leave companies for two reasons. One, they don't feel appreciated. And two, they don't get along with their boss." -- Adam Bryant


Daily Tech Digest - September 04, 2019

Vision 2020: Reimagining India over the next decade through AI


Government bodies and private players are already collaborating to pilot AI-led applications, even in domains which had hitherto been relatively untouched by cutting-edge innovations; these include areas such as agriculture, education and healthcare. The results generated thus far are extremely encouraging and indicative of the critical role that the technology can play in driving large-scale transformations across industries and sectors. Talking about specific use-cases, we have the Ministry of Home Affairs is working towards deploying India’s first Intelligent Traffic Management System (ITMS) in New Delhi. Aimed at addressing the city’s perennial traffic woes, the deployment will leverage AI-based smart traffic signals to monitor, automate and streamline the flow of traffic flow. Similarly, the Ministry of Defence has its own AI Task Force, which is advising the government about the possible offensive and defensive applications to optimize its military strategy and further enhance India’s position as an emerging superpower.



USB4 is ready: Twice as fast, smaller, and hitting devices in 2020


USB4 is the next major version of the USB, which gains a major speed boost thanks to Intel licensing its Thunderbolt 3 protocol to the USB Promoter Group on a royalty-free basis. This group includes Apple, HP, Intel, Microsoft, and Texas Instruments.  USB4 will enable 40Gbps speeds equivalent to Thunderbolt 3, which is currently found in high-end computers like the MacBook Pro and peripherals. That's twice as fast as the current USB 3.2. However, as noted by CNET's Stephen Shankland, many consumers are still using computers with earlier versions of USB that offer 5Gbps or 10Gbps. Thunderbolt 3's incorporation into USB4 should bring higher speeds to lower-end devices and peripherals. And those higher speeds will be useful for connecting multiple displays and getting data from external hard drives. The longer-term promise of the speedier USB4 is that device makers will stop using old rectangular USB-A ports and USB Micro B ports in favor of the newer USB-C connectors, which USB4 requires to work. The USB Implementers Forum told CNET that consumers could expect to see devices, including laptops, external hard drives, and dongles with USB4 support in the "second half of 2020".


Developer code reviews: 4 mistakes to avoid


Code reviews typically fall into one of two poor patterns. The first involves the reviewer not making any changes: "When there are no comments, that should terrify you," Presley said. "It leads to apathy—if you're rubber stamping, why do it at all?" The second is when a simple set of changes turns into a long, drawn-out process, when quick changes turn into inefficient meetings with too many people involved to actually solve problems, Presley said. "It's exhausting, and a waste of time for you and lots of other people," he added.  The simple goal of code reviews is to find bugs early on in the process, since bugs cost more the later they are discovered, Presley said. Several case studies back this up, he explained: For example, IBM found that each hour of code inspection prevents about 100 hours of related work, including support at QA. And after introducing code reviews, Raytheon reduced its cost of rework from 40% of the project cost to 20% of the cost, and the amount of money spent on fixing bugs dropped by 50%, Presley said.


Capabilities of attackers outpacing security leaders' ability to defend their organization: Study - CIO&Leader
This issue is compounded with limited resources, including lack of sufficient budget and skilled professionals as well as a threat attack surface that is quickly expanding and becoming more sophisticated. Because of this, security leaders understand it is critical to have the right strategies in place as they face an arms race between the capabilities of attackers and their own defense postures.The global survey polled CISOs across various industries about the biggest challenges they’re facing and strategies they’re putting in place to address these obstacles. “The Forbes Insights survey echoes the primary challenges we hear directly from Fortinet customers and prospects. Today's CISOs are tasked with the challenge of allocating limited funds and resources to the highest-return cybersecurity projects which can range from breach detection to response. These C-level security leaders must maximize security with finite resources, all while balancing strategic leadership responsibilities and tactical issues. Through the Fortinet Security Fabric, Fortinet is providing end-to-end security so that CISOs can navigate a rapidly changing cyber threat landscape day in and day out,” said John Maddison, EVP of Products at Fortinet.


Those adopting a multi-cloud approach were far more likely to have suffered a data breach over the past 12 months, the study shows, with 52% reporting breaches compared with 24% of hybrid-cloud users and 24% of single-cloud users. Companies with a multi-cloud approach are also more likely to have suffered a larger number of breaches, with 69% reporting 11-30 breaches compared with 19% of those from single-cloud and 13% from hybrid-cloud businesses. “When it comes to ensuring resilience and being able to source ‘best-in-class’ services, using multiple vendors makes sense,” said Reed. “However, from a security perspective, the multi-cloud approach also increases exposure to risk as there are a greater number of parties handling an organisation’s sensitive data. This is exactly why an eye must be kept on integration and a concerted effort be made to gain the visibility needed to counter threats across all different types of environments.” 


Identity access management  >  abstract network connections and circuits reflected in eye
When properly designed and deployed, predictive analytics can deliver deep insights into an array of commonplace and unique network issues, helping operators handle everything from policy setting and network control to security, says Rahim Rasool, an associate data scientist with Data Science Dojo, a data science training organization. To tackle security issues, for instance, predictive analytics can use anomaly detection algorithms to sniff out suspicious activities and identify possible data breaches. "These algorithms scan the behavior of networks working in the transfer of data and distinguish legitimate activity from others," Rasool explains. "With predictive analytics systems, the vulnerabilities in a network can be detected before a hacker group does and, subsequently, a defense mechanism can be drawn out." Another way predictive analytics can help organizations is by comparing trends to infrastructure capabilities and alert thresholds. "Almost all signals have an upper bound and a lower bound that are a result of the infrastructure's capabilities," says Gadi Oren, vice president of technology evangelism at LogicMonitor, which operates a cloud-based performance monitoring platform. 


Enterprise software will see the highest growth in 2019 and 2020 (9% and 10.9% respectively), while devices, communications services and data center systems will all recover somewhat in 2020 from declines in 2019, according to Gartner. The analyst firm sees the cloud spreading its tentacles further into the enterprise, encompassing areas like office suites, content services and collaboration services. "Spending in old technology segments, like data center, will only continue to be dropped," Lovelock said. ... IDC sees a 'natural cohesion' between traditional and new technologies: "Cloud and mobile enable rapid deployment and connectivity, while also cutting costs and complexity in legacy operations which allows businesses to focus on new digital innovation," says the analyst firm. Such synergies, along with the continuing need for professional services associated with the roll-out of digital transformation solutions, will mean that the impact of new technologies is "much bigger than revenues associated with discrete categories such as IoT sensors, 3D printers or drones," IDC says.


How to avoid CIO and CFO clashes over cloud spend

istock-503870180.jpg
Much of the cloud budgeting issues can be traced back to a disconnect between IT and finance, according to the report, which ultimately hurts the business. The IT department is often unaware of the burden cloud budgeting has on finance, the report found: 51% of finance respondents said they occasional overspend on cloud resources, compared to 37% of IT respondents, who are less aware. Some 68% of finance respondents said they are alerted to overspend only after it's too late, whereas 80% of IT respondents said they are alerted before the overspend takes place, the report found. Collaboration between IT and finance in a formal reporting capacity remains rare, as only 28% of professionals surveyed said this happens in their organization, the report found. The CIO and CFO play key roles in any organization, but the two have historically faced challenges working together over budgets and technology investments. Budgets tend to be the largest point of friction, as those are not typically a strength of the CIO, Khalid Kark, US CIO program research leader at Deloitte, told TechRepublic. On top of that, many times CIOs are investing in assets that may not have direct ROI.


Settling the edge computing vs. cloud computing debate

Settling the edge computing vs. cloud computing debate
The edge computing side that’s in the vehicle needs to respond immediately to changing data in and around the vehicle, such as an impeding crash or weather-related hazards. It does not make sense to send that data all the way to a central cloud server, where the decision is made to apply the brakes, and then back to the vehicle. By then you’ll have hit the semi. However, edge devices are typically much lower powered, with limited storage and compute capabilities. Deep learning processing and predictive analytics to determine the best approach to vehicle maintenance based on petabytes of historic data is best done on back-end cloud-hosted servers. See how that works? The edge computing market will continue to grow. A report on the topic, sponsored by software provider AlefEdge, pegs the size of the edge-computing market at more than $4 trillion by 2030. At the same time the cloud computing market will be 10 times that, and you’ll find the growth of both markets more or less proportional. Edge computing needs cloud computing, and the other way around. Indeed, public cloud computing providers will take advantage of the use of edge-based systems, providing small cloud service replicants, or smaller edge-based version of cloud services.


IoT security essentials: Physical, network, software

iot security ts
Where IoT is concerned, however, best security practices aren’t as fleshed out. Some types of IoT implementation could be relatively simple to secure – a bad actor could find it comparatively difficult to tinker with a piece of complex diagnostic equipment in a well-secured hospital, or a big piece of sophisticated robotic manufacturing equipment on an access-controlled factory floor. Compromises can happen, certainly, but a bad actor trying to get into a secure area is still a well-understood security threat. By contrast, smart city equipment scattered across a metropolis – traffic cameras, smart parking meters, noise sensors and the like – is readily accessible by the general public, to say nothing of anybody able to look convincing in a hard hat and hazard vest. The same issue applies to soil sensors in rural areas and any other technology deployed to a sufficiently remote location. The solutions to this problem vary. Cases and enclosures could deter some attackers, but they might not be practical in some instances. The same goes for video surveillance of the devices, which could become a target itself. The IoT Security Foundation recommends disabling all ports on a device that aren’t strictly necessary for it perform its function, implementing tamper-proofing on circuit boards, and even embedding those circuits entirely in resin.



Quote for the day:


Ineffective leaders don't react to problems, they respond to problems and learn. - Danny Cox