Daily Tech Digest - December 14, 2019

Watch Out: 7 Digital Disruptions for IT Leaders

Image: beeboys - stock.adobe.com
Inexpensive sensors can now track physical biometrics, and organizations are working on providing hyper-personalized digital experiences, according to Gartner. The firm is forecasting that by 2024, AI identification of emotions will influence more than half of the online ads that you see. This trend will reach beyond marketing to consumers. It could also be used in HR applications and be applied to employee evaluations, for instance. Gartner recommends that CIOs identify emotional trigger-based opportunities with employees and customers, add emotional states evaluation to 360 Review processes, and mitigate privacy concerns with opt-in for-pay emotion mining. ... While it cost 4% of the entire U.S. budget to put a man on the moon, putting a satellite into orbit now costs just $300,000, Plummer said. That has led to a low space orbit getting mighty crowded with hundreds of satellites. It also raises a host of new questions. What rules apply to data residency in space? What laws apply? What about crime in space? Countries and companies will be competing in space, and the cheaper it gets to launch a satellite, the more crowded it will become.


Corporate venture capital deals hit new record as banks invest in fintech competitors

RT: Goldman Sachs sign
Financial services corporate venture deals surged 500% from 2014 through the third quarter of 2019. Nearly half of the total financial services deals are in California. Citi Ventures is the most active when it comes to deal flow with 66 venture deals, compared to 64 by Goldman Sachs’ VC arm. Goldman has backed the most so-called unicorns with five companies valued at more than $1 billion. Its bets include Plaid, Circle and Marqeta. Six other financial services groups have invested in three or more unicorns. American Express Ventures came in at number three with 55 deals since 2014. Payment corporate venture capital deals reached peak levels this year, according to CB Insights. But capital markets corporate VC with names like CME Ventures, Monex Ventures and Nasdaq Ventures, is slowing, according to CB Insights. It’s not just corporate venture capital. Overall, fintech funding is surging, with start-ups bringing in a record $24.6 billion in funding through September, according to CB Insights.


Going to the dark side: Should you consider becoming a consultant?

Happy business colleagues in modern office using tablet
If there's one thing I find that makes or breaks a successful consultant, it's an ability to thrive in an uncertain environment. Some people think I'm joking when I tell them I have no idea where I'll be physically working, what company I'll be working with, and what I'll be trying to accomplish weeks from now, but it's absolutely true. For some people, that's a thrilling proposition and very different from a predictable role where they can map out their future with relative certainty months, or even years out. Consulting provides a unique opportunity to quickly gain wildly diverse experiences across industries, geographies, and technologies, and also creates an opportunity to reinvent your career on a regular basis as you acquire new experiences and quickly develop new skills. The downside to this unpredictability is what drives many people to leave the profession. It's difficult to plan everything from family events to routine doctor visits when you could literally be anywhere in the world, in some cases with a day's notice (or less). The excitement of the unknown can quickly become a frightening instability and a sense that you have no control over your destiny.


Financial innovation in China: leading the way and one eye on the future

In the payment space, Accenture predicts ongoing cumulative losses of $US 61 billion to China’s incumbent banks between 2019 and 2025 due to digital payment platforms. Currently, Alipay and WeChat Pay represent about 90% of the payment market. Meanwhile, the loan books of the neobanks have grown with incredible speed. The total credit on the books of the biggest neobanks owned by WeChat and Alipay at the end of 2017, was RMB 1.3 trillion, or 22% of all of China’s consumer credit. An impressive figure considering they did this within three years of launch. So yes, being threatened is undoubtedly an excellent motivator for innovation. But there is an even more significant threat. Banking is becoming an afterthought. With the ease of digital payment provided by WeChat Pay and Alipay, most users don’t care much about the bank’s app or services, they are irrelevant, and banks are used only for storing money. Relegated to the role that some refer to as “dumb pipes.”


Mozilla to force all add-on devs to use 2FA to prevent supply-chain attacks

mozilla-to-firefox-users-heres-how-were-5da72643dc406100013edce7-1-oct-25-2019-19-28-12-poster.jpg
When this happens, hackers can use the developers' compromised accounts to ship tainted add-on updates to Firefox users. Since Firefox add-ons have a pretty privileged position inside the browser, an attacker can use a compromised add-on to steal passwords, authentication/session cookies, spy on a user's browsing habits, or redirect users to phishing pages or malware download sites. These types of incidents are usually referred to as supply-chain attacks. When they happen, end users have no way of detecting if an add-on update is malicious or not, especially when a tainted update comes from the official Mozilla AMO -- a source considered secure by all Firefox users. Mozilla's decision to force add-on devs to enable 2FA is the best course of action the browser maker could have taken to prevent future supply-chain incidents. While there have been no known cases of AMO account hijackings for Firefox add-ons in recent years, there have been many cases of hijacked Chrome extensions.


How the ArchiMate Modeling Standard Helps EAs Deliver Greater Business Agility

The key role of architecture is to ensure that you have flexibility in the short-term and in the long-term. Models are a great help in that. And that’s of course where the ArchiMate standard comes in. It lets you create models in standardized ways, where everybody understands them in the same way. It lets you analyze your architecture across many aspects, including identifying complexity bottlenecks, cost issues, and risks from outdated technology -- or any other kind of analysis you want to make. Enterprise architecture is the key discipline in this new world of digital transformation and business agility. Although the discipline has to change to move with the times, it’s still very important to make sure that your organization is adaptive, can change with the times, and doesn’t get stuck in an overly complex, legacy world. ... The capability concept and the mapping between them is also very important. That allows you see what capabilities are needed for the stages in the value production.


Instagram explains how it uses AI to choose content for your Explore tab


In its blog post, though, Instagram’s engineers explain the operation of the Explore tab while steering clear of thorny political issues. “This is the first time we’re going into heavy detail on the foundational building blocks that help us provide personalized content at scale,” Instagram software engineer Ivan Medvedev told The Verge over email. (You can read about how Instagram organizes content on the main feed in this story from last year.) The post emphasizes that Instagram is huge, and the content it contains is extremely varied, “with topics varying from Arabic calligraphy to model trains to slime.” This presents a challenge for recommending content, which Instagram overcomes by focusing not on what posts users might like to see, but on what accounts might interest them instead. Instagram identifies accounts that are similar to one another by adapting a common machine learning method known as “word embedding.” Word embedding systems study the order in which words appear in text to measure how related they are.


IoT Has Spawned Entity-Based Risks -- Now What?

uncaptioned
The security problem will only grow more complex. A study conducted by 451 Research (via Yahoo Finance) estimates that “the number of IoT connected devices (excluding PCs, smart TVs, and game consoles) will be approximately 8 billion in 2019 and reaching nearly 14 billion in 2024," while a report from the International Data Corporation (via MarketWatch) forecasts that worldwide spending on IoT will reach $745 billion in 2019. Increased connectivity means increased security threats. From my experience, many IoT products don't get regular updates, while some can't be updated. This exposes devices to potential cyberattacks that target vulnerabilities in outdated hardware and software. In addition, most IoT devices come with default passwords that can be easily compromised using publicly available password lists and automated searches for particular devices. Others have weak credentials that are susceptible to brute-force password hacking. The exponential growth in IoT devices has led to more ransomware, malware and botnet attacks that are specifically targeting certain equipment.


Battleground over accountability for AI


Vogel said that many people have a view that AI systems are neutral but they don't understand how many human touch points are involved in their development. With successful AI being reliant on diversity in their data sets and development teams, the under-representation of different gender and cultural groups in the IT industry, he said, has exacerbated any problems relating to AI neutrality. Lyndon Summers, the operations manager at Open Universities Australia, agreed that we need expertise from diverse backgrounds. He noted that some of the most successful service developments and improvements he has seen came from listening to call centre staff, as well as developers and software engineers. "One of the biggest values is the human touch points," said Summers. "We need to find the right balance between people and automation and, if we are going to increase the level of automation we use, we have to find roles for the people we displace and perhaps get them into roles to help us build even more automation".


Adaptive systems, machine learning and collaborative AI with Dr. Besmira Nushi

We’re really good in reasoning and imagination. And machines are good in processing these terabytes of data for us and giving us these patterns. However, you know, if we can use the machine capabilities in an efficient way, we can be quicker and faster, as I said. But then, on the other hand, you know, these are concepts that, if you think deep about it, they are not that new. In the sense that when we invented personal computing in the 80s, this is one of the reasons why it became so successful, because the personal computer was suddenly this “buddy” that could help you do things faster and quicker. But then there is another thing that enabled that development in those years and really, I think that that is the field of human computer interaction. ... Another one that we focus a lot on is predictability of errors. And what this really means is that, if I’m working with an AI algorithm, I should be able to, kind of, understand that that AI algorithm is going to make mistakes.



Quote for the day:



"Many men may see the King in a Kid but it takes a true leader to nurture it." -- Bernard Kelvin Clive


Daily Tech Digest - December 13, 2019

State of enterprise machine learning in 2020: 7 key findings


"Machine learning has the ability to, in a lot of cases, reduce errors, which can help a company make more money and save money," Oppenheimer said. "Like in jobs where there's a lot of data entry or processing, where there might be a lot of humans involved, where it's error prone and it's slightly slow, machine learning can automate a lot of that and make it more precise. It liberates those humans who are doing basic data entry to do higher level tasks, which humans are better suited for." While medium to large companies, in particular, are primarily focused on cutting costs, small companies are more interested in improving the customer experience, the report found. Smaller companies are trying to retain customers and have steady business--a problem that larger companies may not have. When thinking about how to use machine learning, optimization is a huge use case, Oppenheimer said. ... Machine learning projects will still be in early stages at organizations in 2020: 21% of businesses said they would be evaluating use cases, and 20% identified themselves as early-stage adopters in machine learning production, the report found.



Experiences from Mob Programming at an Insurance Startup


Mob programming brings the team lots of feedback. Victoor said that being together the whole time helps a lot when making technical decisions. It also gives them a lot of courage to tackle complex issues and tough refactorings. Rouve mentioned that the main benefit of mob programming is continuous sharing and learning; plus, mob programming forces the team to be aligned on best practices and coding standards. "It daily improves our work by communicating more efficiently," he said. ... During a mob session, all ideas are discussed. This is really great for problem-solving. When you are alone and you need to solve a problem, you are biased. If you are a senior developer, you may think of a solution that you have applied in the past to a similar problem. This solution may not be the simplest, or the most efficient to the current problem. When mobbing, everyone can speak up, share ideas and concerns. This is really a great way to build simpIe designs, shared by every single member of the team.


Cisco targets hyperscalers with silicon, high-end routers

fiber optics
“Moore’s law is stalling," wrote Jonathan Davidson senior vice president and general manager of Cisco Service Provider Networking in a blog about Silicon One. "While the rest of the industry slows down from the physics of traditional approaches, we have unlocked new dimensions of innovation. By rethinking silicon design entirely, we can deliver industry-leading performance today and create a ‘fast lane’ to the future. “In the past, multiple types of silicon have been used across a network and even within a single device. Feature development was inconsistent. Telemetry varied dramatically. Operators had to spend too much time and effort coordinating and testing parity of new features across the network. Now, a single silicon architecture can serve different market segments, different functions, and various form factors for a unified experience that dramatically reduces costs of operations and time-to-value for new services.” Another component of Silicon One is that it will be available for white-box vendors or hyperscalers developing their own networking systems – one of the few times Cisco has been a merchant silicon vendor in its own right. Its chip technology is typically used just in its own equipment.


Must Buy Smart Travel Gadgets for 2020

travel gadget drone
Monoprice is known for quality generic brand tech products like USB cables, wall mounts, adapters, power banks at a cheaper price point. If you are looking to add a power bank to your next travel packing list, then look out for the Monoprice holiday deals. One of the specials they have is their own brand Select Series power banks. They are currently offering 15% off for 10,000mAh, 20,000mAh, and 27,200mAh battery capacity power banks. When you are traveling with it, you are guaranteed to never run out of power since you can fully charge your iPhone or Android phones three times before the power runs out. ... A portable hard drive can be a traveler’s best friend, especially for gamers and photographers. Western Digital has everything you need for your next trip. Although cloud storage is great and useful, don’t forget that Internet connectivity is not always available everywhere in the world. You don’t want to stop taking pictures because your digital camera is running out of space. Also, it is always good to back up your pictures and other digital assets in both cloud storage and external hard drive.


Security 101: What Is a Man-in-the-Middle Attack?

(Image: peterschreiber.media/Adobe Stock)
MitM attacks are attempts to "intercept" electronic communications – to snoop on transmissions in an attack on confidentiality or to alter them in an attack on integrity. "At its core, digital communication isn't all that much different from passing notes in a classroom – only there are a lot of notes," explains Brian Vecci, field CTO at Varonis. "Users communicate with servers and other users by passing these notes. A man-in-the-middle attack involves an adversary sitting between the sender and receiver and using the notes and communication to perform a cyberattack." ... "People think they are accessing a legitimate hotspot," he says, "but, in fact, they are connecting to a device that allows the hacker to log all their keystrokes and steal logins, passwords, and credit card numbers." Another popular MitM tactic is a fraudulent browser plugin installed by a user, thinking it will offer shopping discounts and coupons, Guruswamy says. "The plugin then proceeds to watch over user's browsing traffic, stealing sensitive information like passwords [and] bank accounts, and surreptitiously sends them out-of-band," he says.


For IT pros, adding blockchain skills can pad your paycheck – by a lot

Certification / Graduate silhouette surrounded by abstract technology and blockchain imagery.
Understanding how blockchain integrates with artificial intelligence, machine learning, robotics, and IoT is seen largely as a plus for technologists at the moment. But it will be a requirement in the future as these other technologies mature and adoption rates increase. Salaries for blockchain developer or "engineer" positions are high, with median salaries in the U.S. hovering around $130,000 a year; that compares to general software developers, whose annual median pay is $105,000, according to Matt Sigelman, CEO of job data analytics firm Burning Glass Technologies. People with experience with specific blockchain iterations such as Solidity and Hyperledger Composer are in even higher demand – and that demand is increasing steadily, said Eric Piscini, a principal in the technology and banking practices at Deloitte Consulting LLP. Universities are some of the best places to learn blockchain skills, though there are online courses available from vendors as well. According to a new Gartner research note, 75% of IoT technology adopters in the U.S. have already adopted blockchain or are planning to adopt it by the end of 2020.


VISA Warns of Ongoing Cyber Attacks on Gas Pump PoS Systems 

VISA Warns of Ongoing Cyber Attacks on Gas Pump PoS Systems
PFD says that in the first incident it identified, unknown attackers were able to compromise their target using a phishing email that allowed them to infect one of the systems on the network with a Remote Access Trojan (RAT). This provided them with direct network access, making it possible to obtain credentials with enough permissions to move laterally throughout the network and compromise the company's POS system as "there was also a lack of network segmentation between the Cardholder Data Environment (CDE) and corporate network." The last stage of the attack saw the actors deploying a RAM scraper that helped them collect and exfiltrate customer payment card data. During the second and third incidents, PFD states that the threat actors used malicious tools and TTPs attributable to the financially-motivated FIN8 cybercrime group.


Implement CI/CD for Multibranch Pipeline in Jenkins

Jenkins is a continuous integration server that can fetch the latest code from the version control system (VCS), build it, test it, and notify developers. Jenkins can do many things apart from just being a Continuous Integration (CI) server. Originally known as Hudson, Jenkins is an open-source project written by Kohsuke Kawaguchi. As Jenkins is a Java-based project, before installing and running Jenkins on your machine, first, you need to install Java 8. The Multibranch Pipeline allows you to automatically create a pipeline for each branch on your Source Code Management (SCM) repository with the help of Jenkinsfile. Jenkins pipelines can be defined using a text file called Jenkinsfile. You can implement pipeline as code using Jenkinsfile, and this can be defined by using a domain-specific language (DSL). With Jenkinsfile, you can write the steps needed for running a Jenkins pipeline. The Multibranch Pipeline project type enables you to implement different Jenkinsfile for different branches of the same project.


What soft skills are most needed in IT? Toronto Women in IT winners share

What soft skills are most needed in IT? Toronto Women in IT winners share image
Technology is getting to be the easy part, with so many off-the-shelf systems that can be sold to any business leader. The talent that the IT leader brings to the table is ensuring they use discipline to not jump to a solution until the problem is fully understood, articulated, and agreed upon. It is only when everyone collaborates and then agrees on exactly what problem they are trying to solve, that a technical solution can truly be sought. ... Humility and adaptability are also important soft skills for anyone working in IT. You must be willing to admit mistakes and learn from what went wrong in order to drive the best product forward. Being too focused on perfection prevents you from doing that. You also need to be adaptable to be able to respond to changes quickly and implement feedback at all stages in the development process. You can cultivate new soft skills over the course of your career if you commit to being a life-long learner and exploring new ways of getting things done. Move beyond what is known and familiar to you in order to stretch your thinking and add to your repertoire of soft skills.


Supreme Court to Have Final Say in Oracle v. Google Java API Battle

Google holds fast that APIs are not copyrightable and the reuse of software interfaces is necessary to make systems interoperable. The issue is whether copyright law prohibits reimplementing—i.e., reusing—the software interfaces that are necessary to connect dozens of platforms to millions of applications on billions of devices. Without interfaces, your contact list cannot access your email program, which cannot send a message using the operating system, which cannot access your phone in the first place. Each is an island. Countless other examples abound. The information age depends on the reuse of interfaces. In 2018, an appeals court ruled in favor of Oracle and overturned previous rulings that favored Google. Dissatisfied with the lower court’s decision, Google petitioned the Supreme Court to hear its case. Previously, the Supreme Court had refused to hear Google’s petition but finally granted it on November 15th 2019. Given that Google filed the petition, the case is now dubbed "Google v. Oracle" instead of "Oracle v. Google".



Quote for the day:


"Great leaders go forward without stopping, remain firm without tiring and remain enthusiastic while growing." -- Reed Markham


Daily Tech Digest - December 12, 2019

Blockchain/IoT integration accelerates, hits a 'sweet spot'

Internet of Things (IoT) / security alert / wireless network management
Blockchain acts as an automated communication layer between IoT sensors as well as a repository for the data they produce and upload. For example, IoT devices in shipping containers can track not only location but monitor temperature, vibration and whether a package has been tampered with. Earlier this year, FedEx touted a proof of concept involving "sensor-based logistics," using two types of IoT sensors about the size of a stick of gum. One acts as a geo-sensor, the other automatically transmits data to a blockchain ledger. Gartner is not alone in seeing a lot of activity related to IoT and blockchain. Last month, UK-based Juniper Research said in a report that the use of blockchain and IoT tracking technology will "revolutionize" the food industry, reducing food fraud by $131 billion in five years. Currently, food-tracking systems rely on paper-based transactions to manually track goods throughout a supply chain, an inefficient system that allows records to be lost or unreconciled, according to Juniper analyst Morgane Kimmich. Additionally, paper-based records cannot be shared by all supply chain users, hindering visibility into the supply chain.



The rise of a digital underclass may be tech's next big challenge


"Any organization processing data is required to let people access this data and rectify it if necessary," she said. "But most people don't exercise those rights "We can't have safeguards only for those who have the time, expertise and money to understand what they are entitled to by law." For her, the solution lies in accountability – "because accountability means that organizations have to consider the risk that data processing poses for people," she said. A successful step forward, she said, was the implementation of GDPR. With accountability featuring among its key principles, GDPR warns organizations that they are responsible for putting in place appropriate technical measures to meet the requirements of data protection. For example, corporations may have to implement privacy-by-design, which requires tech companies to develop software that makes privacy the default mode of operation. While accountability is at the heart of GDPR, however, there is still reason to be skeptical that the new European rules will be enough to change the whole game.


GraphQL: The Future of APIs

Lin graph drawn on paper with ruler
A pre-defined schema is offered to clients by the GraphQL server. This is basically the model data that can be retrieved from the server where the schema acts as the connector between the server and the client whilst defining the process of accessing the information. The basic elements of a GraphQL schema are written down in SDL or Schema Definition Language. It explains all sorts of objects that can be requested on that specific server including the fields that they possess. The queries that are permitted to be requested such as what types of data can be fetched and the relationships between these types are defined by the schema. In fact, the GraphQL schema can be developed and an interface can be created around it with any programming language. To make sure that the server is able to respond to the query, the client can validate their query against the schema. You will be able to predict the outcomes depending on the shape of the GraphQL query that closely resembles the result. This additionally scrubs out any unwelcome surprises, for example, incorrect structure or unavailable data.


Passive optical LAN: Its day is dawning

4 catastrophe vulnerable disaster fiber optic cables
The increased speeds pose quite a predicament for companies. If the organization has Cat5 cabling, the speed is capped at 1Gbps. If Cat6 is deployed, speeds of 10Gbps can be reached but only 55 meter’s distance. If the company wants to reach the full 100M length of copper, Cat6A or higher must be used. Optical cable has no distance limitations because POL is completely passive and requires no electronics to boost the signal. Optical cabling can carry petabytes of bandwidth over long distances. Also, with optical, there’s no concern over what type of cable is being used and having the quality degrade over time. ... The project features an optical network built on Huawei’s Campus OptiX solution that simplifies the network as the architecture moves from a three-tier hierarchical design to a two-tier one. That design uses less equipment and reduces power and cooling requirements. Also, the flat, 10Gbps network obviates the need for parallel overlay networks, making it easier to manage and giving it a degree of future-proofing as the network can easily be upgraded. The all-optical network resulted in a 60% improvement in operational efficiency and a deployment time that was cut in half compared a similar network using Ethernet.


Cracking the Code to Mobile Productivity


Human-centered research underpins great design, and our teams dove deep to understand how people think, feel, and act when getting things done on the go. Research in mobile-first or mobile-only markets like India and China allowed us to study everyone from students to factory floor workers. We also leveraged pioneering work by Jaime Teevan and Microsoft researchers around “microproductivity.” Microproductivity exemplifies meeting users where they’re at: the modern world has increasingly fragmented work. Instead of solely pushing people to focus more, however, we explored whether those fragmented slices of time could be more productive with “microtasks.” A microtask is a bite-sized piece of a bigger task, like writing one paragraph instead of working on an entire Word document. Research showed microtasks increase feelings of productivity. This aligned with our observations of mobile behavior where, despite spending up to four hours a day on the phone, sessions average just 20 to 30 seconds.


5 Mobile App Design Trends You Should Know for 2020

Industry NewsT Light_870x220
Whenever a popular device or app moves to the dark side (i.e. Dark Mode), it’s always big news. Apple just recently enabled the feature on its iPhones in October of 2019. Instagram added it around the same time, too. People went nuts for it. ... One could argue that mobile apps are much easier to use than websites that are overloaded with content. However, the assumption that mobile users know what to do when they first enter an app or even that they understand the real value of it can be problematic. Because if you feel like the app is a no-brainer, then you’re going to design it that way, which may prevent some users from ever really knowing how much they can do with it. Since you don’t have the luxury of sharing as much information with users as your PWA counterparts do, I think swipeable intros are the solution. We’re starting to see a number of apps utilize these before ever inviting users to sign up or log in and I think more apps will adopt this friendlier approach to onboarding users in the years to come.


CorePlus: A Microsoft Bot Framework v4 Template

Not Helpful Answer
Microsoft has developed a number of samples to help you get started with the Bot Builder SDK v4, as well as a set of templates powered by the scaffolding tool Yeoman. This article introduces CorePlus, a Microsoft Bot Framework v4 template that I have created, based on a previous version of the Core Bot template (Node.js) supported by the generator-botbuilder Yeoman generator. It's an extended and advanced version, intended as a quick-start for setting up a Transactional, Question and Answer, and Conversational chatbot, all in one, using core AI capabilities. The template proposes a modified project structure and architecture, and provides solutions for the technical and design challenges that arise. Although some basic knowledge on Microsoft Bot Framework: Node.js SDK, LUIS, QnA Maker, Bot Framework Emulator, etc., is recommended, it's not required. The code is fully commented and the article provides lots of external links to samples, documents and other articles that can help you expand your vision and knowledge on Microsoft's framework as well as on chatbots design and development in general. Visual Studio Code is suggested as the code editor of choice. You may use any other one of your preferences, though, such as WebStorm.


Microsoft details the most clever phishing techniques it saw in 2019

fig1-phishing-poisoned-search-results.png
The first is a multi-layered malware operation through which a criminal gang poisoned Google search results. The scheme went as follows: Crooks funneled web traffic hijacked from legitimate sites to websites they controlled; The domains became the top Google search result for very specific terms; Phishers sent emails to victims linking the Google search result for that specific term; If the victim clicked the Google link, and then the top result, they'd land on an attacker-controlled website; and This website would then redirect the user to a phishing page. One might think that altering Google search results takes a gigantic amount of effort, but this was actually pretty easy, as attackers didn't target high-traffic keywords, but instead focused on gibberish like "hOJoXatrCPy." ... A third phishing trick that Microsoft wanted to highlight as a clever phishing attack this year was one that made use of a man-in-the-middle (MitM) server. Microsoft explains:"One particular phishing campaign in 2019 took impersonation to the next level.


The Future of APIs and API Monetization

One dollar bills spread out
First, the future API stack is secure. There is a lot of information and prioritization around cybersecurity and endpoint security, but sometimes API endpoints are overlooked. While OAuth is not new, the use of OAuth is essential to control fine-grained access to APIs. Second, APIs must enable personalization and experimentation. Companies need the ability to control and test API capabilities so that we can personalize search results as easily as we personalize user experience. We continuously experiment with search rankings and results to better serve our sellers and buyers. eBay is a search-driven marketplace. APIs must be designed so they can support personalization and experimentation. Third, the future API stack must be device-agnostic. APIs should understand if they are talking to a desktop or mobile device, or communicating across limited bandwidth, and adjust the fidelity of their responses accordingly. If your client pulls data from a massive data center over a LAN connection, it’s probably fine for APIs to allow access to several GBs of data.


How to develop IT leaders into future CIOs

A businessman ascends a staircase surrounded by symbols of business and business data.
Every IT leader reaches an inflection point where they have to become very good at team leadership if they want to take on more responsibility. The ability to lead and not do is more important to the CIO role than technical depth. If you don’t start to develop those skills early in your career, you will fail as a CIO. This is not about delegation, which is just handing a task off to someone else. Leadership is about empowerment and trust. ... There are a number of ways, including getting your MBA or finding a mentor who is a leader in a business function that is not IT. Early in my career, I held finance, HR and customer service roles, which had a technology flavor to them, but were not in IT. Future CIOs should get that cross functional experience early in their careers because it is harder to move in and out of IT as you advance. Understand also that sometimes you have to take a step backward to move forward. You might have to drop down a level for roles in finance or supply chain, but that move will allow you to advance later in your career.



Quote for the day:


"Do all the good you can. By all the means you can. In all the ways you can... At all the times you can." -- John Wesley


Daily Tech Digest - December 11, 2019

SR-What you need to know-image.png
Segment Routing uses a routing technology or technique known as source packet routing. In source packet routing, the source or ingress router specifies the path a packet will take through the network, rather than the packet being routed hop by hop through the network based upon its destination address. However, source packet routing is not a new concept. In fact, source packet routing has existed for over 20 years. As an example, MPLS is one of the most widely adopted forms of source packet routing, which uses labels to direct packets through a network. In an MPLS network, when a packet arrives at an ingress node an MPLS label is prepended to the packet which determines the packet’s path through the network. While SR and MPLS are similar, in that they are both source-based routing protocols, there are a few differences between them. One of these key differences lies in a primary objective of SR, which is documented in RFC7855, “The SPRING [SR] architecture MUST allow putting the policy state in the packet header and not in the intermediate nodes along the path.


Never Mind Consumers, This Was a Year of Steady Infrastructural Progress

Much of the traction that does not come from exchanges or trading has been generated decidedly in infrastructure layers in 2019. Node infrastructure provider Blockdaemon, having recognized the market’s propensity to proliferate new decentralized networks, is generating revenue across an impressive 22 such networks today and continues to grow month over month. The Graph is serving over 400 public smart contract subgraphs, with request volume clocking millions of daily data queries. Meanwhile, 3Box’s self-sovereign identity and data solution is rapidly integrating across the Ethereum ecosystem, within wallets like MetaMask and many of the new user onboarding solutions, like Portis and Authereum, and even governance experiment MolochDAO.  Blockchain’s road to mainstream adoption depends on institutional backing of businesses that support blockchain infrastructure and enable traditional investors both to capitalize and participate in digital asset networks. As such, the compliance levels of exchanges have been increasing to support institutional clients.


5G and Me: And the Golden Hour


The connected ambulance 5G network slicing concepts were demonstrated at the Mobile World Congress (MWC) in Barcelona, Spain in Feb 2019 by Dell EMC Cork Centre of Excellence (CoE). Network slicing is a type of virtual networking architecture similar to software-defined networking (SDN) and network functions virtualization (NFV) whose goal is software-based network automation. This technology allows the creation of multiple virtual networks on a shared physical infrastructure. ... The goal for the future of connected care in emergencies would be to identify the conditions for Stroke, CHF & MI; measure and score at site, predictively collect Electronic Medical Record (EMR) metadata in conjunction with specific image studies via DICOM (Digital Imaging and Communications in Medicine) and combine this with the metadata from disease-specific epidemiological studies for that geographic region — all within the “golden hour”. This combinatorial analysis at the “point of care” is the future and can prevent disability and death at scale — especially since not all the ambulance visits are emergencies.


Google proposes hybrid approach to AI transfer learning for medical imaging


In transfer learning, a machine learning algorithm is trained in two stages. First, there’s retraining, where the algorithm is generally trained on a benchmark data set representing a diversity of categories. Next comes fine-tuning, where it is further trained on the specific target task of interest. The pretraining step helps the model to learn general features that can be reused on the target task, boosting its accuracy. According to the team, transfer learning isn’t quite the end-all, be-all of AI training techniques. In a performance evaluation that compared a range of model architectures trained to diagnose diabetic retinopathy and five different diseases from chest x-rays, a portion of which were pretrained on an open source image data set, they report that transfer learning didn’t “significantly” affect performance on medical imaging tasks. Moreover, a family of simple, lightweight models performed at a level comparable to the standard architectures. In a second test, the team studied the degree to which transfer learning affected the kinds of features and representations learned by the AI models. They analyzed and compared the hidden representations in the different models trained to solve medical imaging tasks, computing similarity scores for some of the representations between models trained from scratch and those pretrained on ImageNet.


Robotic exoskeletons: Coming to a factory, warehouse or army near you, soon 

ford-exoskeleton1.jpg
Ford is thought to be one of the bigger users of exoskeletons to date, but other car makers are deploying exoskeletons, although several have opted for build-your-own rather than off the shelf systems. Hyundai debuted its own exoskeleton vest, the VEX, earlier this year. The back-worn exoskeleton "is targeted at production-line workers whose job is primarily overhead, such as those bolting the underside of vehicles, fitting brake tubes, and attaching exhausts", Hyundai said, and is expected to be rolled out at Hyundai plants. GM meanwhile has teamed up with NASA to create a robotic glove that can help increase the amount of force a wearer can exert when gripping an object or lifting up a piece of equipment for long periods, cutting the likelihood of strain or injury. Closer to home, the construction industry is also shaping up to be another significant user of exoskeletons. Builder Wilmott Dixon, for example, started piloting the ExoVest at a Cardiff site last year. One factor driving the rollout of exoskeletons in both the construction and auto industries is the possibility of cutting worker injuries as well as enabling skilled staff to work for longer.


What does it mean to think like a data scientist?

Art is a very important part of that, because what we find in a lot of our data science engagements is there's a lot of exploration of what might be possible, the realm of what's possible. So, we tried to empower the power of ‘might,’ right? That might be a good idea, that might be something, because if you don't have enough might ideas, you never have anything, any breakthrough ideas. And so, this art of thinking like a data scientist, this kind of says, 'Yeah, there's a data science process.' But think about it as guardrails, not railroad tracks. And we're going to bounce in between these things. And oh, by the way, it's really important that your business stakeholders, your subject matter experts, also understand how to think like a data scientist in this kind of non-linear creative kind of fashion, so you come up with better ideas. Because we're all in search of variables and metrics that might be better predictors of performance, right? And the data science team will have some ideas from their past experience. 



Teams are struggling to implement these new tools and 71 percent said that they are adding security technologies faster than they are adding the capacity to proactively use them. This added complexity is also compromising their threat response with 69 percent of security decision makers surveyed saying that their security team currently spends more time managing security tools than effectively defending against threats. To make matters worse, a majority of enterprises are less secure today as a result of security tool sprawl and over half (53%) say their security team has reached a tipping point where the excessive number of security tools in place adversely impacts their organization's security posture. ReliaQuest's CEO, Brian Murphy provided further insight on the report's findings, saying: "Cyber threats continue to rise and require companies to mitigate risk. While it's tempting to think another piece of technology will solve the problem, it's far from true -- in fact, this survey proves more tools can worsen enterprise security by adding complexity without improving outcomes.


There’s No Opting Out of the California Consumer Privacy Act

For starters, GDPR applies to all European data but is a minimum requirement. Individual countries in the EU have their own laws that are often more restrictive. Alternatively, CCPA is applicable to California data only and excludes any data that is already covered by a federal law, such as HIPAA or GLBA. While GDPR protects personal information (PI) that could potentially identify a specific individual -- including name, address, telephone number and Social Security number (SSN) -- CCPA goes beyond to include product purchase history, social media activity, IP addresses, and household information. Under CCPA, companies are required to include a single, clear and conspicuous "Do Not Sell My Personal Information" link on homepages. Alternatively, GDPR offers various opt-out rights, each of which requires individual action.  Under GDPR, administrative fines can reach 20 million euros or 4% of annual global revenue, whichever is greatest. For CCPA, the California Attorney General can fine companies $2,500 per violation or up to $7,500 for each intentional violation.


Google Chrome can now warn you in real time if you're getting phished


Between July and September, Google sent more than 12,000 warnings about state-sponsored phishing attacks targeting its users in the US. According to Verizon's annual cybersecurity report, phishing is the leading cause of data breaches, and Google said in August that it blocked about 100 million phishing emails every day. But phishing links don't just come in emails: They can also appear in malicious advertisements, or through direct messages on chat apps. For those of you using a Chrome browser, Google is launching an extra level of protection against phishing through real-time checks on site visits. You can turn it on by enabling "Make searches and browsing better" in your Chrome settings. This protection was already available for Chrome's Safe Browsing mode, which checked the URL of every website visited and made sure it was not on Google's block list. The block list is saved on devices and only synced every 30 minutes, allowing savvy hackers to bypass the filter by creating a new phishing URL before the list updates.


Big Changes Are Coming to Security Analytics & Operations

Nearly two-thirds (63%) of survey respondents claim that security analytics and operations are more difficult today than they were two years ago. This increasing difficulty is being driven by external changes and internal challenges. From an external perspective, 41% of security pros say that security analytics and operations are more difficult now due to rapid evolution in the threat landscape, and 30% claim that things are more difficult because of the growing attack surface. Security teams have no choice but to keep up with these dynamic external trends. On the internal side, 35% of respondents report that security analytics and operations are more difficult today because they collect more security data than they did two years ago, 34% say that the volume of security alerts has increased over the past two years, and 29% complain that it is difficult to keep up with the volume and complexity of security operations tasks. Security analytics/operations progress depends upon addressing all these external and internal issues.



Quote for the day:


"Growth is painful. Change is painful. But nothing is as painful as staying stuck somewhere you don't belong." -- Mandy Hale


Daily Tech Digest - December 10, 2019

Internet of the Senses is on the horizon, thanks to AR and VR


While smell cannot be conveyed digitally, that will change, with smell becoming an online experience by 2030, the report found. More than half (56%) of respondents said technology would evolve to the point that they would be able to smell scents in films. This same application will be applied to sales as retailers market products commercially with smell, the report found, meaning perfume commercials could emit a scent. Along the same lines as smell, humans will also be able to experience taste through devices, according to the report. Nearly 45% of respondents believe that in the next 10 years, a device could exist that digitally enhances the food someone eats. This advancement could have significant impacts on health and diet, allowing people to eat healthier foods that taste more savory than they are. This application presents another opportunity for marketing retail, as consumers could taste food products. People viewing cooking programs could even taste the food that is on screen, the report found. More than half (63%) of respondents said smartphone users would be able to feel the shape and texture of digital icons.



4 Authentication Use Cases: Which Protocol To Use?

silver platter passwords exposed authentication hacked vulnerable security breach
Where strong security is a requirement, SAML is generally a good choice. All aspects of the exchange between the RP and IdP can be digitally signed and verified by both parties. This provides high assurance that each party is communicating with the correct counterpart and not an imposter. In addition, the assertion from the IdP may be encrypted, so that HTTPS is not the only protection against attackers accessing users’ data. To add further security, signing and encryption keys may be rotated regularly. To take OIDC to the same level of security requires extra cryptographic keys, as in Open Banking extensions, and this can be relatively onerous to set up and maintain. However, OIDC benefits from the use of JSON and the simpler use by mobile apps, compared to SAML. ... Here, the preference will be for OIDC, as it is likely that a variety of devices, some not browser-based, might be involved, which normally rules out SAML. The built-in consent associated with OIDC enhances the privacy aspects of the data sharing. In addition, the use of signing and encryption may be used to strengthen the security aspects to a degree that adequately meets the requirements of handling such data.



Predictions for AI and ML in 2020

Predictions for AI and ML in 2020 image
The digital skills gap present within workforces has meant that employees are unsure about how to unleash AI’s full potential. But according to SnapLogic CTO, Craig Stewart, this problem could take a step towards being solved next year. “Transparency remains a hot topic and will continue into 2020 as companies aim to ensure transparency, visibility, and trust of AI and AI-assisted decisions,” said Stewart. “We’ll see further development and expansion of the ‘explainable AI movement,’ and efforts like it. ... Even though there are aforementioned worries regarding AI and ML possibly replacing human workers, some experts in digital innovation believe that the gradual inclusion of the technology will end up being a much more collaborative process. “Despite fears that it will replace human employees, in 2020 AI and machine learning will increasingly be used to aid and augment them,” said Felix Gerdes, Insight UK‘s director of digital innovation services. “For instance, customer service workers need to be certain they are giving customers the right advice.


The Future of Spring Cloud's Hystrix Project


Spring Cloud Hystrix Project was built as a wrapper on top of the Netflix Hystrix library. Since then, It has been adopted by many enterprises and developers to implement the Circuit Breaker pattern. In November 2018 when Netflix announced that they are putting this project into maintenance mode, it prompted Spring Cloud to announce the same. Since then, no further enhancements are happening in this Netflix library. In SpringOne 2019, Spring announced that Hystrix Dashboard will be removed from Spring Cloud 3.1 version which makes it officially dead. As the Circuit Breaker pattern has been advertised so heavily, many developers have either used it or want to use it, and now need a replacement. Resilience4j has been introduced to fulfill this gap and provide a migration path for Hystrix users. Resilience4j has been inspired by Netflix Hystrix but is designed for Java 8 and functional programming. It is lightweight compared to Hystrix as it has the Vavr library as its only dependency. Netflix Hystrix, by contrast, has a dependency on Archaius which has several other external library dependencies such as Guava and Apache Commons.


Dubai’s Kentech kicks off digital transformation drive


“Kentech has suffered with poor IT adoption partnerships in the past, so we needed something that was world-class. We wanted something that our business would love and use.” Kentech launched its tendering process early this year and by July it had selected Oracle as its cloud partner. “During the tendering process, we found that our business was closely aligned to construction,” said O’Gara. “Some of our requirements were quite complex, especially when dealing with reimbursable and fixed-price work – they can chop and change on a daily basis. We found that Oracle could meet those complex requirements. “For us, it was the ERP and budgeting models that were the differentiator. We’ve now started implementation and we’re going to go live at the end of this year with the first phase. We’re a project-based business, so we need to be able to scale up and down very quickly. The cloud model suits us perfectly as a business because we can be flexible, rather than going all out and saying ‘I need 10 more servers’.”


Hybrid multi-cloud a must for banks

Banks operating under a hybrid multi-cloud model predictably and optimally manage finances as cost models shift from fixed to variable. Storing data on site with traditional facilities is expensive and holds banks in long-term contracts for a set amount of data storage. Banks over-resource infrastructure and storage leading to payment of unnecessary resources. Hybrid cloud models allow banks to scale as needed, purchasing only what is immediately utilised using a subscription-based model offered by most CSPs. Procurement and implementation in the traditional way is slow and thus capacity management and a degree of guessing are used, resulting in over-capitalised systems offering little ROI. As the cloud allows for scaling on a pay-as-you-go model, the spend is greatly optimised. For example, UBS’s risk management platform is powered by Microsoft Azure, saving the financial service company 40 percent on infrastructure costs, increasing calculation times by 100 percent, and gaining near infinite scale.


The 10 Best Examples Of How Companies Use Artificial Intelligence In Practice

The 10 Best Examples Of How Companies Use Artificial Intelligence In Practice
Today, Waymo wants to bring self-driving technology to the world to not only to move people around, but to reduce the number of crashes. Its autonomous vehicles are currently shuttling riders around California in self-driving taxis. Right now, the company can’t charge a fare and a human driver still sits behind the wheel during the pilot program. Google signaled its commitment to deep learning when it acquired DeepMind. Not only did the system learn how to play 49 different Atari games, the AlphaGo program was the first to beat a professional player at the game of Go. Another AI innovation from Google is Google Duplex. Using natural language processing, an AI voice interface can make phone calls and schedule appointments on your behalf. ... Another innovative way Amazon uses artificial intelligence is to ship things to you before you even think about buying it. They collect a lot of data about each person’s buying habits and have such confidence in how the data they collect helps them recommend items to its customers and now predict what they need even before they need it by using predictive analytics.


Verizon kills email accounts of archivists trying to save Yahoo Groups history

According to the Archive Team: "As of 2019-10-16 the directory lists 5,619,351 groups. 2,752,112 of them have been discovered. 1,483,853 (54%) have public message archives with an estimated number of 2.1 billion messages (1,389 messages per group on average so far). 1.8 billion messages (86%) have been archived as of 2018-10-28." Verizon has issued a statement to the group supporting the Archive Team, telling concerned archivists that "the resources needed to maintain historical content from Yahoo Groups pages is cost-prohibitive, as they're largely unused". The telecoms giant also said the people booted from the service had violated its terms of service and suggested the number of users affected was small. "Regarding the 128 people who joined Yahoo Groups with the goal to archive them – are those people from Archiveteam.org? If so, their actions violated our Terms of Service. Because of this violation, we are unable reauthorize them," Verizon said. 



Open source refers to an online project that is publicly accessible for anyone to modify and share, as long as they provide attribution to the original developer, reported TechRepublic contributor Jack Wallen in What is open source?. Since its release over 20 years ago, open source has changed the internet. Without open source, the online experience would be "a far different place; much more limited, expensive, less robust, less feature-driven and less scalable. Big name companies would be much less powerful and successful as well in the absence of open source software," wrote Scott Matteson in How to decide if open source or proprietary software solutions are best for your business. ... Major tech companies have set their sights on open source development, with Microsoft's acquisition of GitHub and IBM's acquisition of Red Hat. However, developers are concerned about the impact these tech giants could have on the open source community, the report found.  Nearly 41% of respondents said they were concerned about the level of involvement from major tech players in open source. The main concerns they cited involved possible self-serving intentions from big companies, the use of restrictive licenses that give large organizations unfair competitive advantage, and overall trust of large corporations, the report found.


Is cloud migration iterative or waterfall?

Is cloud migration iterative or waterfall?
Cloud migration projects have two dimensions. First, they are short-term sprints where a project team migrates a handful of application workloads and data stores to a single or multicloud. They act independently, with little architectural oversite or governance, and last between two to six months. Second, is the longer-term architecture including security, governance, management, and monitoring. This may be directed by a cloud business office, the office of the CTO, or a master cloud architect. This set of processes goes on continuously. Here is the problem. The former seems to overshadow the latter, meaning that we’re moving to the cloud using ad hoc and decoupled sprints, all with little regard for common security and governance layers and any sort of management and monitoring. The result is something we’ve talked about here before: complexity. Although we built something that seems to work, applications migrated from one platform to another are deployed with different technology stacks.



Quote for the day:


"Without growth, organizations struggle to add talented people. Without talented people, organizations struggle to grow." -- Ray Attiyah