October 21, 2015

I'm a cyborg now - and so are you

Mixing sensors on our bodies, in our homes, and in our devices is bringing about an intriguing, science-fiction-like world. This isn't tomorrow, this is today, all over the developed -- and the developing -- world. As we bridge the Internet of Things and our personal area networks, we're immersed in a sea of low power radio, linking us to our machines and linking our machines to us. It's not hard to see a piece of software monitoring my wearables, letting me know that I should move. That's already a function of the Apple Watch, and anecdotes from Cupertino talk of meetings being interrupted by people getting up and walking around. 


The future of Cloud computing

In order to consider the future of cloud computing, it’s important to realise that there are a number of different adoption scenarios out there. ... The older companies might also have a history of insufficient IT investment and will continue to struggle to adapt to the new technology landscape because of their legacy IT. New entrants to their markets are threatening to disrupt the establishment because of the different approach to IT and cloud use, not just because of the difference in market offerings. The following observations of the future of cloud apply to both scenarios, albeit to different extents.



IoT hype, hope give rise to new C-level position, chief IoT officer

Making room for a chief IoT officer underscores the emphasis -- and the urgency -- senior leaders are placing on the technology. "In the past, you could get to market late," Heppelmann said. Today, competition is brutal, and being late to market is not only a missed opportunity, it's a failure to understand that "data exhaust coming off of products gives you new leverage over your customer base." Worse? Businesses (and not just of the vendor variety) that aren't jumping on first-to-market IoT opportunities put themselves at risk for becoming copycats, what Heppelmann called the "me too" companies. A conservative watch-and-learn approach could create setbacks that "me too" companies can't recover from -- not the least of which is keeping pace with rapidly evolving technology.


HTTP/2 is Ready, But Are You Ready For It?

Encryption is a de facto mandate in HTTP/2 implementations at the moment because all known browser implementations from the likes of Firefox and Chrome only support HTTP/2 with TLS encryption enabled. If you are a web content provider who relies on a content delivery network (CDN) to reduce latency, you will need to share your encryption keys with your CDN providers. While some providers are comfortable doing so, many more are not. Given these various requirements, many organizations will have to weigh the benefits of HTTP/2 adoption against the costs of implementation. Do the performance improvements make it worth the steps required to support it? This calculation will probably lead many web content providers and enterprises to hold off on HTTP/2 implementation.


What You Need To Know About The CISA Bill In The U.S. Senate

CISA is yet another attempt by the U.S. Senate or House of Representatives to present legislation based on security, privacy or copyright that would regulate Internet activities. The Stop Online Piracy Act (SOPA) in 2012 would have allowed companies (like movie studios or record labels) to take down websites deemed to be infringing on copyrighted material. Opponents of SOPA said the bill provided too much leverage to media companies and the government to take down websites for even the most trivial of offenses and survey user activity. An online protest led by the likes of Reddit and Google ultimately caused the bill to fail in Congress. SOPA had a sister bill called the Protect IP Act of 2011 that also aimed to give the government and companies the ability to increase surveillance in the name of protecting copyright and fighting digital pirates.


Safe Harbor Ruling Leaves Data Center Operators in Ambiguity

“It is unrealistic to think that all transatlantic data is going to have to stop as a result of this decision,” Snead added. “The European Commission is likely to figure out a way to accommodate it, and the US is as well.” Safe Harbor, created in 2000, is a uniform set of rules for handling personal data of citizens of member states of the European Union, including rules around moving that data to facilities in the US and storing it there. If a service provider complied with the rules, they could be confident that they were not breaking any European privacy laws. Former NSA contractor Edward Snowden’s public disclosure of the US spy agency’s covert electronic surveillance practices, however, eroded trust in Safe Harbor.


Business alignment and data analytics top CIO concerns, says SIM study

“Although alignment has received considerable attention from both academics and practitioners, it continues to remain a challenge for many organizations. It is possible that alignment remains a persistent issue due to the changing nature of business and the difficulty that the IT organization has in responding to these changes. In other words, it is one thing to become aligned, but quite another to stay aligned,” the study authors noted. Further, “Alignment of IT and/with the Business,” which has ranked in the top three for over a decade, retained the number one position it has held since 2013. Similarly, “Security/Privacy” retained the number two position that it achieved last year.


‘Response and Recovery’ Emphasized for Cyber Attacks

“So basically there are two kinds of companies: those that have been attacked and know it, and those that have been attacked and don’t know it yet.” The headlines report attacks at Target, Home Depot, Verizon and AT&T, but Joseph Bermudez, regional managing partner at Wilson Elser, said that it is not always malicious activity that causes a cyber loss. “Sometimes it is a bad act, but often it is an accident,” said, noting that regardless of the cause, “if there is a breach, your client will get a letter from their customer saying that they caused a problem and that they are owed some money. Now your client has a liability.”


The Five Qualities of Application Delivery Done Right

So if immutable infrastructure has all these benefits, why aren't all companies using it? First off, immutable infrastructure takes organizational buy-in. But even if an organization believes in the merits of immutable infrastructure, creating a system to build, deploy, maintain, and manage immutable infrastructure is not an easy task. Building images or containers is easy. Deploying and maintaining images and the provisioned hosts is challenging. However, once the build-time system is in place, it is significantly easier to manage runtime environments since there are less moving pieces. For individuals managing personal websites or companies managing small infrastructures, the investment into immutable infrastructure is probably not worth it.


Building an online game platform: Startup caters to developers

"The analytics and tools model is one of the most common ways to attract developers to gaming platforms," said Sangeet Paul Choudary, founder and CEO of Platform Thinking Labs and co-chair of the MIT Platform Strategy Group. He noted that the same model is used to attract brands to marketing platforms. In addition, the analytics-and-tools approach doesn't fully address what Choudary refers to as the chicken-and-egg problem of platform business models: the need to get producers and consumers on board to make a two-sided business work. "The issue is that it isn't really solving the chicken-and-egg problem as much as augmenting value once the problem gets solved, because there isn't really much value in analytics below a critical mass of usage," Choudary noted.



Quote for the day:

"Behind every argument is someone’s ignorance." -- Louis D. Brandeis

October 20, 2015

Digital currency is poised to reinvent how startups are funded

The blockchain allows digital items to be both authentic and scarce. Beyond simply providing the backbone for digital currency like Bitcoin and Litecoin, the blockchain can also be used to publish inalterable public records of, for example, asset ownership. Chroma Fund offers blockchain-based digital share certificates for each company that investors fund. Because the blockchain can be used to verify the authenticity of digital items, digital items can then achieve scarcity similar to that of a physical, material good. While the Chroma Fund share certificate is not a paper, because its authenticity is tied to the blockchain the share becomes a unique, discrete item that can be traded and sold with trust.


Internet of Things standards groups get ready to rumble at CES

Having a house full of locks, lights, appliances and thermostats that can communicate with each other and the cloud is critical to getting value from those purchases. For example, a connected door lock is worth a lot more if it can tell a thermostat that you’ve come home and the heat should go on. Unless all the pieces come from the same company, they need a shared, cross-vendor language for finding and understanding each other. AllSeen is offering its AllJoyn framework to fill that need. OIC is promoting its own standard and a reference implementation called IoTivity. The first full version of the OIC standard was completed last month.  Apple’s HomeKit system, and the Weave platform developed by Nest, now part of Google’s Alphabet universe, may also give those standards a run for their money.


Mercedes-Benz liberates the road to autonomy with connected car app

Users of the Mercedes Me app will no longer have to worry about getting into a freezing car on a winter morning or a hotbox on a summer afternoon, and accidentally locking themselves out of their cars will also be a thing of the past. The app, for iPhone and Apple Watch, will allow consumers to monitor a vehicle’s vitals and temperature from afar, as well as to lock and unlock the door from even further away than a remote-operated key. “When designed and developed right, connected apps can offer consumers the utility and convenience they desire,” said Sep Seyedi, CEO of Plastic Mobile. “In turn, brands are not only supporting the post purchase journey but continuing to drive brand awareness and engagement. It’s a win-win situation for both brands and consumers.”


Deutsche Telekom Said to Weigh New Antitrust Complaint Against Google

The move by Deutsche Telekom would make it an official complainant in the case, allowing the company to provide information and potential evidence on why it believes Google abuses its control over Android. The evidence could include data on which mobile services the carriers’ tens of millions of users regularly access on their cellphones. Such information could help European competition officials decide whether to bring formal charges against Google linked to the region’s Android investigation. Competition authorities have been focusing their attention on Google’s Android operating system, which powers more than 80 percent of the world’s smartphones, according to Gartner, a research firm.


The Estimation Game - Techniques for Informed Guessing

A big problem with being numbers-driven is that you often don’t have the numbers. This is especially true when contemplating designs for systems that don’t yet exist. The more cheaply and quickly you can make reasonable estimates of those numbers, the more designs you can consider, the better your final design will be. Fast and cheap answers allow you to explore a larger space of possibilities, kind of like how you can now research the specs and reviews of different cars before you step onto the lot. This kind of exercise is often called a “Fermi estimation”, after a legendary incident in which Enrico Fermi dropped bits of paper into the shockwave of a nuclear test to estimate its yield.


Predictive Analytics Business Case is Simpler Than You Think

To craft the specifics of the business case, concisely define the business issue that will be addressed. Assess the current environment and offer a gap analysis to show the difference between the current environment and the future environment). Offer a recommended solution, but also offer alternatives. Detail the specific value propositions associated with the change. Create a financial analysis summarizing costs and benefits. Support the analysis with a timeline including roles and responsibilities. Finally, detail the major risk factors and opportunity costs associated with the project. For complex initiatives, break the overall project into a series of shorter projects.


Virtual Reality App Innovates the Experience of Music

More and more, recorded music is being thought of as a free market. After a while of trying to catch up with that, I just didn't want to roll with it anymore. So I kind of stopped putting out CDs, really focused on the live show and what I could do more in person and that experience. That's a very difficult thing to reproduce—there's no screen, headphones, speakers, even through a theater it's so low resolution compared to being in person. The body language, the little tiny tics people make, the audience, the resonance of the room.


Artificial intelligence: Should we be as terrified as Elon Musk and Bill Gates?

AI is already creeping into military use with the rise of armed drone aircraft. No longer piloted by humans, they are carrying out attacks against enemy targets. For now, they are remotely controlled by soldiers. But the question has been raised of how long it will be until the machines are given specific humans or groups of humans--enemies in uniform--to target and given the autonomy to shoot to kill when they acquire their target. Should it ever be ethical for a machine to make a judgment call in taking a human life? ... Certainly governments are going to want to get involved with laws and regulations, but the tech industry itself can pre-empt and shape that by putting together its own standards of conduct and ethical guidelines ahead of nations and regulatory bodies hardening the lines.


QARK: Android App Exploit and SCA Tool

Ever wonder why there isn't a metasploit-style framework for Android apps? We did!  Whether you're a developer trying to protect your insecure app from winding up on user devices, an Android n00b or a pentester trying to pwn all the things, QARK is just what you've been looking for!  This tool combines Static Code Analysis with source-sink mapping, teaching by detailing misconfigurations, citing research detailing the issues and automatic exploitation into one, simple to use application!  Our tool will review any Android app, either from source or APK, highlight version specific issues, detail your app's attack surface, inspect all your app components for misconfigurations and allow you to create on-demand proof-of-concept attack applications.


Is it Still Possible to do Phone Phreaking? Yes, With Android LTE

Google said it is working on a software patch for Android which will be released next month. Apple's mobile operating system, iOS, is not affected, according to CERT.  Android's problem is with its permissions. On 3G networks, there are separate network domains for data packets going over the Internet and phone calls, which go through circuits. But with LTE, voice and data go over Internet. Android's permission that governs phone calls doesn't matter since calls are no longer going through a circuit-switched network, Kim said. That opens up an interesting avenue for attack. For example, if a victim can be tricked into downloading a malicious Android application, it could, for example, initiate a video call over the data channel.



Quote for the day:

"Action is the foundational key to all success." -- Anthony Robbins,

October 18, 2015

Why visibility and control are critical for container security

Having visibility into the code inside containers is a critical element of container security, even aside from the issue of the security of the containers themselves. New vulnerabilities are being constantly discovered that impact older versions of open source components. Hence, knowing the container is free of vulnerabilities at the time of initial build and deployment is necessary but far from sufficient. Securing the contents of containers is comparable to any other software stack security question. ... The security risk posed by a container depends on the sensitivity of the data accessed via the container as well the location of where the container is deployed, for example, behind a firewall or Internet-facing.


Wi-Fi Trick Gives Devices Super-Accurate Indoor Location Fixes

We can use off-the-shelf, already deployed Wi-Fi infrastructure but get accuracy comparable to state-of-the-art systems that require specialized equipment or modifications,” says Katti. In tests, a Wi-Fi device could locate itself with a median accuracy of 40 centimeters. SpotFi is a refinement of another existing Wi-Fi location method in which a device uses the signal strength from different Wi-Fi access points as an indication of how far away they are. It can then use data on their known locations to triangulate its own position. That approach can only locate devices to within a few meters because Wi-Fi signals bounce, obscuring the true distance to the access point.


EU to US: Stop storing our data on your servers (or else)

Based on the new unsafe harbor ruling, you're in violation of European law. That login and account information needs to be moved to a server located in Europe. Can you imagine the hassle this would be if it were enforceable, and we now needed to segment our user databases and all our other information so that we could dump data on a server located in each major country or region? This is the issue facing IT managers. Right now, as the Department of Commerce has shown, there's no determination about what y'all are supposed to do. But because the Safe Harbor provisions are now null and void, the door is open for international lawsuits targeting your organizations, just because you happen to run a database hosted in the land of the free and the home of the brave.


Oliver Cameron: From iOS Developer to Udacity VP

My lowest point in the journey of becoming an iOS Developer was the launch of another app, Friends for iPhone. Friends added a layer on top of your address book, and allowed you to see activity from your friends across all of your social networks in one app: Instagram, Twitter, Facebook, LinkedIn and more. A fun concept! Following on from the launch of Voices, I challenged myself to go bigger and better with Friends. This pressure meant that I felt like I couldn’t launch the app until it was perfect, and as such I invested 6 months of time and a ton of money. It turns out, perfection is nothing if your idea sucks. A few months after launch I had to ultimately call it: Friends was a failure.


Professor Dr Robot QC

Machines are challenging the professions’ two most important claims to being special: their ability to advance the frontiers of knowledge and their exclusive licence to apply their expertise to an unordained laity. ... Computer scientists in Tel Aviv University have invented an algorithm that, using facial-recognition software, is solving a puzzle that has kept Torah scholars busy for decades: piecing together 300,000 ancient Jewish manuscripts that were found, many torn and tattered, in the attic of an old Cairo synagogue. Various bits of software regularly outperform legal experts in predicting the outcome of court decisions from patent disputes to America’s Supreme Court.


Malvertising is a troubling trend

The Angler exploit kit has been around for a couple of years in various forms, and until now it didn’t stand out as a particularly unusual threat. But it turns out that the newest version has some new and improved techniques to avoid detection, such as encryption and the exploitation of zero-day vulnerabilities that haven’t yet been incorporated into the mainstream antivirus products. It also runs only in the memory of the infected computer, instead of installing itself on the hard drive, which is where desktop antivirus products tend to focus their attention. This is the startling part — that the bad guys have found a way to effectively stay invisible.


Is Security Possible With the Cloud?

No surprise here – the number one pushback that I get when speaking on this strategy is security. You’re really going to put all of your data, much of which is sensitive and confidential to clients, in the Cloud? Really? To be fair, security is, and always will be, a valid and primary concern for IT, and, of course, not just with respect to the Cloud. So let’s back up (so to speak) to another premise:absolute security is an abstract, theoretical concept. There is no such thing. If it’s possible to access a resource, then compromise to that resource is also possible. And since the Cloud increases the number of possible avenues to accessing a given resource, there’s a huge question here: is security even possible for Cloud-centric IT?



The Rise of Enterprise Analytics and The Analytics of Things

First, if an organization is truly experimenting with their data to make significant discoveries, to validate the results, to refine and improve the analytics models, to extract meaningful insights from data, and to implement innovative data-driven processes, then a data scientist is usually required. More specifically, a data science team is required, since no single person can have all of the required skills for successful enterprise-wide data science.  Second, there are some analytics functions that are scientifically or mathematically less intensive that can be carried out by analysts throughout an organization. Some of these functions include data exploration, data quality verification, data transformations, correlation analyses, model-testing, data visualization, reporting, and so on.


LeSS Framework: Principles, Practices and Core Concepts

When adopting LeSS, it will affect the structure of your organization. What often happens is that organisational problems that are traditionally solved in a complex way, are solved in an easier way in LeSS. Having small batches of working software Sprint by Sprint enables removal of organizational complexity that was created for coping with the lack of transparency in traditional development. This is best explained with some examples. Traditionally, organizations manage work using projects. A project, from an Agile/lean perspective is a way of managing a large batch of requirements towards a release. When focus on products and continuously delivering value to users, the project way of managing work becomes largely obsolete.


3 Tips on How to Create a Cyber Security Culture at Work

As we all know, computer criminals pose a serious threat to businesses today in that they can steal corporate intellectual property, as was the case with last year’s Sony hack; compromise employees’ personal and medical health information, the latter of which isincreasingly valuable on underground web markets; and overall depreciate an organization’s reputation. These external actors may also exploit bad security decisions on the part of internal employees, the effects of which may be amplified by poor or incomplete bring your own device (BYOD) guidelines or policies designed to protect Internet of Things (IoT) devices. In accordance with NCSAM, it is everyone’s responsibility to help protect his/her organization against a breach or targeted attack.



Quote for the day:

"It is the essence of genius to make use of the simplest ideas." -- Charles Peguy

October 17, 2015

Four interesting implications of Walmart's open-source cloud announcement

OneOps, which has been an important project within @WalmartLabs, the retailer's Silicon Valley incubator, automates the process of switching from one cloud to another. OneOps helps developers and enterprises "avoid the pitfalls of being locked-in to a cloud provider, and thrive in WalmartLabs' DevOps culture - whatever code developers write, they own, from its development to its launch to customers," said King and Kimmet. They add that @WalmartLabs' 3,000 engineers use the solution, and, on average, "commit over 30,000 changes per month to deliver new or improved features to our customers." There are four interesting things about this announcement

Portfolio managers don’t need to be told that all projects and programmes should align to strategy. A strategy without the projects to deliver it is just a plan. Probably a pleasant, creative vision of what the future state looks like, but in the absence of action it will stay as a set of slides and nothing more. The bit between the CEO presenting the strategy at the annual conference and the frontline staff actually seeing the benefits of this is often missing. Delivering business transformation requires creativity from all teams. IT is not devolved from this. If you take my old manager’s view that all change is business change, then IT becomes a service function, working in tandem with their colleagues in other departments and delivering projects that underpin business strategy.


Argentina is betting on programming to boost its tech sector

Technology and specifically computer programming has had some successes in Argentina. In June the University of Buenos Aires was recognised for computer programming skills in the International ACM Programming content. UBA finished 18th in the global rankings, with Harvard coming 19th, making it the highest ranking university in South America for computer skills. The country produces on average 98,000 graduates and 11,000 postgraduates, creating a skilled workforce across various fields, so the ministry’s new plans hope to plant the seeds for IT and computing skills at a young age. The building blocks are certainly there for Argentina to grow its IT sector by focusing on its impressive programming reputation.


Facebook Open Sources Data Query Language GraphQL

The GraphQL server is a relatively small bit of code; it's responsible for a few things. It provides utilities for defining your type system and how it interfaces with your server code. It accepts GraphQL queries and will validate that they can be safely and unambiguously run within your type system. Then of course it executes the query by calling into your code as you defined within your type system while handling things like asynchronicity, parallelism, and error catching for you. The roadmap ahead is two-fold. First, better tools for client developers for doing things like code generation and query management. Relay is our primary and most significant tool for the client.



Deep dive review: The iPhone 6S Plus delivers the goods

Existing features of the 6S Plus (and its smaller sibling, the 6S) have been improved and there are even a few groundbreaking features thrown in for good measure. Unlike the 2014 iPhone launch, when numerous issues -- including an unstable iOS 8, a botched software update that killed cellular coverage for some iPhone 6 models, and, ugh, "Bendgate" -- put a damper on things, this year's rollout went smoothly. Apple reported that it sold over 13 million iPhones in the first weekend of retail sales; the iOS 9 update has been generally responsive and stable; and, only a few weeks after release, Apple asserted that over 50% of iPhone users had the latest version installed on their devices and that over 13 million phones were sold in the weekend following the launch.


How Data Integration Can Kill a Partnership Before It Happens

Data integration has come a long way in 15 years. While it used to be a multiyear and hugely costly undertaking feasible for only large enterprises, midmarket companies now have access to the same level of integration capabilities thanks in large part to cloud technology.  However, there is still a long way to go, especially in post 2008 recession times. With expectations higher than ever before to produce value and market pressures demanding that businesses move at a faster pace than ever before, small and midsize organizations especially don’t have enough IT resources, cash or time to devote to their integration efforts. Seamless integration is critical for organizations in their ongoing quest to do more with less, however certain hiccups can end a partnership before it even has a chance to begin.


Introduction to Android Wear

More than programming the smart watches, there are various aspects and concepts that one has to learn or understand in terms of designing apps for smart watches with a small real estate. These days, till today most of us are still using desktops, laptops and smart phones to perform our day to day tasks. But with the advancement of smart watches, there’s a drastic shirt in the way how things can be performed. Wearables in itself is an interesting ones with a lot more challenges in designing apps; fortunately, when it comes to the App design, Google has put forward very good documentation on how to design, so we don’t have to break our head in understanding how to design for smart watches.


What's next in aaS? Workspace-as-a-Service

An IDC research report titled, "Worldwide Workspace-as-a-Service 2014-2018 Forecast", revealed that "the hosted WaaS market will grow from $282 million in 2013 to $1.7 billion by 2018, representing a five-year CAGR of 42.5 percent." ...  Microsoft realized this trend and responded with Office.com. Intuit has done the same with its web-based Quickbooks offering. And Salesforce.com was the first to set up a SaaS CRM solution for its customers. Vendors have long realized that operating systems were less important than the applications themselves. And the BYOD generation couldn't agree more. The seamless interchange of information seems to be the only requirement for applications, regardless of device, vendor, or manufacturer.


Yunomi promotes Japanese ‘tea commerce’

“If you're not a connoisseur or tea expert,” he adds “we are building a Tea Dojo, in which you don't just buy to tea to drink, but follow a progression of tasting sets to learn more about Japanese tea.”  It is this idea of linking the whole culture of eating and drinking into wider aspects of being Japanese that makes the whole thing so interesting – although perhaps, at first, confusing. At present, for example, there are two websites. “The new website, Yunomi.life, will be our primary storefront,” says Chun. “Our old website will remain active and eventually become web magazine.” The original website contains a lot of information on various aspects of Japanese culture – including literature and a wide variety of other things – and Chun confirms this will continue as the company progresses.


BYOD is as entrenched (and complicated) as ever

Such wide variations likely occur because some companies reimburse workers for buying their own smartphone or tablet to use at work, and even pay part or all of a monthly wireless service charge. Other companies expect a BYOD worker to pay for it all, while offering back-end support for company apps used on the devices. At the heart of the BYOD trend is the distinction between "personally liable" devices -- those brought in from home by workers -- and "corporate liable" hardware, where a company owns a smartphone or tablet provided for a worker's use, with the company usually paying all costs. Corporate liable practices have evolved in recent years to include a choose-your-own-device (CYOD) model where a business allows workers to select from a list of specified devices for business use, primarily to give IT shops more control over hardware and data.



Quote for the day:


"Try to become not a man of success, but try rather to become a man of value." -- Albert Einstein,

October 16, 2015

Fighting today’s Advanced Attacks

Constructing a network security defense ad hoc, that is one product at a time as the need presents itself creates weak links in the overall strategy, weak links that can easily be broken. With multiple attack vectors and malware constantly increasing in volume and sophistication, what is needed is a comprehensive strategy that can eliminate the weak links and evolve as the threat landscape evolves. This solution guide explores the myths and issues surrounding Advanced Persistent Threats (APTs) and how the right solution can offer the necessary protection against APTs and other targeted attacks.


Netflix reveals the future of enterprise tech: Here’s why

“AWS is now the basic layer of compute services,” said Hunt. Netflix is not just heavily reliant on AWS — it’s about to become completely dependent. Hunt plans to power down his company’s last data center this year, at which point Netflix will be running almost entirely on outsourced cloud infrastructures, mostly operated by Amazon. (It’ll still run its own content delivery network — CDN.) Note that this timeline is new. Netflix originally said it would shut down its last datacenter in 2014, and then again this past summer, but the future sometimes comes a little slower than expected. That’s one aspect of enterprise infrastructure that will probably never change.



Creating Value for Business: 2 Data Science Questions You Must Ask

Organizations should come to expect that one way a good Data Scientist will often demonstrate his or her ability is by reframing or redefining the problem put before them by the company. The first few times this may seem off-putting, but organizations who learn to embrace this sort of transformation of the business problem will be able to compete for the future. Practically speaking this may look like shifting to "medical device retention" rather than "patient retention" when targeting patient retention delivers results too late to affect the outcome. As a business concerned with the ROI from your Data Science investment, you will undoubtedly want to see activities of the Data Scientist which specify criteria for model assessment.



The Future Of Driving With V2V And V2I Technology

V2I technology also has security at its core (traffic lights, pollution levels, hazards, emergency services). But, on the top of that, V2I is more aimed at traffic flow, re-routing, fuel consumption, parking, WIFI, charging spots for electric cars on the move, conform to Dr. Joachim Taiber, research professor at Clemson University. Starting 2020, V2X (Vehicle to Everything) and its constituents, V2P (vehicle to pedestrians), V2V and V2I technology, will take an active role in semi-autonomous cars. The system at the moment is configured to avoid collision impacts by literally taking over the steering wheel and the accelerator, pushing against the driver’s foot and slowing the vehicle if needed.


Intel IoT Unlocks True Value in Connected Supply Chains

An exciting technology in this space is the 3D box bounding capabilities of Intel RealSense technology. For those who need a little brushing up on their geometry, box bounding defines the outer limits of the physical space utilized by an object. This is helpful information to have at your fingertips for packing efficiency and it’s something you can now map out in real-time with Intel RealSense. Companies across the supply chain are also beginning to see first-hand how they can use Intel RealSense technology to quickly calculate dimensional weight for shipping and to improve load planning.


Machine Age - The Next Revolution

It was long believed that while computers and robots are capable of peak technical performance, they are often unable to perform simple motor tasks. Austrian Hans Moravec already described this paradox of robotics in the 1980s. But the two authors visited a number of new companies that are working on overcoming the “Moravec paradox.” It would be a breakthrough for industrial automation if they succeeded. Recently, entrepreneurs achieved a breakthrough in combating the Moravec paradox. The revolutionary advances in robotics are the one, fascinating side of the digital revolution in industry. But as Austrian national economist Joseph Schumpeter said, innovation is usually a process of creative destruction. The destructive nature of the digital revolution is reflected in other industrial sectors, such as the photo and music industry.



Why You Should Plan Now for SDN Enabled Network Security

An SDN architecture provides an intelligent central console that decouples the network control plane from the forwarding plane. This enables carriers to meet two critical business objectives: to create more valuable services by leveraging network-wide intelligence and to automate manually intensive tasks like provisioning, operating and troubleshooting hardware-intensive networks.  An SDN network can also automatically respond to changes in network behavior. This enables a learning network where carriers can now better harness the plethora of data they have to improve performance and customize service offerings in ways that would have been impossible to do manually. This is how network security can become an automated process based on best-fit policies for a carrier’s network.


Cloud computing - The sky’s limit

Being locked in to a provider is risky. Firms can start to tighten the screws by increasing prices. If a cloud provider goes bust, its customers may have trouble retrieving their data. These risks have already triggered a debate about whether the cloud needs stricter regulation. Some European politicians want to force cloud providers to ensure that data can be moved between them. That is too heavy-handed, not least because rigid rules will inhibit innovation in what is still a young industry. The history of computing suggests that common standards may well emerge naturally in response to customers’ demands—just as in personal computers, where it is now much easier to use the same files on different systems.


Edge network key to IoT data collection and transmission

With IoT data, the transmission problem is inverted, Alexander said. He described IoT data as small, frequent and plentiful (Gartner predicts there will be 25 billion connected devices by 2020). Rather than amplify out large content files, such as software upgrades, CIOs will need to funnel the bits and bytes of IoT data in. But transmitting data in a one-to-one ratio from the device to a data center can be inefficient and create chokepoints in the network. IoT data, in other words, needs to be processed en route. "A lot of architectures and networks haven't been built to do that," Alexander said during a panel discussion. That's where the edge network comes in handy. Akamai is now using its edge as an intermediary location to collect, thin and even normalize IoT data before moving it on to a centralized data center.


Sporting goods CIO hopes to hook customers with IoT, mobile apps

The walkthroughs made it clear that transactions could use a boost. The company’s Aptos POS system, in place for several years, didn’t support mobile and Web transactions. For example, if a customer couldn’t find a product in-store, a sales associate would call it in to Orvis via phone to make a sale. But Aptos’ new POS software, which Orvis began piloting at select stores in August, corrects that service hitch. If a customer comes in and finds two items in a store, but requests a third item that store does not have in stock, an associate can order the out-of-stock product online, and process payment for all three items via an iPad Mini, which is equipped with a credit card reader. The associate can also show the customer similar products they might be interested in from the iPad.



Quote for the day:

"Perseverance is the hard work you do after you get tired of doing the hard work you already did." -- Newt Gingrich