Daily Tech Digest - January 23, 2017

The rise of the machines: lessons from history on how to adapt

Although at different stages of development and adoption, as these technologies bed in, becoming more widespread and convergent, we will see a radical shift in the way that individuals, companies and societies produce, distribute, consume and re-use goods and services. These developments are prompting widespread anxiety about what role humans will have in the new world. As the pace of change accelerates, so the alarm levels ratchet up. A University of Oxford study estimated that close to half of US jobs could be lost to automation over the next two decades. In the opposite camp, economists like James Bessen argue that, on the contrary, automation and jobs often go hand in hand. It’s impossible at this point to predict what the overall impact on employment will be. Disruption will happen; of that we can be certain. But before we swallow all of the bad news, we should take a look at history.


How to create work-life balance in tech: 7 tips from the C-suite

The overworked tech CEO is now a cultural trope for a reason: Only 65% of tech workers said they were satisfied with their work-life balance, according to a recent survey from Comparably. This is a problem, as constant work and the resulting stress can lead to health problems such as impaired sleep, depression, diabetes, and heart disease—which not only hurt the employee, but also the company, in terms of turnover and rising health insurance costs. Despite the pressure to be always on, finding the proper work/life balance is essential, experts say. "It's possible to be a tech leader and to make time for taking care of yourself," said William C. Fisher, president of Quicksilver Software, Inc. "But, it takes a willingness to make that a top priority and schedule the time."


Dublin, New York officials cite smart-tech challenges and successes

"We're on the verge of seeing smart city tech grow exponentially," he added, speaking during a visit last week to the Smart Cities Innovation Accelerator, sponsored by Harvard University in Cambridge, Mass. Cudden joined about 50 CIOs and CTOs from other cities, mostly from the U.S., to share ideas on taking advantage of the latest smart city technology. "One thing I learned from the U.S. cities is to take an entrepreneurial mindset and to use startups to address problems in cities, with something like an entrepreneurship-in-residence program," Cudden said. "A lot of cities are dealing with the same problems, and one takeaway is there's very little difference in the challenges in European cities or U.S. cities."


Introducing the Open Process Automation Forum. Finally.

Here’s the big news: 2017 marks the kick off the Open Process Automation Forum, a working group within The Open Group, a vendor- and technology-neutral industry consortium. The new Open Process Automation Forum is focused on developing a standards-based, secure and interoperable process control architecture that can be leveraged across multiple industries including oil and gas, petrochemical, mining and metals, pulp and paper, food and beverage, pharmaceutical and utilities. The concept itself is not new, as it is already playing out in The Open Group’s IT4IT Forum that is building a vendor-neutral reference architecture for managing the business of IT. Similarly, The Open Group’s Future Airborne Capability Environment (FACE) is defining approaches for using open standards with avionics systems.


New game, new rules: 3 steps to secure your bank in the digital age

It’s no secret that the sheer volume of data being collected and stored is higher now than ever before. According to EMC, by the year 2020, about 1.7 MB of new information will be created every second for every human on the planet. The data boom isn’t any different for banks—as customers access their banking information across multiple channels and touch points, they’re able to capture new and unique information about customer habits, preferences and more. That information makes banks a goldmine for hackers. The number of endpoints and systems exposed to the outside world is increasing, which means data no longer remains locked inside a data center. Instead, it proliferates outside of the four walls of business, making it vulnerable to hackers and security threats.


Dive Deep Into Deep Learning

The most remarkable thing about deep learning is that we don’t program them to perform any of the acts described above. Rather, we feed the deep learning algorithm with tons of data such as images or speeches to train it, and the algorithm figures out for itself how to recognize the desired targets. The ability of Deep Learning methods to learn complex nonlinear relations by churning high amount of data, creating features by themselves makes it stand out from the other traditional Machine Learning techniques. To know how a standard Deep Learning algorithm works, we have to follow its predecessors, neural networks. Well, some practitioners also refer Deep learning as Deep Neural Networks, which is also a choice. In short, a neural network is a family of three layers — an input layer, hidden layer, and an output layer as discussed below.


Idempotent configuration management sets things right -- no matter what

As systems architects are not perfect, many systems end up woefully underutilized -- wasting hardware, power, licences and maintenance costs -- while others lack necessary resources -- leading to performance issues. Even with the elastic resources of cloud computing, systems administrators must still ensure that the operational environment is configured correctly to optimally host the workloads. This is where idempotency comes in. Based on a mathematical concept introduced by Benjamin Peirce in 1870, the term now applies in multiple areas of computing. This does lead to confusion, as idempotency within a database is different from that in a Java program, which is different again from idempotent configuration management, which concerns modern DevOps and IT administrators.


6 EMM predictions for 2017

MDM is quickly becoming old news. Instead, Gartner coined the term EMM, pointing to a shift in mobile management to complete suites that include multiple tools for device, app and software management. And as the line is starting to blur in what defines a mobile device, Silva says MDM solutions will have "an tough battle against more full-featured EMM suites." If anything, more businesses will embrace EMM platforms and continue to use familiar MDM tools that are included in the suite. EMM also helps businesses consolidate certain practices -- like compliance regulations for example -- and deploy updates and patches across a range of complex devices all at once. "Solutions that are seamlessly integrated across all existing enterprise systems and platforms will begin to increase in popularity due to their comprehensive visibility and ease of use," says Mitch Berry, vice president of EMM at MOBI.


Raspberry Pi rival: Asus launches Tinker Board

Much as is possible with the Pi 3, the Tinker Board can be used as a PC replacement or a media center, with Asus' board supporting a custom version of the Linux-based Debian operating system and the open-source media center software Kodi. However, it won't run Raspbian, the Raspberry Pi's official, Debian-based OS. Asus is also touting the machine as a board for makers, with the Tinker Board also packing a 40-pin header with 28 general-purpose input output (GPIO) pins. These GPIO pins allow the board to control a range of hardware, and in the Pi have allowed the board to be used in modding projects ranging from robots to book scanners. Another consideration for makers is battery drain, and the Tinker Board's max power consumption is five watts.


An Introduction to Differential Privacy

Differentially private algorithms are a promising technical solution that could ease this tension, allowing analysts to perform benign aggregate analysis while guaranteeing meaningful protection of each individual’s privacy. This developing field of technology is worth considering in any system that seeks to analyze sensitive data. Although the differential privacy guarantee was conceived of only ten years ago, it has been successful in academia and industry. Researchers are rapidly inventing and improving differentially private algorithms, some of which have been adopted in both Apple’s iOS and Google’s Chrome. This article discusses the historical factors leading to differential privacy in its current form, along with a definition of differential privacy and example differentially private algorithms.



Quote for the day:


"When your values are clear to you, making decisions becomes easier." -- Roy E. Disney


Daily Tech Digest - January 22, 2017

Why software is like water, and what it means for global leadership

Software is the international language. It allows us to do everything from receiving instantaneous news out of Syria to hailing a ride in the rain via our smartphones. Both of these examples and more are accomplished by software. The theme for this year’s World Economic Forum Annual Meeting is particularly timely and relevant. We need Responsive and Responsible Leadership as we all play witness to an earlier call by the Forum: the advent of the Fourth Industrial Revolution, as the lines are blurred between the physical, digital, and biological spheres. For countries to survive and thrive in this era, software needs to play a central role. Agriculture, basic manufacturing, education, food production, and water filtration all require software to work well at scale. For companies and economies, software is key to sensing change and reacting to it.


Researchers condemn unsubstantiated WhatsApp “Backdoor” story by Guardian

A group comprising of 30 security researchers have now co-signed an open letter to mount pressure on the Guardian so that it retracts the false story asserting that the paper is trying ‘very concretely’ to endanger public. The security researchers who have co-signed this open letter include salient bigwigs of the security industry including The Tor Project’s Isis Lovecruft, cryptographer Bruce Schneier, Mozilla’s Katherine McKinley, security research Thaddeus T’Grugq’, security researcher and author Jonathan Zdiarski and Open Crypto Audit project’s Kenneth White. Security researchers believe that the vulnerability pointed out by the Guardian is a minor one and poses an insignificant threat. It is related to the way WhatsApp handles essential retransmission for unread messages when the user changes SIM or phone card.


Digital Transformation Or Digital Free Fall: What Every CEO Must Know

Many leaders have fallen into the trap of believing digital transformation is like playing a game of technology catch-up. That if they can harness a bit of digital exhaust and turn big data into smart data, that somehow their business will transform itself. Nothing could be further from the truth, and the billions of dollars being spent chasing digital shadows won’t change a thing. Organizations whose business models are a few revolutions back on the digital curve cannot transform from lagger to leader by simply implementing blockchain or machine learning. Digital transformation is really more of a leadership, culture, strategy, and talent issue than a technology issue. Real digital transformation occurs when business models and methods are reimagined by courageous leaders willing to manage opportunity more than risk, focus on next practices more than best practices and who are committed to beating their competition to the future.


The Eye In The Sky Gets A Brain That Knows What It's Seeing

Crowdsourcing can also help with training and testing machine-learning algorithms, since human workers from around the world can be paid to quickly label features on satellite images or verify labels applied by machines, he says. And while both crowdsourcing and automation let DigitalGlobe and its customers extract more detail from satellite images than ever before, Har-Noy says the company takes steps to protect people’s privacy and safety. The resolution of commercial satellite images, regulated by the U.S. Commerce Department, means people aren’t recognizable at the level of detail the company releases, Har-Noy says. DigitalGlobe also doesn’t release images of active U.S. combat areas. "We take privacy very seriously with regard to the information we release, we make accessible, and also that other people derive," Har-Noy says.


Algorithm does real-time, city-wide ride sharing

The biggest part of that challenge is finding the optimal solution within that entire decision space; algorithms often get hung up on a local optimum or can't explore the entire space within a reasonable amount of time. Fortunately, the authors recognized that they don't need the global optimum. A reasonably good local optimum may not be the most efficient, but it's good enough to get people in cars quickly. A first round of trip assignments is done using what's called a greedy algorithm, which simply starts with the longest trips first and tries to minimize travel delays. From there, the algorithm attempts optimizations, but it's capable of producing an answer at any time if a decision has to be made. In addition, it's possible to make some optimizations like limiting the cars that are considered for servicing a trip.


IoT Seen as Weakest Link for Attacking the Cloud

'Not only are IoT devices an attractive target because of their inherent insecurity, but also for the role they play in some organizations, such as closed-circuit television cameras, which can provide real-time information about everything that is happening at a given location,' Fortinet said. But vulnerabilities are not the only issue. As IoT devices are being deployed, they must also be managed, and they are increasingly being managed by cloud solutions that require a communications channel between the IoT device and its master controller in the cloud. 'We expect to see attacks leverage this trust model in order to poison the cloud, and then use that beachhead to start to spread laterally,' Fortinet said. 'These end devices can then be exploited to misuse their trusted relationship to upload malware to, and distribute it from the cloud.


Securing a board appointment: CIO requirements and benefits

CIOs can become more attractive board candidates by developing a deep expertise in a particular area, such as digital transformation, experts said. "The best thing that people can do is to make a name for themselves and the work they're doing. To just have CIOs go out and try to market themselves to get on a board isn't how it happens. The best people are tapped on the shoulder for the work that they're doing," Gambale said. She noted that CIOs also might secure a board appointment by working with executive recruiters, as the firms they work in often also handle board of director searches. Meanwhile, Morris said serving on a nonprofit board first eventually could lead to serving on a company board of directors.


Should Banking Build an Internet of Things (IoT) Strategy?

Financial companies have prioritized customer and product monitoring in response to higher levels of online fraud, difficulty with identity verification and fears of hacked computer systems and networks. Banks are also using the IoT to monitor and collect data about their customers’ financial transactions, while lenders are exploring ways to finance and track assets and value collateral based on sensor data. More advanced IoT implementations include the ability to conduct basic banking using wearables (smart watches or fitness bands) and voice-first devices (Amazon’s Echo), the integration of invisible payments in transportation (Uber) and restaurants (Dine and Dash), and the leveraging of smart home appliances (Amazon Dash, Samsung Family Hub refrigerators). Additional tests are also beginning with the Amazon Go™ grocery and the inclusion of Amazon Echo capabilities in automobiles.


How to Resolve Competing Information Management Strategies

Political objectives can create an undercurrent of issues beneath the surface of recognizable business challenges. They can prove to be the largest detractor to gaining a truly cohesive vision and IM strategy. Like a fault line waiting to erupt, the negative whispers from this undercurrent can cause much damage and must be brought from the hallways to the table to be appropriately addressed by leadership. The best way to address political issues is to have leadership come together and lay the concerns on the table in order to find the high-stakes, high-emotion touch points. Work through the list of concerns to find logical, justifiable solutions. By bringing these issues to light and turning the focus to true business value and return on investment, you will find tensions ease and emotions dissipate. Such an exercise can be eye-opening and significantly improve communications in a highly volatile environment.


Report: AI adoption to create surge in revenue growth by 2020

According to the Infosys report, organisations which have fewer AI-related skills within their business are more likely to re-deploy workers impacted by AI adoption. However, those with more AI-related skills are more likely to re-train their employees. Leading industries which plan to re-train employees include: fast-moving consumer goods, aerospace and automotive, energy, oil and gas and pharmaceutical and life sciences. For instance, IBM’s Watson chatbot has been significantly deployed across banks, while hospitals have been leveraging its AI capabilities to diagnose rare diseases. Sandeep Dadlani, President & Head of Americas, Infosys said: “Artificial Intelligence adoption is on the rise and we are excited to see the investments in AI that businesses are gradually making to derive meaningful and creative change.



Quote for the day:


"What we actually learn, from any given set of circumstances, determines whether we become increasingly powerless or more powerful" -- Blaine Lee


Daily Tech Digest - January 21, 2017

New details emerge about Intel's super-small Euclid computer for robots

Intel announced and demonstrated the Euclid computer in a robot moving on stage during CEO Brian Krzanich's keynote at the Intel Developer Forum in August. The Euclid Developer Kit launch page is up on the website of Mouser Electronics. Intel didn't provide a specific launch date or pricing. Once the Euclid is placed in a robot, it can be operated remotely through a mobile device or PC. The Euclid has Wi-Fi and Bluetooth connectivity to communicate with the PC. The Euclid can also "serve as a full, autonomous brain with sensing capabilities, or as a smart sensor controlled by a more powerful computer," Mouser states on its website. The computer has GPS capabilities for navigation. ... The Atom CPU provides the horsepower to process and analyze the images collected by the 3D camera. The CPU will drive a robot's movement and help it complete tasks.


How banking apps and digital cash solutions are all the rage in India

The National Payments Corporation of India, the nodal agency for all retail payment systems in the country, is working with Visa and MasterCard to develop a common QR code to facilitate cashless transactions in shops. “It is a huge market. There are hundreds of mobile banking apps and hundreds of e-wallets. All of them serve the same purpose using different means,” said Sony Joy, chief executive officer of Chillr. “If there is any direct competitor of ours, it is cash.” Not surprisingly, at this juncture, uninitiated consumers are lost. Credit and debit cards have been the most used cashless payment systems in India for over a decade. Internet banking solutions such as NEFT (national electronic funds transfer) and RTGS (real time gross settlement) for corporate customers are in place. There are offline payment methods, eliminating internet security and malware threats.


How Android One could complete Google's grand Android plan

From the get-go, the whole point of Android One was to make inexpensive Android phones that didn't suck -- phones that were affordable but still decent to use, without all the asterisks that often accompany budget-level devices. Part of that means Google maintains tight control over the software and also guarantees the devices will get reliable and timely ongoing updates -- both security patches and full-fledged OS releases. Thus far, Android One has been limited to a small number of so-called "emerging markets" -- places like Pakistan and India, where it can be "hard for people" to "get their hands on a high-quality smartphone," as Google explains it. Bringing the program to America, though, would give it a whole new meaning. In short, it'd help Google move closer to its goal of "fixing" Android -- a goal that started in earnest with the Pixel but remains only half-complete.


How -And Why-You Should Use A VPN Any Time You Hop On The Internet

The good news is VPNs aren’t expensive. You can usually pay as little as $5 a month (billed annually or in blocks of several months) for VPN coverage. We won’t get into specific VPN service recommendations in this article; instead, here are some issues to consider when shopping around for a VPN provider. First, what kind of logging does your VPN provider do? In other words, what information do they keep about your VPN sessions and how long is it kept? Are they recording the IP addresses you use, the websites you visit, the amount of bandwidth used, or any other key details? All VPNs have to do some kind of logging, but there are VPNs that collect as little data as possible and others that aren’t so minimalist. On top of that, some services discard their logs in a matter of hours or days while other companies hold onto them for months at a time.


China Unveils Memory Plans

Although China’s domestic IC sector is moving at a fast pace, the Chinese government has been grappling with the same problem for years. It is behind in semiconductor technology. This is a complex subject, but one of the causes is export controls. Multinational companies sell products into China, but they must follow various export control policies. Originally hatched during the Cold War period in the 1950s, export controls were established to limit technologies that could have potential military use. As part of those controls, multinational fab equipment makers for years were prevented from shipping advanced tools into China (and other nations) that were capable of processing chips at 0.25 microns and below. On top of that, China also lacked IC know-how, so it fell behind in semiconductor technology.


Google Sets Out to Disrupt Curating With “Machine Learning”

A few other Experiments involve organizing the Google trove of art images into 3-D landscapes. “t-SNE Map,” for instance, gives you a view of a landscape of rolling hills, composed of points. Zoom in on the terrain, and you discover that the points are actually images of artworks. The topography is formed by how the computer has decided to sort and cluster artworks in relation to one another, based on its understanding of aesthetic similarities. “The algorithms only ‘looked’ at the artworks,” the description explains. “No meta data was used, the visual similarity was calculated with a computer image algorithm used in Google Search purely based on the images.”


Why Cyber-Security Strategies Are Falling Short

While organizations around the world are more confident than ever that they can predict and detect cyber-attacks, they're still falling short on investments and plans geared toward recovering from a breach. Such is the double-edged finding of EY's 19th annual Global Information Security Survey, "Path to Cyber-Resilience: Sense, Resist, React." EY surveyed 1,735 IT and IT security executives from organizations around the world to uncover the most compelling cyber-security issues facing business today, and what it discovered was a marketplace still struggling to keep up with a fast-evolving threat landscape. "Organizations have come a long way in preparing for a cyber-breach, but as fast as they improve, cyber-attackers come up with new tricks. Organizations therefore need to sharpen their senses and upgrade their resistance to attacks," said Paul van Kessel, EY's global advisory cyber-security leader.


Automated Traders Take Over Bitcoin as Easy Money Beckons

The nation’s central bank conducted on-site inspections at some of the biggest bitcoin exchanges this month, looking for evidence of violations including market manipulation and money laundering. Similar scrutiny of stock-index futures in 2015 led to trading restrictions that cut volumes by 99 percent. ... Rather than moving money out of the country, most automated traders in China are focused on cross-exchange arbitrage, said Arthur Hayes, a former market maker at Citigroup Inc. who now runs BitMEX, a bitcoin derivatives venue in Hong Kong. They can transact multiple times per second, reacting to price changes caused by individual investors and other speculators who often use technical patterns to guide their buying and selling decisions, Hayes said.


Half of work activities could be automated by 2055

Advances in natural language processing and machine learning produce a Cambrian crush of light AI technologies emerged in 2016. Chatbots have extended from messaging platforms to corporate IT departments while ecosystems are springing up around virtual assistants such as Amazon.com's Alexa. Roboadvisers, in which software assists with delivering financial advice, are increasingly becoming a standard offering in financial services. As a result, Chui says that it is tough to estimate AI’s potential as machines learn to process natural language more effectively. "It will unlock a lot of potential," Chui says. But most corporate IT departments are just beginning to figure out how to incorporate AI to better serve customers, according to Forrester Research. Despite strong interest in investing in AI technologies, many enterprises don’t understand how to apply AI to meet specific business objectives.


Do you have a cyber A-team?

Retained executive search firms are busy matching executive cyber A-players to support their forward-thinking clients. The largest companies and biggest brands can offer the seven-figure comp packages to the very best talent.... Smaller private companies find it difficult to compete for top talent in this elite pool. What these companies can’t offer in cash comp, they can make up in pre-IPO equity. ... Rapid technological advances are changing the game and your company’s crown jewels are too often accessible to the bad guys. Cybersecurity has fast become a top priority management challenge and finding best-in-class leaders to be part of your A-team to assess, manage and mitigate threats must be a key element of your company strategy. Previously siloed risk-management functions today must be reinvented, strengthened, and funded more aggressively.



Quote for the day:


"Life passes most people by while they're making grand plans for it." -- George Jung, Blow


Daily Tech Digest - January 19, 2017

Meet Me In The Parking Lot: Walking Meetings Hit Their Stride

“Walking meetings are preferable for one-on-ones because it actually gives you a break from staring at a computer screen,” says Lan, a software engineer at Sift Science, which develops machine learning technology to detect fraud. “I walk with either a manager or a peer, usually when we talk about high-level things.” A walking meeting is just what it sounds like: a meeting that takes place during a walk rather than in a conference room or office. People can hold walking meetings on sidewalks and park trails or inside shopping malls and convention centers if the setting isn’t too noisy. “All of our employees to some extent use walking meetings to break out of the sedentary lifestyle,” says Robert Manigold, a partner at web and app development agency Code Koalas in Kansas City, Mo.


New study details the effectiveness of Security Operation Centres

Hewlett Packard Enterprise’s State of Security Operations Report 2017 looks at the increased pressure organisations are under in the face of rapid innovation in the cyber threat and how they can align security initiatives with business goals. ... Findings from this year’s report show that the majority of SOCs are falling below target maturity levels, leaving organisations vulnerable in the event of an attack. The methodology for assessments were based on HPE’s Security Operations Maturity Model (SOMM), which focuses on multiple aspects of a successful and mature security intelligence and monitoring capability including people, process, technology, and business functions. The SOMM uses a five-point scale – a score of “0” is given for a complete lack of capability while a “5” is given for a capability that is consistent, repeatable, documented, measured, tracked, and continually improved upon.


Infographic: Car Hacking Is Not A Thing Of Future

You may not realize it, but your car probably already has some self-driving technologies—even basic ones. For example, many of the newest cars have lane assist or park assist, which can help you avoid unintended lane violations or better ease into parking spots. But those car assistance technologies depend on the internet and computers, and those are at risk of hacking. In fact, that’s one of the biggest concerns with the continued development of self-driving cars: how can thieves access them, and what will they do with the data? Vound Software compiled a detailed infographic to get you all the details.


Update On The Megatrend of Artificial Intelligence

Artificial Intelligence is the discipline of thinking machines. The field is growing dramatically with the proliferation of high powered computers into homes and businesses and especially with the growing power of smartphones and other mobile devices. Artificial intelligence software is assisting people in most every discipline. The many functions of AI are considered by many to be threatening many human jobs across multiple industries, but others consider it a great producer of jobs since it will help create entirely new industries and free more humans to innovate and create. You can see our reference to Truly Useful AI You Can Use Right Today. Follow this link to track the highest ranked, enterprise ready Artificial Intelligence Companies.


Smile! Hackers Can Remotely Access Your Samsung SmartCam Security Cameras

It's not necessary to break into your computer or smartphone to spy on you. Today all devices in our home are becoming more connected to networks than ever to make our lives easy. But what's worrisome is that these connected devices can be turned against us, anytime, due to lack of stringent security measures and insecure encryption mechanisms implemented in these Internet of Things (IoTs) devices. The most recent victim of this issue is the Samsung's range of SmartCam home security cameras. Yes, it's hell easy to hijack the popular Samsung SmartCam security cameras, as they contain a critical remote code execution (RCE) vulnerability that could let hackers gain root access and take full control of these devices.


Attackers Start Wiping Data From CouchDB And Hadoop Databases

According to Merrigan's latest count, 126 Hadoop instances have been wiped so far. The number of victims is likely to increase because there are thousands of Hadoop deployments accessible from the internet -- although it's hard to say how many are vulnerable. The attacks against MongoDB and Elasticsearch followed a similar pattern. The number of MongoDB victims jumped from hundreds to thousands in a matter of hours and to tens of thousands within a week. The latest count puts the number of wiped MongoDB databases at more than 34,000 and that of deleted Elasticsearch clusters at more than 4,600. A group called Kraken0, responsible for most of the ransomware attacks against databases, is trying to sell its attack toolkit and a list of vulnerable MongoDB and Elasticsearch installations for the equivalent of US$500 in bitcoins.


How AI Can End Bias

AI has the potential to help us avoid bias in hiring, operations, customer service, and the broader business and social communities—and doing so makes good business sense. For one thing, even the most unintentional discrimination can cost a company significantly, in both money and brand equity. The mere fact of having to defend against an accusation of bias can linger long after the issue itself is settled. Beyond managing risk related to legal and regulatory issues, though, there’s a broader argument for tackling bias: in a relentlessly competitive and global economy, no organization can afford to shut itself off from broader input, more varied experiences, a wider range of talent, and larger potential markets. That said, the algorithms that drive AI don’t reveal pure, objective truth just because they’re mathematical.


Gaining Confidence In The Cloud

Security in the cloud refers to the security of systems built on top of it. Whilst the private cloud providers will offer simplified systems for administrators to both implement and audit standard security measures, these by no means replace the traditional measures, nor does they guarantee the security of your systems. Just as in a traditional datacentre or a private cloud, the security of your system is mainly your responsibility. ... The point at which the responsibility passes from your organisation to your supplier is known as the ‘trust boundary’ and it occurs at different points for the different types of cloud e.g. IaaS, PaaS and SaaS. You will need to verify the security status and resilience of the Cloud Service Providers (CSP) you chose and you should also review and understand their Data Protection Act obligations. From 2018,


4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams

According to a recent study, the global demand for cybersecurity professionals will create more than one million unfilled cybersecurity positions by 2019, with one of the most desired skills being secure software development. No wonder, that entrepreneurs and companies are having increasingly hard time finding the security talent they need to build reliable services and keep the data of their users safe. One way to bridge the skills gap and create more secure products is to train and hire more engineers specialized in cybersecurity. However, it is equally important to improve the cryptography and security skills of all developers working in your company, beyond those sitting in dedicated cybersecurity teams. Here are some thoughts on the reasons.


Close The Gap Between IT & Security To Reduce The Impact Of Cyber Threats

There are many advantages to having separate IT and security teams, with the most important being that it allows experts in both groups to hone specific skill sets that make them more effective at their jobs. But that doesn't mean that each must operate within a silo. Combining security and IT operations can be as simple as encouraging more communications and providing tools that give them visibility into areas supervised by the other group. In security, having a deeper understanding of how systems within the network are designed to perform would help them to better spot and stop threats. Modern advanced persistent threats that use tools like Hammertoss, ... Attacks that leverage native capabilities in the operating system or whitelisted websites/applications (such as tech support) would not be so invisible to those on the security team if they knew what day-to-day operations of those systems looked like from an IT perspective.


Mini PC invasion: These radically tiny computers fit in the palm of your hand

Some of today’s desktops can make even the sleekest of laptops seem downright bulky. Computers have been shrinking for years, and the revolution has only accelerated in recent times. As chipmakers focus on creating processors that sip power without sacrificing performance, thermal concerns have largely been alleviated in modern CPUs. Because of that, today’s pint-sized PCs offer enough performance to play HD video and satisfy Office jockeys, the opposite of the janky, compromised experience of yesteryear’s microcomputers. From PCs-on-a-stick to discreet boxes no larger than a deck of cards, let’s take a look at the wide range of computers available that can fit in the palm of your hand—starting with the one that brought teeny-tiny PCs to public attention.



Quote for the day:


“Never underestimate the power of dreams and the human spirit. The potential for greatness lives within each of us.” -- Wilma Rudolph


Daily Tech Digest - January 18, 2017

Robots are evolving so quickly that the big concern may be how much we don't know about AI

Maybe it will be the the time when change happens so quickly, and is so profound, that the technophiles will be wondering why we didn’t listen to Elon Musk back then. Or Bill Gates. Or Steve Wozniak and the 1000 other science and technology leaders who are so worried about the rise of AI they wrote a letter to the United Nations about it. The UN is listening, because the argument against AI goes far deeper than robots putting us all out of work. Just before Christmas, at the International Convention on Conventional Weapons in Geneva, the 123 participating nations voted to look at the possibility of banning autonomous robots that can select targets without human control. Yes, there are countries that want robots to not only fight the wars, but also have the power to choose who dies and when.


Analysis and Mitigation of NoSQL Injections

Like almost every new technology, NoSQL databases lacked security when they first emerged3–5. They suffered from a lack of encryption, proper authentication, role management, and fine-grained authorization6. Furthermore, they allowed dangerous network exposure and denial-of-service attacks. Today, the situation is better, and popular databases have introduced built-in protection mechanisms. NoSQL databases use different query languages, which makes traditional SQL injection techniques irrelevant. But does this mean that NoSQL systems are immune to injections? Our study shows that although the security of the query language and drivers has largely improved, there are still techniques for injecting malicious queries. Some works already provide reports of NoSQL injection techniques. 


Wearable technology in investment banking: watch your money on your watch

As of now, a trading watch-based app is working as an extension of mobile app and to take any further action a trader is required to use their mobile or iPad. In future, wearable devices should allow traders or advisors to take action based on the notification received and initiate next steps using call, SMS, email and other features designed for trading (such as buy/sell touch buttons). Key focus should not be on offering everything on a watch but instead a set of limited action-based features that are simple and urgent. Two versions of a smartwatch trading app can be created: one for advisors to manage client accounts, and the other for individual traders and investors who manage their own accounts.


16 Stunning Statistics that Forecast the Future of the Internet of Things

Everyone’s talking about the Internet of Things, even the “things,” which can now request and deliver customer support, tell if you’re being as productive as you could be at work, let your doctor know if you’re following orders (or not), reduce inefficiencies in energy consumption, improve business processes, predict issues and proactively improve or resolve them based on data received. The Internet of Things (IoT) is just getting started. These forecasts below show why organizations need to get started too (if they haven’t already) on leveraging and responding to the Internet of Things:


Beware This New Gmail Scam That Is Tricking Even Tech-Savvy Users

Hackers who have breached someone's email account look through the emails in it for correspondence containing attachments. They then send emails from the compromised account -- impersonating the account's owner -- with each email leveraging similarities to prior correspondence, so as to make the new messages seem legitimate and familiar. For example, the phishing emails may use a subject line that was used in the past. The hackers embed an image of an attachment used in the past into each phishing email, but configure the image to open not the attachment but, rather, a phishing page that looks like a Google login. Because the user is opening a Gmail attachment, the presentation of a phony Gmail login page does not seem alarming -- especially when the person opening the attachment feels that he or she has been viewing a "safe and familiar" correspondence.


IT Teams Can Influence Culture Across Campus

Do campus users view IT as the department that enables them to work smarter, better and faster, or do they view IT processes as a hurdle to overcome? Certain solutions — collaboration systems, virtual desktop infrastructure, mobile devices, the cloud — support the anywhere, anytime approach that many staff and students have come to expect. Yet as much as IT strives to make this approach possible, it also seeks to manage risk and keep users — and institutional resources — safe from cyberthreats. Balancing these two concerns is a perennial and central IT function, but how IT leaders communicate related initiatives to users can go a long way in shaping culture. When IT can’t accommodate users’ requests, or can’t accommodate them quickly, do staff explain the rationale or the reasons behind a delay? Does IT have a positive track record of collaborating with outside departments to identify ways that IT services can enhance productivity while maintaining security?


Key Data and Analytics Trends Everyone Should Watch in 2017

It’s estimated that between 35 and 50 percent of jobs that exist today are at risk of being lost to automation. Repetitive, blue collar-type jobs might be the first casualties to robotic automation, but with sophisticated AI even professionals — including paralegals, diagnosticians, and customer service representatives — could be at risk. As with most advances in technology, there are pros and cons to this rise in automation. On the one hand, companies will be able to automate repetitive jobs, reduce associated costs, and increase productivity. On the other hand, the elimination of low-skilled or low-education jobs will hurt some of the most vulnerable populations already struggling to find jobs that provide a living wage. The jobs that will remain will require high levels of education and creativity, and there will be fewer of them to go around.


Here's how millennials are impacting the future of communication

Several trends that have emerged over the past 18 months or so point to the decline of email as the primary mode of communication in the workplace. These range from an overall shift in user behavior to the widespread adoption of chat apps, which boast a growing list of functions and capabilities. The emergence of less formal, more engaging modes of workplace communication is most obvious in the adoption apps like Slack and the growing trend in using social networking apps such as Facebook Workplace. Chat apps are proving successful in the workplace for several reasons: Chat apps are convenient. Chat apps support quick and easy-to-access communication, and enable businesses and users to communicate with those who may not have an email address. For instance, many doctors in Brazil use WhatsApp to converse with patients, schedule appointments, and share test results.


What Does "Being Digital" Actually Mean?

Being Digital is the re-imagining of business processes to be by default a fully online, fully automated process from end user interaction to back office processing, with no need for human intervention. This really should be the first question any organisation should ask. The path to being digital is not free…investment is needed and therefore the benefits of being digital needs to be understood by those putting in the investment. Return on Investment is an extremely difficult thing to calculate and it can only be measured on a company by company basis. I could give you a bullet point list of the reasons why – however, you’re about to get your fill of lists plus you can boil it down to one thing: If you don’t become digital, your business will die. And if you don’t take being digital seriously, your competitors will and they will do it better…and your business will die. Ever heard of Blockbusters?


Passwords: A Long Goodbye

Don’t hold your breath. Brett McDowell, executive director of the FIDO (Fast IDentity Online) Alliance, is as passionate an advocate of eliminating passwords as anyone. He says that day is coming, given the creation of a, “new generation of authentication technology” largely based on biometrics, and a “massive collaboration among hundreds of companies” to define standards for that technology. ... There are a number of reasons for that, even though the security problems with passwords are well known and well documented. As Phil Dunkelberger, CEO of Nok Nok Labs, put it, “the username and password paradigm is fundamentally broken. It was never designed for, and is inherently incapable of addressing, the use cases of modern society. “



Quote for the day:


"Education is the most powerful weapon which you can use to change the world." -- Nelson Mandela