Daily Tech Digest - August 05, 2017

When FinTech meets the Internet of Things

The new EU Privacy Regulation is in the process of being adopted and among the changes that are going to be introduced there will be a massive increase of the potential fines up to 4% of the global turnover of the breaching entity. Likewise, the development of technologies such as fintech that require the collection and the analysis of large amounts of data will require a so called “privacy impact assessment” to be submitted and validated by privacy authorities. The implementation of a privacy by design approach can be the sole defense in a regulatory framework where the burden of proof of having complied with regulations will be on the investigated entity i.e. the company exploiting the fintech platform. In addition to privacy issues, there are legal issues as to the ownership of data which need to be reviewed under a privacy, an intellectual property and a contractual confidentiality perspective.


Big Data: 6 Key Areas Every Product Manager Should Address

The two main considerations regarding storage are: how to store and where to store. How to store your data depends on your overall use case. The type of data you produce will determine the type of database you will require. If you have structured data, then a relational database such as SQL Server or MySQL are your best bet. On the other hand, if you have unstructured data such as images, videos, or tweets, then you probably need a schema-less database such as Hadoop or MongoDB. Or maybe, like some systems I’ve worked on, you need both. I’m not suggesting that Product Managers dictate the type of DB or the architecture of the data tier. That’s the role of your Architecture and IT team. However, it IS our job as Product Managers to define clear use cases and convey those to our technical team, so they can implement the right infrastructure for your product.


New fintech partnerships to push automation in trade finance

“We looked at a dozen OCR products, but none served the idea that we had, namely, to have an OCR that could put together all the different formats and make it work. That’s the reason we had to develop it ourselves.” As part of the collaboration, Traydstream have also become a member of PFU’s Imaging Alliance Programme, which gives access to tools, resources and code to build innovative scanner solutions. The data-sharing collaboration with Lloyd’s List Intelligence, meanwhile, will augment Traydstream’s compliance engine, the second part of its solution. This engine uses machine learning algorithms to quickly scrutinise the digital transaction data for a range of issues, such as blank fields, the inconsistency of names, industry-specific legislation, sanctions and country restrictions, to help banks and large corporations tackle anti-money laundering (AML) and compliance issues.


How blockchain is changing the way we invest

What blockchain has essentially done is diversify the means people can invest. People can now invest in cryptocurrencies, startups, and tokenized real-world assets all because of blockchain. The next challenge then is to encourage adoption of these investment vehicles. Cryptocurrencies are getting the most attention as the value of these coins continue to move up and more countries accept these as legal tenders. ICOs are also generating much interest as startups come up with interesting ideas on using blockchain to drive business. These new blockchain trading platforms, while still unproven, offer much promise. “My dream is to make NASDAQ on Blockchain with a wider range of tradable assets and a dramatic reduction of listing costs, settlement time, and transaction costs,” said LAToken CEO Valentin Preobrazhenskiy.


How Machine Learning Is Helping Morgan Stanley Better Understand Client Needs

So Morgan Stanley’s wealth management business unit has been working for several years on a “next best action” system that FAs could use to make their advice both more efficient and more effective. The first version of the system, which used rule-based approaches to suggesting investment options, is being replaced by a system that employs machine learning to match investment possibilities to client preferences. There are far too many investing options today for FAs to keep track of them all and present them to clients. And if something momentous happens in the marketplace — for example, the Brexit vote and the resulting decline in UK-based stocks — it’s impossible for FAs to reach out personally to all their clients in a short timeframe.


Rise of the chatbot: security concerns

As chatbots become increasingly intelligent, they are being equipped with additional capabilities, including the ability to process financial transactions. If you are comfortable using Facebook Messenger or WhatsApp to chat with your friends, then using it to make payments or check your account balance by just a matter of writing a message, versus having to open a new internet banking app, makes sense. This type of transaction through chatbots is already being seen in the US where Uber is integrated into Facebook Messenger, which added a payments solution for businesses in late 2016, meaning users can order and pay for their Uber through a simple message.


The core ethics of data analytics

It was not possible to be prescriptive about how data should be used as that risked limiting both the benefits to the consumer or citizen, and the benefits to the corporation or Government using the data, Mr Sherman said. Regulation would also struggle to keep pace with technology developments he said, and the looming impact of big data, artificial intelligence (AI) and machine learning on privacy was noted by a series of speakers at the conference. Simon Entwistle, deputy commissioner of the UK Information Commissioner’s Officer, noted that as machine learning and AI took hold it would be increasingly difficult to know how people’s data was being used, or whether deidentified data was being transformed into personal data. “Taking an ethical approach is more important than ever – to go beyond compliance to the underlying legal obligations,” he said.


McKinsey argues how the current wave of AI is ‘poised to finally break through’

Robotics and speech recognition are two of the most popular investment areas. Investors are most favoring machine learning startups due to quickness code-based start-ups have at scaling up to include new features fast. Software-based machine learning startups are preferred over their more cost-intensive machine-based robotics counterparts that often don’t have their software counterparts do. As a result of these factors and more, Corporate M&A is soaring in this area with the Compound Annual Growth Rate (CAGR) reaching approximately 80% from 20-13 to 2016. The following graphic illustrates the distribution of external investments by category from the study. These industries are known for their willingness to invest in new technologies to gain competitive and internal process efficiencies.


The Art of Crafting Architectural Diagrams

As Philippe Kruchten said, "architecture is a complex beast. Using a single blueprint to represent architecture results in an unintelligible semantic mess." To document modern systems we cannot end up with only one sort of diagram, but when creating architectural diagrams it is not always straightforward what diagrams to choose and how many of them to create. There are multiple factors to take into consideration before making a decision; for example, the nature and the complexity of the architecture, the skills and experience of the software architect, time available, amount of work needed to maintain them, and what makes sense or is useful for meeting stakeholders concerns. For example, a network engineer will probably want to see an explicit network model including hosts, communication ports and protocols;


Blockchain tokens may be the future of finance — if regulators allow it

Token offerings signal a sea change in the way that blockchain startups and software protocols are being financed. Beyond upsetting the balance of the investor ecosystem, though, this new funding model, and the projects taking advantage of it, may herald the dawn of something even more radical: a decentralized internet powered by applications that blur the line between owners and users. Inevitably, some observers are calling it an overheated market. Some are even comparing it to the dot-com bubble of the early 2000s. Most distressing to traditional investors, and even to early adopters of bitcoin, is the fact that some token projects have raised millions of dollars on the basis of little more than a white paper and a website. The Securities and Exchange Commission recently raised the barrier to entry for American entrepreneurs and investors, and risks putting the kibosh on such innovation altogether.



Quote for the day:


"Learning to ignore things is one of the great paths to inner peace." -- Robert J. Sawyer


Daily Tech Digest - August 04, 2017

Edge computing could push the cloud to the fringe

For some Internet of Things devices, like connected video cameras, it also ceases to be practical to send the data to the cloud just because of the pure volume involved. As an example, he points out that there are already a half a billion connected cameras in place today with a billion expected to be deployed worldwide by 2020. As he says, once you get over 1080p quality, it really ceases to make sense to send the video to the cloud for processing, at least initially, especially if you are using the cameras in a sensitive security zone like an airport where you need to make decisions fast if there is an issue. Then there’s latency. Talla echoes Levine’s thinking here, saying machines like self-driving cars and industrial robots need decisions in fractions of seconds, and there just isn’t time to send the data to the cloud and back.


Much Ado About Blockchain

The fact that government authorities have become so active in blockchain experimentation means that we will soon reach a point where corporations will be expected to interact with those authorities using the distributed ledger technology. Whether through basic blockchain-based registration processes or more elaborate data-transfer protocols, corporations need to start thinking about whether or not their existing technologies and ERP systems can support this type of dialogue. From a financial perspective, the C-suite also needs to think about the competition. Ultimately, the goal of blockchain is to reduce administrative costs. Companies that get out ahead, finding ways to practically leverage the blockchain to make their operations more efficient, will have an edge on their competition when it comes to annual operating costs.


Measuring Data Science Business Value

Just as any other department uses operational metrics to measure the efficiency and effectiveness of their organizations, data science needs to do the same. Sales teams use funnel metrics to measure how effectively their teams are converting prospects down the funnel to closed-won. Engineering teams use sprint burndown and team velocity to measure how efficiently their teams complete work in a given amount of time. Monitoring leading indicators allow these teams to quickly adjust before a revenue number is missed or a product feature is delayed. For data science teams, it is important to identify critical information like when a data scientist is spending precious hours reproducing something someone else has already done. Or when a business stakeholder has not been looped in to give feedback on a project before it is delivered as “done”.


It's time for the financial sector to embrace an AI-led future

Large commercial banks have several back-office processes that AI’s operating models are transforming. Operations such as reconciliation, consolidation and credit risk management, can be completed with robotic process automation (RPA), which along with machine learning can be fully automated. Banking functions that are central to operations such as the quarterly closing and reporting of earnings can be accomplished in real time with AI, allowing for greater accuracy and quicker adjustments. A case in point is the Machine Learning program called COIN used by JPMorgan Chase & Co, one of the biggest banks in the United States. The AI program takes just a few seconds to review commercial loan agreements as compared to the 360,000 hours each year that a team of lawyers and loan officers would take to complete.


Internet of things and blockchains: help or hindrance?

The technology is still immature and likely to transition quickly, and fierce competition from rival distributed ledger platforms is a threat. Moreover, the computing power needed to achieve consensus of distributed transactions is expensive, and more cost-efficient models need to be found. With the likes of BP and Microsoft opting for ethereum, there also needs to be more standardised regulation and stability of the cryptocurrencies so larger enterprises can comfortably roll out the technology for customer use. Blockchains may be able to provide an additional layer of security and operational efficiency to existing IoT models, but the technology is not necessarily needed in every use case. In fact, there are IoT platforms already in place that implement supply chain traceability, monitor product provenance, and ensure product authenticity.


Mark Zuckerberg and Elon Musk's debate over artificial intelligence: will robots go rogue?

“If we’re lucky, they’ll treat us as pets,” says Paul Saffo, a consulting professor at Stanford University, “and if we’re very unlucky, they’ll treat us as food.” But there are academics, including Noam Chomsky, who don’t believe computers will ever be able to attain that level of intelligence. Yes, they might be able to learn to speak Chinese, but will they ever truly understand Chinese, or merely simulate understanding? These questions are all bound up with concepts of intelligence, sentience, self-awareness and consciousness, things that remain stubbornly impervious to scientific analysis. Zuckerberg’s angle on AI, shared by other industry figures such as Google’s Ray Kurzweil, is that super-smart micro-intelligences offer great benefit to mankind and will always remain under our ultimate control.


From barter to blockchain: A history of money

The world is connected through the internet now; it is at everyone’s fingertips. Computers make us more efficient at what we do than we ever were. What used to take us days takes minutes now. We couldn’t make more time, so instead we make more out of the time we have. Computing power is such an integral part of our life that it has become as scarce and valuable as gold was to our ancestors. And when smart people asked the profound question: “Can we make a currency that is backed by computing power?,” the answer was cryptocurrencies and blockchains. If you don’t yet understand how blockchains work, I’ve written the ultimate guide in plain English to help you understand the concept.


How to get started with machine learning

Not surprisingly, software engineering teams are generally not well-equipped to handle these complexities and so can fail pretty seriously. “A good, solid, and comprehensive platform that lets you scale effortlessly is a critical component” to overcoming some of this complexity, Dunning says. “You need to focus maniacally on establishing value for your customers and you can't do that if you don't get a platform that has all the capabilities you need and that will allow you to focus on the data in your life and how that is going to lead to customer-perceived value.” Enter TensorFlow. Open source, a common currency for developers, has taken on a more important role in big data. Even so, Dunning asserts that “open source projects have never really been on the leading edge of production machine learning until quite recently.”


Social Engineering: The Basics

Social engineering has proven to be a very successful way for a criminal to "get inside" your organization. Once a social engineer has a trusted employee's password, he can simply log in and snoop around for sensitive data. With an access card or code in order to physically get inside a facility, the criminal can access data, steal assets or even harm people. Chris Nickerson, founder of Lares, a Colorado-based security consultancy, conducts 'red team testing' for clients using social engineering techniques to see where a company is vulnerable. Nickerson detailed for CSO how easy it is to get inside a building without question. In one penetration test, Nickerson used current events, public information available on social network sites, and a $4 Cisco shirt he purchased at a thrift store to prepare for his illegal entry.


Excel 2016 cheat sheet

If you're working in a workbook you've saved in OneDrive or SharePoint, you'll see a new button on the Ribbon, just to the right of the Share button. It's the Activity button, and it's particularly handy for shared workbooks. Click it and you'll see the history of what's been done to the spreadsheet, notably who has saved it and when. To see a previous version, click the "Open version" link underneath when someone has saved it, and the older version will appear. And there's a very useful difference in what Microsoft calls the backstage area that appears when you click File on the Ribbon: If you click Open, Save or Save As from the menu on the left, you can see the cloud-based services you've connected to your Office account, such as SharePoint and OneDrive. Each location now displays its associated email address underneath it.


Here Are 306 Million Passwords You Should Never Use

The 306 million passwords encompass more than 1 billion compromised accounts. The data comes from rich sources, including the Exploit.in and Anti-Public lists. Both of those lists were massive mash-ups of stolen data covering just over 1 billion email addresses. Hunt calls the service Pwned Passwords. Service providers can use the data in their back-end systems with the aim of improving the state of password security. Hunt has made a 6GB file available with the data. For example, if someone is registering a new account, a service provider can compare the chosen password and warn the individual that the password has been compromised before. At that point, the person can be strongly encouraged or forced to choose a more secure password.



Quote for the day:


"Strategy is not really a solo sport  even if you're the CEO." -- Max McKeown


Daily Tech Digest - August 03, 2017

Rebooting Cybersecurity

Certainly, compliance frameworks and programs help to establish the minimum standards for security and give a company a checkmark during audits, but frameworks and programs often fail to protect a company from breaches. Having frameworks and programs will not be sufficient if they do not reflect real-world dynamics and fail to provide needed monitoring, detection, responses, or protection. ... Only a fifth of respondents would invest in mitigating financial loss, and just 22 per cent would invest in cybersecurity training. ... Protecting a company requires an end-to-end approach that considers threats across the spectrum of the industry-specific value chain and the company’s ecosystem. Business exposure needs to be identified and minimized, with a focus on protecting priority assets.


Why SSL/TLS attacks are on the rise

As enterprises get better about encrypting network traffic to protect data from potential attacks or exposure, online attackers are also stepping up their Secure Sockets Layer/Transport Layer Security (SSL/TLS) game to hide their malicious activities. In the first half of 2017, an average of 60 percent of transactions observed by security company Zscaler have been over SSL/TLS, the company’s researchers said. The growth in SSL/TLS usage includes both legitimate and malicious activities, as criminals rely on valid SSL certificates to distribute their content. Researchers saw an average of 300 hits per day for web exploits that included SSL as part of the infection chain. “Crimeware families are increasingly using SSL/TLS,” said Deepen Desai, senior director of security research at Zscaler.


Five New Threats To Your Mobile Device Security

Today, mobile devices are coming under increasing attack – and no one is immune. Some 20 percent of companies surveyed by Dimensional Research for Check Point Software said their mobile devices have been breached. A quarter of respondents didn’t even know whether they’ve experienced an attack. Nearly all (94 percent) expected the frequency of mobile attacks to increase, and 79 percent acknowledged that it’s becoming more difficult to secure mobile devices. “They’re starting now to become more aware of the possible impact,” says Daniel Padon, mobile threat researcher at Check Point. “Real, state-level malware and the capability of such malware, together with large campaigns affecting millions and millions of devices, such as Gooligan and Hummingbad, are just the tip of the iceberg.”


Nvidia and Remedy use neural networks for eerily good facial animation

As showcased at Siggraph, by using a deep learning neural network—run on Nvidia's costly eight-GPU DGX-1 server, naturally—Remedy was able to feed in videos of actors performing lines, from which the network generated surprisingly sophisticated 3D facial animation. This, according to Remedy and Nvidia, removes the hours of "labour-intensive data conversion and touch-ups" that are typically associated with traditional motion-capture animation. Aside from cost, facial animation, even when motion captured, rarely reaches the same level of fidelity as other animation. That odd, lifeless look seen in even the biggest of blockbuster games often came down to the limits of facial animation. Nvidia and Remedy believe its neural network solution is capable of producing results as good, if not better, than what's produced by traditional techniques.


What’s new in Angular 5: easier progressive web apps

Its features include: An emphasis on making it easier to build progressive web apps, so apps can be cached in the browser; A build optimizer that makes the application smaller by eliminating unnecessary code. and Making Material Design components compatible with server-side rendering. The progressive web apps concept, the product of a joint effort between Google and Mozilla, is about enabling development of browser-based apps that offer a superior, native-like experience. Supporting progressive web apps in Angular today requires a lot of expertise on the developers’ part; version 5 is intended to make usage easier. “We’re shooting to try and make progressive web apps something that everyone would use,” said Brad Green, a Google engineering director.


Digital Crime-Fighting: The Evolving Role of Law Enforcement

As the cybercrime landscape continues to evolve, methods of policing it must change as well. The increasing number of cyber attacks propagated by everyone from nation-state actors to average criminals is blurring lines between cybersecurity and public safety, ultimately causing a shift in the role of government and law enforcement in protecting against these threats. Verizon's 2017 Data Breach Investigations Report notes, "In addition to catching criminals in the act, security vendors, law enforcement agencies and organizations of all sizes are increasingly sharing threat intelligence information to help detect ransomware (and other malicious activities) before they reach systems." Using their own behind-the-scenes collaboration venues, threat actors have also become increasingly well armed and well informed.


Cyber security is now mainstream business

Unfortunately, those caught in the middle of the storm are able to understand it more profoundly than the observers. While there was unprecedented large-scale impact due to the recent ransomware, it was minuscule compared to the computer infrastructure of the world. Which means that the majority of individuals and organisations would continue to remain unaware of the need for steps they should take to build an optimal cyber defence against cyber threats. That is the biggest bane of the cyber security industry and profession. The second observation is that the organisations that were impacted are building and strengthening controls around the risks of the recent ransomware attacks. That is important, but when you build cyber defence, you should consider all the possible risks to your business and build a security programme that works on mitigating these risks comprehensively.


7 unexpected ways collaboration software can boost productivity

Collaboration software can enable organizations to plan for crises and emergencies, said Michelle Vincent, collaboration and training officer for information services at Mercy Ships. The organization uses private hospital ships to provide free surgeries to residents of developing nations. Mercy Ships uses HipChat “to connect our various stakeholders during crisis drills,” Vincent said. “Hopefully, we'll never have a fire or other such emergency on the ship. But we rely on drills to keep us ready, and HipChat is a useful tool to keep us connected in real time for that purpose.” Emergency drills on the ship are performed almost every week, Vincent said, while a crisis management team’s drills involving multiple locations usually take place every quarter.


Amazon Echo hacked to allow continuous remote eavesdropping

The fact that physical access is required makes it unlikely it will happen to your Echo. It also works only on 2015 and 2016 editions of Amazon Echo devices, as they had a rubber base that can be popped off to reveal 18 debug pads. Neither the 2017 Echo model, nor the Amazon Dot, are vulnerable. If a knowledgeable attacker did have access to an older Echo, Barnes noted that rooting it is “trivial.” After rooting the Echo, the researchers wrote a script to continuously grab the raw microphone audio data. Barnes called the physical access requirement a “major limitation.” The how-to is out there now, so maybe that should give you pause before you purchase a second-hand Echo.


Cloud Data Auditing Techniques with a Focus on Privacy and Security

Nowadays, with the help of cryptography, verification of remote (cloud) data is performed by third-party auditors (TPAs).2TPAs are also appropriate for public auditing, offering auditing services with more powerful computational and communication abilities than regular users.3 In public auditing, a TPA is designated to check the correctness of cloud data without retrieving the entire dataset from the CSP. However, most auditing schemes don’t protect user data from TPAs; hence, the integrity and privacy of user data are lost.1 Our research focuses on cryptographic algorithms for cloud data auditing and the integrity and privacy issues that these algorithms face. Many approaches have been proposed in the literature to protect integrity and privacy; they’re generally classified according to data’s various states: static, dynamic, multiowner, multiuser, and so on.



Quote for the day:


"You're not always going to be successful, but if you're afraid to fail, you don't deserve to be successful." -- Charles Barkley


Daily Tech Digest - August 02, 2017

Procurement: looking ahead to a digital future

Technology is lifting the role of procurement, providing services that are critical to maintaining corporate reputation, not to mention legality. With procurement functions frequently stretching across the globe, companies need full visibility all the way to the end of a supply chain to guarantee it is free of issues such as modern-day slavery or bribery and corruption. “Automated procurement systems can help map connections in a supply chain; for a CEO, who is legally responsible for the elimination of poor processes, that puts procurement in a different light,” says Mr Coulcher. Using technology, such as the blockchain, companies can validate supply chains, bringing a level of transparency that has not always been possible. Last autumn, BHP Billiton, the mining company, announced plans to use ethereum blockchain to improve its supply chain processes.


What Is IT Governance? A Formal Way To Align IT & Business Strategy

Organizations today are subject to many regulations governing the protection of confidential information, financial accountability, data retention and disaster recovery, among others. They're also under pressure from shareholders, stakeholders and customers. To ensure they meet internal and external requirements, many organizations implement a formal IT governance program that provides a framework of best practices and controls. Both public- and private-sector organizations need a way to ensure that their IT functions support business strategies and objectives. And a formal IT governance program should be on the radar of any organization in any industry that needs to comply with regulations related to financial and technological accountability.


Design Thinking 101

Each phase is meant to be iterative and cyclical as opposed to a strictly linear process, as depicted below. It is common to return to the two understanding phases, empathize and define, after an initial prototype is built and tested. This is because it is not until wireframes are prototyped and your ideas come to life that you are able to get a true representation of your design. For the first time, you can accurately assess if your solution really works. At this point, looping back to your user research is immensely helpful. What else do you need to know about the user in order to make decisions or to prioritize development order? What new use cases have arisen from the prototype that you didn’t previously research?


Why ex-employees may be your company's biggest cyberthreat

Ex-employees are increasingly a cybersecurity risk, Maxim noted: In June, Dutch web host Verelox experienced a major outage of all of its services after most of its servers were deleted by an ex-employee, according to the company. And in April, the US-based Allegro Microsystems sued an ex-IT administrator for allegedly installing malware that deleted critical financial data. So why don't companies take away this access immediately? For one, the process can be time consuming: 70% of IT decision makers surveyed said it can take up to an hour to deprovision all of a single former employee's corporate application accounts. For another, IT and HR do not often work together, said Al Sargent, senior director at OneLogin. "This is a problem, because HR has the single source of truth for which employees are at the company and which are not, whereas IT controls access to the applications," he added.


State of Cybercrime 2017: Security events decline, but not the impact

Companies are spending more on IT security, with an average budget increase of 7.5 percent. Ten percent of respondents reported an increase of more than 20 percent. The bulk of that money is being spent on new technologies (40 percent), but companies are paying for knowledge, too, in the form of audits and assessments (34 percent), adding new skills (33 percent), and knowledge sharing (15 percent). Respondents said they were investing in redesigning their cybersecurity strategy (25 percent) and processes (17 percent) as well. Speaking of cybersecurity strategy, an amazing 35 percent of respondents said that a cyber response plan was not part of it. The good news is that 19 percent planned to implement a plan within the next year.


Kubernetes as a service offers orchestration benefits for containers

Canonical makes Ubuntu, a leading free and open source Linux server and desktop OS distribution. The Canonical Kubernetes-as-a-service distribution is a packaged deployment that stitches together additional Canonical open source projects surrounding Kubernetes, such as Juju, an application modeling framework that uses Charm scripts to simplify Kubernetes infrastructure builds; Conjure-up orchestrates these Juju script deployments. This distribution runs on various infrastructure environments, including local workstations, bare-metal servers, AWS, Google Compute Engine, Azure, Joyent and OpenStack. Canonical partnered with Google, Kubernetes' original developer, to maintain its distribution, with the aim to simplify and standardize Kubernetes clusters on just about any conceivable environment.


Black Hat 2017: Insightful, but too much hype

The industry has become far too obsessed on the zero-day problem (i.e. zero-day exploits) and isn't paying enough attention to eliminating all the manual tasks and busy work we do as cybersecurity professionals. Oh, I agree that zero-days are a problem, but these attacks are the exception. We need to get better at bread-and-butter cybersecurity operations with improved processes, automation and orchestration. In other words, people REMAIN the weakest link of the cybersecurity chain. Addressing this problem should be a high priority for all CISOs. ... New security analytics tools are expanding and challenging SIEM platforms. Software-defined tools are pushing out tried-and-try network security controls.


Machine Learning Comes To Your Browser Via Javascript

The most prominent advantages of TensorFire’s approach are its portability and convenience. Modern web browsers run on most every operating system and hardware platform, and even low-end smartphones have generous amounts of GPU power to spare. Much of the work involved in getting useful results from machine learning models is setting up the machine learning pipeline, either to perform the training or to deliver the predictions. It is very useful to boil much of that process down to just opening up a web browser and clicking something, at least for certain classes of jobs. Another advantage claimed by TensorFire’s creators is that it allows the deployment of predictions to be done entirely on the client. This won’t be as much of an advantage where both the trained model and the data are already deployed to the cloud.


Bill Would Beef Up Security for IoT Wares Sold to US Gov't

"This bill deftly uses the power of the federal procurement market, rather than direct regulation, to encourage Internet-aware device makers to employ some basic security measures in their products," Jonathan Zittrain, co-founder of Harvard University's Berkman Klein Center for Internet and Society, said in a statement announcing the bill's introduction. Security technologist and author Bruce Schneier, also in a statement, sees the legislation as a way to motivate vendors to make the investments needed to secure their IoT offerings. "The market is not going to provide security on its own, because there is no incentive for buyers or sellers to act in anything but their self-interests," says Schneier, who also is a Harvard Kennedy School of Government fellow and lecturer.


How to use Redis for real-time stream processing

Redis has become a popular choice for such fast data ingest scenarios. A lightweight in-memory database platform, Redis achieves throughput in the millions of operations per second with sub-millisecond latencies, while drawing on minimal resources. It also offers simple implementations, enabled by its multiple data structures and functions. In this article, I will show how Redis Enterprise can solve common challenges associated with the ingestion and processing of large volumes of high velocity data. We’ll walk through three different approaches (including code) to processing a Twitter feed in real time, using Redis Pub/Sub, Redis Lists, and Redis Sorted Sets, respectively. As we’ll see, all three methods have a role to play in fast data ingestion, depending on the use case.



Quote for the day:


"The most rewarding things you do in life are often the ones that look like they cannot be done." -- Arnold Palmer


Daily Tech Digest - August 01, 2017

Understanding the critical role of 'first receiver' in IoT data

The role of the first receiver is first and foremost to allow for the effective leveraging of the utility value of the IoT data. At the center of this is the role of governance and data primacy. The first receiver assumes, but does not necessarily dictate, that the owner of the IoT data will be the enterprise that owns (or minimally controls) the IoT subsystems. Noting that a single record generated from a single sensor message can be utilized by a variety of constituents, internal or external, in a variety of different ways, the aim is to securely and cost-effectively provide a mechanism for allowing the right people/organizations to access and use the right data in the right place at the right time. While the first receiver should also have several other functions associated with it, the key is enabling the right architecture for leveraging the underlying data.


The most valuable cloud computing certifications today

As the cloud becomes more critical to IT and the business at large, demand for cloud skills will only grow. But proving you have the right skills and knowledge in a competitive job market can be difficult. If you’re looking for an extra edge in landing a new job or promotion, cloud certification can be a great option. Certifications measure knowledge and skills against industry benchmarks to help you prove to employers that you have the right mix of cloud skills, knowledge, and expertise. If you’re looking for more general, across-the-board knowledge, a vendor-neutral certification can provide a broad overview of key concepts and foundational expertise. If you’re looking to specialize, whether in your current job or because you’re angling to land a new role, consider specializing in one or more vendor-specific certifications, such as AWS or VMware.


Public Company to Convert Bitcoin to Stock in First-of-Its-Kind Fundraise

Since first posting the terms of its convertible bitcoin loan online, DigitalX CEO Leigh Travers told CoinDesk he's been contacted by several "investor relations departments of major blockchain companies" with questions about how they can do the same. It turns out, it's not actually that difficult. But, to understand how the bitcoin loan was executed, it's important to grasp a bit about DigitalX's unusual background. Back in March 2014, DigitalX became Australia’s first listed bitcoin company following the reverse takeover of "dying oil and gas firm" Macro Energy. The cash-rich company acquired DigitalX (then called Digital CC), but gave more shares to the acquiring company than the original shareholders had, resulting in a shift of control.


The Next Big Technology Could Be Nanomaterials

Some researchers think nanomaterials could be useful in mitigating the greenhouse effect and thus slowing or stalling climate change. Scientists at the University of Texas at Dallas have developed a honeycomb-shaped structure built from nanoscale molecules that can trap carbon emissions in the atmosphere. To keep gases from leaking out of the device, the researchers capped its outer surface with vapors of a one-nanometer molecule called ethylenediamine. This protective layer was an attempt to mimic the way bees seal parts of their hives with wax. Another application, developed at Rice University, uses sheets of graphene to recycle waste carbon dioxide into ethylene and ethanol. In a lab test, graphene showed the potential to reduce carbon dioxide by up to 90 percent, converting 45 percent of greenhouse gases into clean fuel. Potential healthcare uses include silicon nanowires that can be absorbed by human cells.


Inside Wells Fargo's cybersecurity war room

In the past, banks have primarily run paper or desktop cyberattack simulations that focused on who would call whom in the event of a cybercatastrophe. “It’s now emerged to a cyber range, a cybersimulation that allows those cyberwarriors to respond to real-life infections and malware, strengthen their skills, improve the controls in their environment and get ready for what may come one day from a malicious or nation-state actor,” Baich said. “In a cyber range, you take real action and, since it's a virtual environment, it will not impact production systems.” Most large banks are using cyber ranges. But the technique has yet to reach the midtier and smaller banks. Chris Thompson, senior managing director and head of financial services cybersecurity and resilience at Accenture Security, said many organizations can’t afford it.


Developing The Next Generation Of Transport

First, the vehicles are becoming more complicated with many more interconnected systems that all have to be operated precisely to deliver the performance and response demanded by customers. To deal with this, the detail of the models being used on the HiL test rigs needs to be increased so that they cover all the vehicle systems including the engine, electric motors, cooling, suspension and so on. These complex multi-domain models need to run in real time with the appropriate level of detail to feed the control systems. The second challenge is that to make a vehicle autonomous, it must be able to see and interpret its surroundings and this is typically done through a range of sensors including cameras, radars, LiDARs (light detection and ranging) and ultrasound sensors.


The Power Of Digital Transformation In A Data-Driven World

In a data-driven world, an organization can rethink many of its old assumptions. When Airbnb, for example, broke away from processes and focused on data, it realized the company doesn’t need to own physical assets (hotels). Aspects of a hotel business that made it competitive in a process-driven world get stood on their head in a data-driven world. People who have apartments in great locations are a different option than hotels and provide different value in the customer experience. In rethinking old assumptions about a business, we can get to where value or opportunities emerge in different places than in a process-defined world. Another example of rethinking assumptions in a data-driven world is the human resources processes.


Data is eating the world: How data is reshaping business in the networked economy

The first thing to understand as we transition to a world dominated by data and networks (networks being any collection of people, nodes or data that is linked together) is this will not be a bigger version of mobile. It is fundamentally different. And requires a new sensitivity and instinct for how connected systems work. The recent cyber/data attack on the NHS in the UK (and others) point to a fracture in the old ideas and institutions we have come to rely on. Data has now become the great fault line of business, and almost everything we know and have learnt about digital, technology, and in many cases commerce, must be left behind us. We have heard a lot about digital transformation over the past 10 years, as companies grapple to maintain relevance in a mobile-dominated world.


Culture for a digital age

Executives must be proactive in shaping and measuring culture, approaching it with the same rigor and discipline with which they tackle operational transformations. This includes changing structural and tactical elements in an organization that run counter to the culture change they are trying to achieve. The critical cultural intervention points identified by respondents to our 2016 digital survey—risk aversion, customer focus, and silos—are a valuable road map for leaders seeking to persevere in reshaping their organization’s culture. The remainder of this article discusses each of these challenges in turn, spelling out a focused set of reinforcing practices to jump-start change.


Adopting AI in the Enterprise: Ford Motor Company

The most common AI applications involve direct driver interaction, including advisory systems that monitor acceleration and braking patterns to provide on-board evaluations of a driver’s preferences and intentions for different purposes—characterization of the driver, advice for fuel-efficient driving and safe driving, auto-selecting the optimal suspension and steering modes, simplifying the human-machine interface by estimating the most likely next destination, and preferred settings of the climate control, etc. These systems use traditional AI methods—rule-based, Markov models, clustering; they do not require special hardware. One of their distinctive features is to be intelligent enough to identify the level of acceptance of provided recommendations, and avoid drivers’ annoyance.



Quote for the day:


"What is important for a leader is that which makes him a leader. It is the needs of his people." -- Frank Herbert