Get Even More Visitors To Your Blog, Upgrade To A Business Listing >>

Daily Tech Digest - February 13, 2017

Approach an off-premises systems management service with caution

There is one massive problem for many organizations. An off-premises systems management setup requires that the IT organization allow the management service to drill straight through the firewall to access sufficient information about operations to rapidly and effectively identify issues and take remedial action. This collection method goes right through to the heart of the IT platform. A lot of monitoring can occur through simple network management protocol (SNMP) and other data sources that pose little security threat. However, while scavenging log files for individual items of IT equipment, a systems management service could unearth data that has a commercial nature to it. In some cases, IT equipment carries username and password pairs.


Internet of Things: CIOs are getting ready for the next big revolution

"Analytics and Machine Learning are the most important components for gaining efficiency savings," he says. "IoT affords cross-industry and cross-silo interaction at a data level. CIOs must remember that data is ultimately platform independent and data science is also now available as a service." ... While predictive analytics and machine learning have been important tools in IT for many years, Ridley says the key difference today is the democratisation of the technology, particularly as these tools can be deployed via the cloud. "Easy-to-use products like Databricks and Microsoft's Azure Machine Learning Studio are doing for data scientists what the web did for developers and designers 20 years ago," he says. "These features made creating a data science team easier in my previous role as director of technology at reed.co.uk because the tools that the staff used and the support that they needed were more readily available."


Does AI Make Self-Driving Cars Less Safe?

Using the programmed code, a machine learning system behaves in a given way whenever it is exposed to the automated system. The case is different on the roads. The computer will be required to memorize images that keep changing. It’s hard for engineers to code such information. For instance, it may be difficult to determining when to stop or to proceed. The machine will memorize the features like people crossing and whenever similar objects are seen it will stop. But individuals and features keep changing in different locations. The machine will learn to act on concepts rather than judgment. For instance, if during a test the machine learning system recorded images of people wearing red colored clothes, it will only stop on seeing people with red colors. Hence people with different colors are likely to be run on. Likewise, the fully self-driven vehicle may stop paralyzed at a stop, unable to decide.


The power of mobile apps: Human services from the citizen’s perspective

The benefits of mobile technology are considerable, but for apps to be effective governments must design them from the perspective of the user, rather than grafting them onto established processes in individual departments. ... Apps work best when the number of screen swipes and taps can be kept to a minimum, for example, and it’s essential to build in feedback. Research has shown in particular that people in crisis may not trust technology that removes face-to-face interactions.6 They want the reassurance of seeing their documents delivered into the appropriate hands, so apps that provide receipt notices can help them view the technology as reliable. ... Design considerations such as these are part of the essential process of bringing citizens on board with technological innovation. Forward-thinking governments around the globe are using behavioral science techniques to determine how users engage with new apps in real-life contexts.


The Three Tsunamis of Digital Transformation

Change is hard, and many of us procrastinate, make excuses or lag behind. Today, we simply can't. Digital technologies are no longer "nice-to-have" tools of the business - today they are the business. Digital laggards are already finding their markets disrupted and their abilities to compete overturned. As they desperately try to outrun the Darwinian effect of their slow responses, they are faced with not one but three periods - or ages - of digital transformation to navigate - disruptive transformation, hyper-digital transformation and ubiquitous transformation. Understanding these three ages, and when they will emerge, is critical for business success. Some may argue digital transformation started 70 years ago with ENIAC, the first commercially available computer, while others argue it started with the Internet.


Cylance accuses AV-Comparatives and MRG Effitas of fraud and software piracy

When questioned about the Symantec test, Cylance argued it was flawed form the start, as AV-Comparatives and MRG Effitas were essentially using pirated software. As such, they were not able to access the cloud-based console or enable all the features in CylancePROTECT. "We have no records or invoices showing that MRG Effitas, AV-Comparatives or any person associated with these companies purchasing CylancePROTECT," said Chad Skipper, VP of industry relations and product testing at Cylance. Skipper also noted a lack of contact between the labs and the fact their product was tested with a default configuration. According to Skipper, testing in a default state will see most of the features in CylancePROTECT turned off.


Blockchain: The Invisible Technology That's Changing the World

"Today, we rely entirely on big intermediaries; middlemen like banks, government, big social media companies, credit companies, and so on to establish trust in our economy," Tapscott continued. "These intermediaries perform all the business and transaction logic of every kind of commerce, from identification and authentication of people through to clearing, settling, and record-keeping… they capture our data, which means we can't monetize or use it to better manage our lives, and our privacy is being undermined… so what if there were not only an Internet of information, but an Internet of value. Some kind of vast, global, distributed ledger running on millions of computers and available to everybody, and where every kind of asset from money to music could be stored, moved, transacted, exchanged, and managed, all without powerful intermediaries.


How to use Microsoft's Paint 3D: Creating cool 3D scenes has never been so much fun

Though it shares a name, Paint 3D isn’t really like the familiar Microsoft Paint app at all. Paint 3D’s entire purpose is to create fun, cartoony 3D objects and scenes—and share them. A major part of Paint 3D’s appeal is the Remix 3D community, where you and other members can import, edit, then share digital objects and ideas, taking from and providing inspiration to your fellow digital artists. Chances are that you haven’t seen Paint 3D yet—but you will. Microsoft first launched the app in conjunction with the Windows 10 Creators Update and Surface Studio announcements last fall. Since then, the app has remained accessible to Insiders only as a preview, before its more general release later this spring. If you’re running an Insider build, there’s really no reason not to download it from the Store and try it out. We’ll show you how!


Special Report: Preventing Cybersecurity Losses

Preventing cyber risks requires finance chiefs to look far beyond the realm of the techies. “CFOs need to pause and broaden their perspective, examine cyber-related business risk in the areas of physical security and in industrial controls as well,” according to Ingram. That’s especially so, given that the work of hackers can have powerful consequences in the physical world. Indeed, cyber attacks have struck utilities and defense and aerospace contractors, Ingram notes. Another non-tech area of cyber risk is mergers and acquisitions. Citing the threat to the $4.8 billion Verizon offer to acquire Yahoo represented by the massive data breaches that struck Yahoo, attorney Craig A. Newman writes that the breaches “underscore an increasingly complex, specialized, and sophisticated aspect of M&A transactions: cybersecurity due diligence.”


How to become an IoT developer: 6 tips

The Internet of Things (IoT) industry is booming—in 2017, the number of connected devices in use worldwide will reach 8.4 billion, outnumbering people, according to a recent Gartner report. By 2020, more than 20.8 billion IoT devices will be in use, Gartner predicts. As connected homes, cars, and offices become more mainstream, more developers are needed to ensure that devices operate properly and securely. The term "IoT developer" remains broad, said Greg Gorman, director of the IoT Developer Ecosystem at IBM. "There are a lot of discipline areas that are in play, including security, networking, systems engineering, cloud programming, and hardware device programming," Gorman said. "It pays to be multilingual so that you can be flexible and play many different roles in the team."



Quote for the day:


"A bug in the code is worth two in the documentation." -- ‏@UpSearchSQL




This post first appeared on Tech Bytes - Daily Digest, please read the originial post: here

Share the post

Daily Tech Digest - February 13, 2017

×

Subscribe to Tech Bytes - Daily Digest

Get updates delivered right to your inbox!

Thank you for your subscription

×