June 21, 2023

June 21, 2023

India’s digital transformation could be a game-changer for economic development

India currently has a data-fiduciary-centric model. Individuals or small businesses must go to the original keeper of data to access their data. This inhibits the use of data for the financial empowerment of individuals. The current method of storing financial data across institutions and companies is also inefficient, resulting in the use of notarized hard copies, PDFs, screen scraping, password sharing, etc., all of which pose a threat to individual privacy. Accessing and sharing information can be difficult because of the varied formats. This forces individuals and institutions to rely on patchwork solutions. ...?AAs can be thought of as traffic police between Financial Information Users (FIUs) and Financial Information Providers (FIPs), with users having complete control over the flow of information. The introduction of AA architecture could revolutionize how financial data is shared, similar to the impact UPI has had on money transfers. The AA ecosystem is cross-sectoral, with customers at the center. AAs provide a secure interface that allows users to consent to share private and sensitive data. This democratizes data use and sharing, enabling FIUs to request users' financial information.


8 ways to detect (and reject) terrible IT consulting advice

Recommendations are great, but they don’t automatically turn into solutions. “Most of the consultant’s dialogue should be repeating back to you the problem they’re solving,” advises Bill Carslay, senior vice president and general manager of professional services at IT support services firm Rimini Street. “The resulting solution should be directly related to the problem as it’s defined in your terms, and should follow the steps and phases your organization is willing to take.” When a consultant grabs onto a common IT challenge and quickly describes how they will solve it, it’s likely the solution won’t fully address the very specific problem an organization may be facing. “Keep in mind that one size doesn’t fit all, and be on the lookout for recommendations that fit or augment the parameters you’ve set,” Carslay suggests. ... When advice lacks logical reasoning, contradicts data, or fails to consider long-term consequences, it’s likely terrible. “A critical mind and rigorous evaluation will help you distinguish the good from the bad,” says Edward Kring, vice president of engineering at software development company Invozone.com.


Three Data Removal Myths That Provide a False Sense of Security

There are many ways to attempt to remove a file -- such as data deletion, wiping, factory reset, reformatting, and file shredding -- but without proper context, these solutions independently can be incomplete. For example, deleting a file and emptying the recycle bin can remove pointers to files containing data but not the data itself. The data is easily recoverable until the data is overwritten. A factory reset removes all used data as it restores a device to factory settings, but not all methodologies used in resets lead to complete erasure, and there’s no way to validate that all data is gone. Data wiping is the process of overwriting data without verification. File shredding destroys data on individual files by overwriting the space with a random pattern of 1s and 0s. Because neither method provides verification that the process was completed successfully across all sectors of the device, they are considered incomplete. Finally, reformatting, which is performed on a working disk drive to eradicate its contents, is another method where most of the data can be recovered with forensics tools available online.


Measuring engineering velocity misses all the value

Story point velocity has become the dominant driver of agile software development lifecycles (SDLCs) with the rise of scrum. How many story points did the team complete this week? How can we get them to deliver more points while still meeting the acceptance criteria? Speed is treated as synonymous with success, and acceleration is hailed as the primary focus of any successful engineering enterprise. Deliver more story points and you’re clearly “doing the thing.” The impulse is not without some logic. From the C-suite perspective, a perfect product that misses its moment on the market isn’t worth much. Sure, it may be full of engineering genius, but if it generates little to no business value, it quickly becomes more “museum relic” than “industry game-changer.” It pays to be first. In fact, one study found that accelerating time to market by just 5% could increase ROI by almost 13%. However, I believe that a simplistic obsession with speed misses several factors critical to optimizing the actual impact of any software solution.


Developers’ Role in Protecting Privacy

Although sharing data has become commonplace in exchange for benefits and value, consumers are becoming more aware of privacy issues. Take the EU’s General Data Protection Regulations (GDPR) as an example. Over the past five years, awareness has more than doubled in notable European markets such as the UK, Spain, Germany, the Netherlands and France. Meanwhile, there is also commercial pressure, as employers rely on developers to innovate to remain profitable. At the same time, customers expect brands to be responsible with their data, and failure to do so at the expense of trying to commercialize a new application could be detrimental. Indeed, while the pandemic may have ushered in significant changes and altered consumers’ attitudes toward data privacy, end users remain unwavering about the importance of security. Maintaining this balancing act is becoming increasingly complex to achieve. However, the question of data privacy is becoming a key business priority, and that means developers have a big opportunity to show their commercial value to their organizations.?


Why CISOs should be concerned about space-based attacks

Making matters worse is the tendency for many satellites to be ‘dual use’ carriers, in that they provide services that are used by both commercial and military clients. As such, “US commercial satellites may be seen as legitimate targets in case they are used in the conflict in Ukraine,” reported the Russian state-owned news agency TASS on October 27, 2022. Speaking before the UN General Assembly’s First Committee, Russian Foreign Ministry official Konstantin Vorontsov threatened that, “Quasi-civil infrastructure may be a legitimate target for a retaliation strike.” This has certainly been true for SpaceX’s Starlink satellite broadband service in Ukraine. "Some Starlink terminals near conflict areas were being jammed for several hours at a time,” SpaceX CEO Elon Musk said in a Twitter message posted on March 5, 2022. “Our latest software update bypasses the jamming. Am curious to see what’s next!” Such threats and actions come as no surprise to Laurent Franck, a satellite consultant and ground systems expert with the Euroconsult Group. Whenever a commercial satellite “can be used on a battlefield and used in a war context, it becomes a target,” he says.?

Read more here ...
Gokul Harsh

Ex-Director marketing-rich versatile experience in various field.

1 年

Thanks for sharing

回复

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 21, 2025

    March 21, 2025

    Synthetic data and the risk of ‘model collapse’ There is a danger of an ‘ouroboros’ here, or a snake eating its own…

  • March 20, 2025

    March 20, 2025

    Agentic AI — What CFOs need to know Agentic AI takes efficiency to the next level as it builds on existing AI platforms…

  • March 19, 2025

    March 19, 2025

    How AI is Becoming More Human-Like With Emotional Intelligence The concept of humanizing AI is designing systems that…

  • March 17, 2025

    March 17, 2025

    Inching towards AGI: How reasoning and deep research are expanding AI from statistical prediction to structured…

  • March 16, 2025

    March 16, 2025

    What Do You Get When You Hire a Ransomware Negotiator? Despite calls from law enforcement agencies and some lawmakers…

  • March 15, 2025

    March 15, 2025

    Guardians of AIoT: Protecting Smart Devices from Data Poisoning Machine learning algorithms rely on datasets to…

    1 条评论
  • March 14, 2025

    March 14, 2025

    The Maturing State of Infrastructure as Code in 2025 The progression from cloud-specific frameworks to declarative…

  • March 13, 2025

    March 13, 2025

    Becoming an AI-First Organization: What CIOs Must Get Right "The three pillars of an AI-first organization are data…

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

社区洞察

其他会员也浏览了