September 15, 2020
Kannan Subbiah
FCA | CISA | CGEIT | CCISO | GRC Consulting | Independent Director | Enterprise & Solution Architecture | Former Sr. VP & CTO of MF Utilities | BU Soft Tech | itTrident
Edge computing’s epic turf war
Edge computing and the IoT — not to mention COVID-19-related production and supply chain disruptions — are already blurring the lines separating the two cultures. IoT devices bring a new level of monitoring and in some cases control over OT systems. Plus, the edge deployments to which those IoT devices connect promise a whole new arsenal of analytics capabilities to crunch the massive amounts of data being produced by OT equipment. Yet many OT organizations see edge computing as duplicative and even potentially harmful. “Selling that value proposition [to OT] is very challenging,” says Jonathan Lang, IDC research manager for its Worldwide IT/OT Convergence Strategies research practice. “They already have legacy wired connections and industrial networking capabilities and SCADA [supervisory control and data acquisition] systems and control systems that serve their needs just fine.” OT leaders also believe that integrating new systems could threaten throughput and reliability, he says. Production requirements are changing rapidly, and equipment may need to be changed very quickly. “When IT starts meddling with their equipment, that translates into a loss in productivity,” Lang says.
Use cases for AI while remote working
“Working from home presents a host of challenges; lower quality equipment, shared working spaces and limited available bandwidth to name a few. Many of these challenges mean that the quality of our audio and video communication is less than ideal. AI is regularly applied to improve the quality of our video in real time and automatically filter out distracting background noises. “Remote working can increase the feeling of being isolated or disconnected from workmates, lead to disengagement and even stress and ill health. Through sentiment and interaction analysis of everyday tools like email, messenger and other collaboration applications, AI systems can provide effective means of measuring employee wellbeing and engagement, highlighting where employees need help. Once problems are identified, AI systems can suggest support resources and activities that can help to make things better.” Lastly, an emerging AI-related method of maintaining operations during remote working has been the use of digital workers. “Digital workers are becoming essential for businesses, optimising something we’ve never been able to before: the bandwidth of employees,” said Ivan Yamshchikov, AI evangelist at ABBYY.
Eliminating Unconscious Bias in Tech Recruitment
First, it is important to realize that where you hire from is as important as how you hire. If you only ever recruit from the same schools or with the same websites, then you are leaving yourself at the mercy of the diversity of those institutions. If you only ever use one route to apply, whether that’s only using recruitment consultants or use a website that is only really accessible through a computer, then again you are limiting yourself to candidates with access to those pathways. Outside of reconsidering talent pools, one way to reduce unconscious bias is through the removal of identifying characteristics—no photos, no names, dates of birth or school and university grades. This can help to an extent, in that decision-makers have to go off the candidates’ experience and how they’ve presented their previous roles, but it does have its restrictions—with entry-level positions, for example, where relevant experience might be limited. That’s a quick-fix solution. For a more sustainable, thorough and long-term approach, recruiters—particularly those hiring for technology positions—need to look at how they can accurately judge skill sets. This can be challenging in itself—in larger organizations, those involved in early stage selection may not have the requisite background understanding to make the right choices.
Ad Fraud: The Multibillion-Dollar Cybercrime CISOs Might Overlook
The practice became significantly more widespread when the scammers began leveraging networked bots to create fake clicks on sites they own or ads they've paid for, and now also encompasses hidden ads, targeting ad networks which measure views not clicks; click hijacking, when the fraudster redirects a click from one ad to another; and fake apps, which look like and are labeled as legitimate apps. These techniques are often used simultaneously to victimize companies, making the fight against ad fraud even more complex, says Luke Taylor, the chief operating officer of adtech security company TrafficGuard, which coauthored the report with Juniper. So Tayler believes that at the very least, CISOs should use lessons from the cybersecurity world to encourage their employers to become more engaged with the ad fraud challenge. A lot of ad fraud is based on making fake traffic look real, and the way that fraudsters do that is by stealing traffic logs to mimic them and create authentic-looking but fake traffic. CISOs, Taylor says, should be protecting their logs from cybercriminals the way they protect financial data.
Tech Conference Diversity: Time to Get Real
Some tech conferences provide non-traditional amenities such as sessions geared towards women (72%), a mothers' room (56%), a conference hosted meetup (28%), on-site daycare (17%) or a childcare stipend (11%). According to Classon, childcare stipends tend to be offered to people to encourage attendance, although they should also be offered to speakers who have not been offered a speaker stipend. "Part of the industry's problem is that organizers look at providing amenities, like a designated mothers' room or childcare stipend, as an extra bonus of their event when these should have been looked at as table stakes to level the playing field for more women," said Classon. "The same argument can be made for religious observances and the need for designated spaces for worship at weeklong or multi-day conferences." Tech conferences also tend to suffer from design bias as evidenced by the use of stools and chairs on stage that can make wearing a dress or skirt uncomfortable for the speaker and the audience. "Replacing bar stools with chairs that are lower to the ground makes it more comfortable for everybody, frankly," said Classon. "Organizers should also consider swapping out the common clip-on microphone that is difficult to attach to women's clothing for a headset that can rest behind the speaker's ear."
Portland becomes first city to ban companies from using facial recognition software in public
"This is the first of its kind legislation in the nation, and I believe in the world. This is truly a historic day for the city of Portland." Debate over facial recognition software continues to rage after a summer of high-profile news related to the technology. Amazon, IBM, and other major tech companies decided in June to put a moratorium on all police department use of facial recognition software after years of studies showing almost all of the available tools have high error rates and specifically cannot identify the faces of people with darker skin. Later that same month, the ACLU revealed that it was representing a man from Detroit who was arrested in front of his wife and kids based on a mistake by the Detroit Police Department's facial recognition software. Just a day later, US Senators Ed Markey and Jeff Merkley announced the Facial Recognition and Biometric Technology Moratorium Act, which they said resulted from a growing body of research that "points to systematic inaccuracy and bias issues in biometric technologies which pose disproportionate risks to non-white individuals." As with the other recent developments related to facial recognition, experts both praised and criticized the Portland ban.
Read more here ...
Leader at Empowered Consumerism International
4 年Thanks for posting
Manager admin, HR & Compliance at Textil Fashions Ltd.
4 年good jobs