Wednesday, 22 January 2014

Industry voice: Bring Your Own... Network?



Industry voice: Bring Your Own... Network?Did you think you were just getting used to BYOD and juggling the benefits it brings with the security risks it also entails? Well, get ready, because there is another Bring Your Own phenomenon on the way, and it will potentially bring more headaches to already stressed out IT departments.
The new phenomenon is Bring Your Own Network (BYON). This is, as the name suggests, when employees use their mobile phone's cellular connectivity to set up a personal hotspot.
This means they can, in some cases, bypass the corporate network and access websites, apps and other services that are otherwise banned by IT. Users could also potentially access corporate information and sensitive data on these networks, which are usually unsecured and unmonitored by IT.
In some ways this presents similar issues to BYOD; ensuring sensitive corporate data remains secure and protected while allowing workers all the tools they need to be productive.
However, while IT can put rules and policies in place to govern mobile devices, such as Mobile App Management (MAM), securing networks set up by employees could prove more difficult.
There are of course regulations in place to ensure data is protected. The Data Protection Act (DPA), PCI DSS and ISA's ISO270001 all govern how businesses should look after data, who they should allow to access it and what to do in case of a data breach.

Responsibilities

What is important to realise is that wherever the data is, and whoever and whatever is accessing it, it remains the responsibility of the business to ensure its protection.
That's why data protection is so important. The penalties for data breaches are severe - not just financially but also in terms of potential damage to a company's reputation.
That doesn't mean businesses have to protect each and every device and ban workers from accessing sensitive data - that will just lead to frustrated workers who will take more risks in order to get their jobs done, such as creating their own network.
If the data is protected at its source, and who and what can access it is strictly controlled, then IT does not have to fear the rise of BYON.
Having MAM in place could negate the need for employees to set up their own personal networks, while also ensuring businesses comply with the regulations mentioned above
IT will be able to control the device as if it was one it had provisioned, allowing it to access all necessary applications and data while keeping the employees personal data completely separate. Workers are free to use the device exactly how they want.
For IT workers, it may seem like there is a new problem to solve each and every day when it comes to workers and their mobile devices. If it's not a lost device it's employee-owned devices or, as we're seeing now, employees setting up their own networks.
But the key here is to protect what's important: corporate data. Don't worry about the devices themselves.
Control the access. Control who can access corporate data, what they can access, where they can access it from and what devices they can use. Get that aspect right and BYOD and BYON can become easy to handle and act as a great enabler for workers to be more productive.
  • Nathan Pearce is Product Manager for EMEA at F5 Networks. Pearce joined F5 in 2006 and is currently the product manager for EMEA. His role includes managing F5's product portfolio across all areas, including the security, datacenter and service provider sectors

China builds own phone OS, aims to be more secure than Android or iPhone



Definitely not Android.
CCTV-13
China, wary of operating systems from the Western world, has built a new smartphone OS that it believes will be more secure than the likes of Android and the iPhone. While China claims it as its own, the OS looks like it's based on Android.
China Operating System, or COS, was unveiled last week by the Chinese Academy of Sciences and the Shanghai-based Liantong Network Communications Technology, the New York Times reported. COS is 'designed for use on many devices including smartphones and personal computers' and was called 'a strategic product for national security,' the Times said. US surveillance and the end of support for Windows XP reportedly played a role in the system's creation. Liantong Deputy GM Chen Feili said the ultimate goal is to make COS China's main operating system.
While Windows is the predominant desktop OS in China, Android commands about 90 percent of China's smartphone market, with iOS taking most of the rest, IDC reports.

IBM leads in tech patent filings in 2013



 IBM has retained its patent crown in 2013, while Google climbed to No. 11 in the rankings.

According to data from IFI Claims Patent Services, IBM was awarded 6,809 utility patents in 2013, up 5% compared to 2012, PCWorld reports. 

IBM snared more US patents than any other company for the 21st year in a row, the report added.

The top ten in the patent list were:

1. IBM (6,809)
2. Samsung Electronics (4,675)
3. Canon (3,825)
4. Sony (3,098)
5. Microsoft (2,660)
6. Panasonic (2,601)
7. Toshiba (2,416)
8. Hon Hai Precision Industry Co (2,279)
9. Qualcomm (2,103)
10. LG Electronics (1,947)

Virus found in payment systems capable of stealing data



Virus found in payment systems capable of stealing dataCyber security researchers have detected a virus in online banking transactions, warning customers who swipe debit or credit cards at shopping counters as well as companies who stock them.
The virus, which is spreading at a "severe" rate according to CERT, has been detected operating in point of sale (PoS) counters at retail terminals in Asia, infecting their connection to online banking sources. Named "Dexter", it can acquire several aliases when infecting systems.
Malware programs designed for PoS systems are commonly referred to as RAM scrapers, because they search the terminal's random access memory (RAM) for transaction data and steal it.
PoS systems are actually computers with peripherals like card readers and keypads attached to them. Many of these systems run a version of Windows Embedded as the OS as well as special cash register software.

Cloning cards

Once the virus breaches the security of the target, it then begins to mine confidential data, including names, account numbers, sort codes and expiration dates. With the information from a card's magnetic stripe, known as track 1 and track 2 data, cybercriminals can effectively clone the card.
CERT, in an advisory, said that the malware campaigns targeting payment card processing, point-of-sale and check-out systems are on the rise, due to the ease of copying data. Many security firms have stressed in recent months that companies should shore up the security systems of the PoS terminals to avoid any form of compromise.
Last week it was revealed that U.S retail giant Target had been infected with a PoS virus that had stolen the names and addresses of 70 million customers.

Google Introduces Contact Lens That Measures Glucose Level



After unveiling a revolutionary wearable tech like Google Glass, the company has now introduced a ‘smart contact lens’. The tech giant is testing the lens with aim to help diabetic people measure their glucose level. Google said that the lenses contain a ‘tiny wireless chip’ and sensors that measure the glucose level in tears to calculate blood sugar levels in people with diabetes.
sensimed2
Google has not only developed the prototypes of these smart contact lenses, but also done multiple clinical research studies, met with the US Food and Drug Administration, and is looking for potential partners to bring the product to market. “We’re testing prototypes that can generate a reading once per second. We’re also investigating the potential for this to serve as an early warning for the wearer, so we’re exploring integrating tiny LED lights that could light up to indicate that glucose levels have crossed above or below certain thresholds”, the project leaders wrote in a blog post.
The project’s co-founders Brian Otis and Babak Parviz  hopes the lenses can help diabetics regulate their blood sugar levels more effectively and avoid having to test their blood with finger pricks throughout the day. Google’s smart contact lenses come equipped with miniaturized electronics embedded into them and an antenna that’s described as being ‘thinner than a human hair’.
Google said it was working with the US Food and Drug Administration (FDA) to bring the product to mainstream use. It added that it would look for partners “who are experts in bringing products like this to market”.
“It’s still early days for this technology, but we’ve completed multiple clinical research studies which are helping to refine our prototype. We hope this could someday lead to a new way for people with diabetes to manage their disease“, concluded Google.

One97 Integrates mCommerce Into PayTM



One97 Communications Ltd, a mobile internet company has launched an exclusive mobile-only commerce site via its PayTM App.
one97
Noida based One97, which already owns & operates payment processing application PayTM, will now add online shopping for products & merchandise via the same application. The Mobile Only extension or mCommerce endeavor will go live at the end of this month & will feature diverse verticals like apparels, home decor and accessories to being with, shared Vijay Shekhar Sharma, Chairman and Managing Director, One97.
“We understand that the country needs a mobile marketplace, because mobile has now become the first device for SMEs as well as consumers. Here, we are creating a bottom-up mobile-only marketplace where consumers meet merchants. It is not the baby site of an internet, but is a pure mobile app.”
mCommerce is certainly not a new concept & One97 will have to compete with the likes of Amazon, eBay, Snapdeal, Flipkart & many others who not only have the exact same profile, but who have been in the business for a long time. In fact, many of the players have routinely tweaked their application & interface after understanding how the mCommerce works.
PayTM on the other hand, has been a very elementary platform in comparison to these applications. The app offered mobile & DTH recharges & had recently started to offer bus tickets as well. However, PayTM has been evolving quickly. Early this month, the company had announced deployment of a semi-closed wallet, post successfully securing license from Reserve Bank of India (RBI). This will also allow consumers to use the new semi-closed wallet across several online merchants.
And this precisely what PayTM will work on. Though PayTM will list the merchandise & customers will be able to pay using the PayTM wallet and then checkout, the items will be home-delivered by respective merchants. Essentially, the order fulfillment will be taken care of by the respective retailer.
Being able to offer an all-inclusive platform that allows shopping as well as payment via a mobile interface is certainly a much desired trait. But the mobile screen has traditionally been considered too tiny to have a satisfactory shopping experience. What do you think?

How to Use a Picture as a Password in Windows 8.1



How to Use a Picture as a Password in Windows 8.1 is a post by Travis Pope from Gotta Be Mobile.
Microsoft’s Windows 8.1 introduces a lot of new features that are designed to make the computing experience of an average user easier. While it misses the mark in a few cases, being able to use a PIN number or a picture as a password replacement is one of the places where Microsoft’s latest operating system excels. Of those two options, picture password is the most useful for users with a Windows-powered tablet or laptop with a touchscreen.
Here’s how to use a picture as a password in Windows 8.1
Go the Start Screen by pressing the Windows key.
How to Use a Picture as a Password in Windows 8 (1)
Open the Charms Bar by swiping from the right edge of your display to the left. Tap Settings.
How to Use a Picture as a Password in Windows 8 (2)
Click or tap Change PC Settings.
How to Use a Picture as a Password in Windows 8 (3)
In the Settings app click or tap Accounts in the menu on the left side of your screen.
How to Use a Picture as a Password in Windows 8 (4)
Click or tap Sign in Options in the menu on the left side of your screen.
How to Use a Picture as a Password in Windows 8 (5)
Click or tap the Add button under Picture Password.
How to Use a Picture as a Password in Windows 8 (6)
If you’re using a Microsoft Account to download apps and sync to SkyDrive you’ll need to enter that account’s password. Then click or tap Ok.
How to Use a Picture as a Password in Windows 8 (7)
Picture password allows users to unlock their device by entering a three-part pattern that’s overlaid on their favorite pictures. Tap or click Choose Picture to use one of your photos for Picture Password.
How to Use a Picture as a Password in Windows 8 (8)
Select the picture you would like to use for Picture Password from your computer then click or tap Open.
How to Use a Picture as a Password in Windows 8 (9)
Click or tap on Use This Picture if you’re satisfied with the picture you selected. If you aren’t tap or Click on Choose New Picture.
How to Use a Picture as a Password in Windows 8 (10)
Swipe your finger in a specific manner three times. Be sure, to use landmarks on the photo as your guide. You’ll need to enter it twice correctly before Windows 8.1 will treat it as your password.
How to Use a Picture as a Password in Windows 8 (11)
Click Finish.
How to Use a Picture as a Password in Windows 8 (12)
There you have it. You’ve added a picture password to your Windows 8.1 device. There are two key things users with Picture Password should remember. Should you forget your password, your device will allow you to use your original password instead of a picture password. Also, picture passwords work with a mouse and keyboard, stylus and tablet. That being said, most users will find that it makes more sense to enable it on a device with a touch screen.
Finally, picture passwords don’t automatically sync between devices. As such, you’ll need to enable it on each device you own manually if you prefer it over typical passwords.

The number crunch: Will Big Data transform your life — or make it a misery?



The age of Big Data is upon us. Fuelled by an incendiary mix of overblown claims and dire warnings, the public debate over the handling and exploitation of digital information on an astronomically large scale has been framed in stark terms: on one side are transformative forces that could immeasurably improve the human condition; on the other, powers so subversive and toxic that a catastrophic erosion of fundamental liberties looks inevitable.

The tension between these opposites has marooned the discussion of Big Data. It is stuck somewhere between Bletchley Park — the former Government Communications Headquarters (GCHQ) location where the godfather of the computational universe, Alan Turing, primed today's Big Data explosion during the Second World War — and the satirical tomfoolery of South Park, which recently portrayed the living core of all data as an incarcerated Father Christmas cruelly wired up to a machine by the US's National Security Agency (NSA).

We know from Edward Snowden's widely publicized whistle-blowing revelations that the NSA — in collusion with GCHQ — lifted vast amounts of data from Google and Yahoo, under the once-top-secret codename, Muscular. At the same time, we're told that the potential for beneficial insights mined from anonymous, adequately protected data is enormous.

Big Data helps us find things we "might like" to buy on Amazon, for example, but it has also left us vulnerable to surveillance by state and other agencies. Companies such as Google and Facebook are essentially Big Data businesses, whose staggering profitability stems from the application of data analysis to advertising: these "free" services are paid for by personal data surrendered automatically with every click.

In finance, meanwhile, optimists foresee a theoretical end to all stock-market crashes, thanks to insights derived from huge-scale data-crunching, while others predict an automated, algorithmic road to ruin. Similarly, the cost and efficiency of healthcare provision is set to be radically transformed for the better with access to massive amounts of data — likewise the development of new drugs and treatments. But what about the mining of medical data without patient consent? So the debate goes on.

One aspect of Big Data, however, is beyond question: it is indeed very big, and it's getting bigger by the millisecond. An IBM report in September estimated that 2.5 quintillion bytes of data are created every day (that's 25 followed by 17 zeros, or roughly 10 quadrillion laptop hard drives) and that 90 per cent of the world's data has been generated in the past two years: everything from geo-tagged phone texts and tweets to credit-card transactions and uploaded videos. By 2020, it's thought that the number of bytes will be 57 times greater than all the grains of sand on the world's beaches.

So what's actually going on at the coalface of Big Data, a code-centric world of striping, load-balancing, clustering and massively parallel processing? What do the analysts working with Big Data say it's going to do for us?

"You get a fuller picture of the phenomenon you're interested in, with more dimensions, and that lets you derive greater insights," says Big Data pioneer Doug Cutting, chief architect at enterprise software company Cloudera and founder of the popular open-source Big Data tool Hadoop. Cutting's work on internet search technology for Yahoo during the mid-2000s provided the ideal proving ground for combining vastly increased computing power with huge and diverse datasets. "And from that we've seen a new style of computing emerge."

The revolutionary effects of this new approach cannot be understated, especially within the scientific community. For Brad Voytek, professor of computational cognitive science and neuroscience at the University of California San Diego, and "data evangelist" for app-based taxi service Uber, Big Data has had a profound effect on the traditional scientific method. "You can sweep through huge amounts of data and come up with new observations," he says. "That's where the power of Big Data comes in. It's automating the observation process. It's making everything easier but in a way that few people yet understand. It's going to dramatically speed up the scientific process and people have been doing some really cool stuff with it."

Michael Schmidt, founder and chief executive of American "machine-learning" start-up Nutonian, established a Big Data landmark when, in partnership with robotics engineer Hod Lipson at Cornell University, New York, he created Eureqa — a piece of software that deduced Newton's Second Law of Motion by analyzing data from the chaotic movements of a double pendulum. What took Newton years, the Eureqa algorithm accomplished in a matter of hours. With Nutonian, Schmidt is now opening up that Big Data technology beyond the college lab.

"We want to accelerate the process that scientists go through, to help you discover very deep principles from data," he says. "We want to explain how things work." The range of Eureqa's uses couldn't be more striking, from the construction of better warplanes to helping save the lives of infants. Schmidt is currently working with the United States Air Force, analysing the strength of advanced super-alloys used in engine components. "They are really interested in anticipating failures — knowing when things are going to break, explode or stop working. We were able to show them the most important things that go into a failure of a particular engine part, at a finer resolution than ever before."

Eureqa has also been used to help discover the optimal moment to remove breathing tubes from prematurely born babies. "It's really critical when you remove that tube, and allow the child to start breathing on its own," says Schmidt. "Premature babies are hooked up to every monitoring device you can imagine and we were able to take that data and winnow it down to a few of these key metrics that drive the future health of the babies. Which is pretty neat."

Harnessed to Big Data, this kind of analysis becomes the work of hours and minutes. "Traditionally you could spend years before you could conclude on a result. What's changed is that we have these huge datasets. You can rapidly accelerate the entire discovery process."

While the benefits of this revolutionary increase in analytical speed are clear, Big Data is often inseparable from its source and context, especially in the public realm, where ethical concerns are paramount. Justin Keen, professor of health politics at the University of Leeds, co-authored a June 2013 paper published in Policy & Internet, the journal of the Oxford Internet Institute. In it, he addressed issues of privacy and access in relation to Big Health Data. "The potential for much greater exploitation of data held by government departments in England and all around the world is real," he says. "We just haven't got proper governance arrangements at the moment - we don't know what rules should govern what NHS data gets published, and in what sort of format."

Early in 2013, Health Secretary Jeremy Hunt set the goal of a paperless NHS by April 2018, in line with programmes including care.data, which links patient data across different parts of the NHS. It is hoped that the resulting increase in preventative treatments, coupled with improvements in health management, will save billions and improve the quality of healthcare. The sticking point is patient confidentiality.

"I'm very happy to see that in the past month or two, senior civil servants have actually put the brakes on," says Keen. "Releases of data through care.data and other channels are actually going to be slowed down until we've got these governance arrangements right. But we're not going to get the releases of data that advocates are hoping for as early as they might have hoped for it."

Despite this slowdown, the Big Data community appears to be echoing Keen's note of caution. "From my perspective as a person who works in data, of course I want as much as I can get, because the more data you've got, the more interesting things you can do with it," says Francine Bennett, chief executive and co-founder of London-based Big Data specialists, Mastodon C, which mined available data to co-create the CDEC Open Health Data Platform, a showcase for insights generated by Big Health Data. "However, as a person who's knowledgeable about data - and as a citizen of the UK k whose health data is in these systems — I know that it could be enormously damaging to privacy to release things which shouldn't be released. It's hard to put the genie back in the bottle. I'm keen for it to be done in a measured way."

Gil Elbaz, founder and chief executive of open-data platform Factual, began his career as a database engineer in Silicon Valley in the 1990s before co-founding Applied Semantics, acquired by Google in 2003 for $102m. Applied Semantics developed AdSense, the technology that matches online advertisements to the pages being browsed and the person browsing them. "The approach we took to the contextual targeting of ads was all rooted in processing huge amounts of data," says Elbaz, whose Factual company website affirms his core belief in "making data accessible".

"We take data privacy very seriously, and if somebody's data is theirs, they should have the right to keep it private. That being said, there are significant opportunities where data shouldn't be kept fully private, because it's to society's benefit for it to be open," he says, citing David Cameron's October 2013 announcement, at the Open Government Partnership summit, of a public register of business ownership. "Data at Factual is primarily business data," says Elbaz. "These businesses want it to be available."

Even where the privacy question is not an issue, Elbaz is concerned that information can get trapped in hard-to-reach databases. "Too often today data is not accessible. For example, why is it that software can't automatically check - given the age of a patient and any drug - whether a dosage is healthy or lethal? Why can't it be flagged? The reason is that there is no open API (Application Programming Interface, or app-creation tool) that has drugs and dosage ranges. It does not exist. Is there a database? Yes. But it'll take a long time even to find the right person to buy that data from. To me, this is insane."

So where's it all leading us? For some, the ultimate goal of Big Data has been defined as a kind of supreme foresight: an ability to predict what people want before they know they want it. Elbaz takes a more functional view. "My holy grail is that if any piece of software needs access to information, it can find that access at a reasonable cost," he says. "To me, it is not crazy rocket science — it's the basic fabric of how a global information system should work."

For Schmidt, the quest for enlightenment has only just begun. "A lot of promises have been made for Big Data in the hope that it has this enormous value, and we're starting to chip away a little at that, but there's still so much to be done."

Doug Cutting, however, has little interest in the notion that Big Data will supply some kind of predictive super-power. "I'm an engineer. I focus down on the plumbing. I think I have a more concrete imagination about what is possible. I don't believe it's possible to have an oracle that can predict what I'll be interested in doing tomorrow. Moreover, I find surprises invigorating; I'd hate to lose spontaneity in the world."

However, he adds, certain kinds of things can be done better. "To me, the holy grail is removing limitations and being able to achieve the interconnectedness that we want; to be able to take advantage of all the data and do all the things we imagine are possible. I don't think we want to get there overnight as a society. We need to embrace these things and understand what we want to happen and what we don't want to happen - build the right societal, legal and business structures. We need to evolve."

Three eye-catching big data ventures

Open Data Institute

Aim: free data for all

Co-founded by Sir Tim Berners-Lee, the inventor of the World Wide Web, to encourage the exploitation of freely available data — aka "open data" — the not-for-profit Open Data Institute has positioned itself as both a catalyst for data innovation and a global hub for data expertise. Based in Shoreditch, east London, the ODI oversees a network of collaborative international "nodes", including Dubai and Buenos Aires, and has incubated a growing bunch of Big Data startups — for example, Mastodon C (see main feature), which identified potential NHS savings of about £200m by crunching data relating to branded and generic drugs; and Placr, which analyses real-time transportation and timetable information to improve daily travel. theodi.org

The Human Brain Project

Aim: to reveal the workings of human consciousness

Flush with 1bn in funding, the Human Brain Project is a 10-year quest to reveal the hidden workings of consciousness. The scale of this task is so immense — the brain has around 100 trillion neural connections — that many still doubt it can be achieved, but Switzerland-based project leader Henry Markram believes his collaborative Big Data approach, using statistical simulations and vast supercomputing power across "swarms" of researchers, might do the trick. One aspect of the plan involves mining a huge amount of available data on mental disorders from public hospitals as well as pharmaceutical company databases; algorithms will then isolate revealing patterns and connections. In a decade's time, the neural picture should be much clearer. humanbrainproject.eu

IBM's Computational Creativity

Aim: to make computers 'creative'

Following a line of computer evolution that runs from Deep Blue (which beat Gary Kasparov at chess in 1997) through Watson (which beat human opponents on the US quiz show Jeopardy! in 2011), IBM has continued its ingenious manipulation of huge datasets with a system designed to generate creativity. Big-data analytics techniques have been deployed by IBM's Thomas J Watson Research Center to create new food recipes — what you might call technouvelle cuisine — mined from sources including Wikipedia and Fenaroli's Handbook of Flavor Ingredients, then tweaked with an algorithm designed to add creativity to matched ingredients. The results (from Vietnamese apple kebab to Cuban lobster bouillabaisse) have impressed human chefs. research.ibm.com