Malware that can build botnets out of IoT devices is at least partly responsible for a massive distributed denial-of-service attack that disrupted U.S. internet traffic on Friday, according to network security companies.
Since Friday morning, the assault has been disrupting access to popular websites by flooding a DNS service provider called Dyn with an overwhelming amount of internet traffic.
Some of that traffic has been observed coming from botnets created with the Mirai malware that is estimated to have infected over 500,000 devices, according to Level 3 Communications, a provider of internet backbone services.
About 10 percent of those Mirai infected devices are participating in Friday’s DDOS attack, said Dale Drew, the company’s chief security office in Periscope livestream. However, other botnets are also partaking in the attack, he added.
DDOS attacks and botnets are nothing new. However, the Mirai malware appears especially worrisome for its awesome power. An attack on the website of cybersecurity Brian Krebs last month managed to deliver 665Gbps of traffic to Kreb’s site, making it one of the largest DDOS attacks ever recorded.
Unlike other botnets that rely on PCs, the Mirai malware targets internet-connected devices such as cameras and DVRs that have weak default passwords, making them easy to infect. Adding to the worry is that the developer behind Mirai has released the malware’s source code to the hacker community.
Security firm Flashpoint said it has been able to confirm that some of the Mirai-infected machines involved in Friday’s attack are DVRs.
The botnets participating in Friday’s assault, however, are separate and distinct from those used to take down Kreb’s website back In September, the security firm said.
Both Level 3 and Flashpoint have said copycat hackers have been trying to exploit the Mirai code since it was publicly released.
Friday’s attack is still ongoing, according to Dyn. Its engineers are trying to mitigate “several attacks” aimed at its infrastructure. The company has also reportedly said that the DDOS attacks are coming from “tens of millions of IP addresses at the same time.”
Malware that can build botnets out of IoT devices is at least partly responsible for a massive distributed denial-of-service attack that disrupted U.S. internet traffic on Friday, according to network security companies.
ITSM Insight: Key facts driving market changeرؤى إدارية لخدمات تكنولوجيا المعلومات: ماهية العوامل التي تقود تطوّر السوق
What is Blockchain? It’s the Tech that runs Bitcoin. In the finance industry it could save $1.7 Trillion in yearly transaction fees and it could disrupt other industries in similar ways. This “financial explainer video” explains how it works, why it’s so safe and all the other cool stuff it might be used for.
Blockchain is a Peer to Peer software technology that protects the integrity of a digital piece of information. It was invented to create the alternative currency Bitcoin but may be used for other cryptocurrencies, online signature services, voting systems and many other applications. In this video we explain how it works and what makes it special.
Everyone uses paper money. When you get a 10 dollar bill you trust that it’s not fake. If instead someone sent you an email saying “here’s 10 dollars” you probably wouldn’t trust it. But when we “transfer money”, use an ATM or pay with a deposit card that’s pretty much exactly what we do. We’re sending money in a digital message.
To make sure no one’s cheating or sending money they don’t have, these “messages” go through a few trusted banks that keep a record of everything. They know how much money everyone has and deduct it properly for every transaction.
But this becomes expensive when there’s a million transactions around the world every minute. The Economist estimates that banks charged us more than 1.7 trillion dollars to process these payments in 2014. That’s about 2% of the entire world economy! With blockchain we can save a lot of this cost because it lets us send money just like sending an email.
Instead of sending a lot of payment information through a few servers, blockchain uses thousands of personal computers on the internet. All transactions are copied and cross checked between every computer in a system wide accounting book called the ledger, which becomes very safe at scale.
Blockchain doesn’t just allow us to create safe money online, it lets us protect any piece of digital information. This could be online Identity cards, voter ballots, contracts and many other “legal instruments”, bringing bureaucracy into the 21st century.
For a while, it seemed like all of IT was destined to move to public cloud, changing the face of technology and eliminating many data centers. The driving force for this was, and still is, cost. Amazon Web Services is fairly inexpensive, and all its major competitors have had to match its pricing. But new ways in which the major cloud providers reduce their operational costs may suggest private cloud — not public cloud — is the more cost-effective option in the long run.
An emerging set of vendors called original design manufacturers (ODMs) design servers to-order — called white box servers — for major cloud service providers (CSPs), such as Google. Other large companies, including major banks and scientific labs, such as CERN, are examples of a widening customer base for these white box systems.
ODMs have a low-margin, high-volume sales model, more like a grocery store than a traditional high-tech vendor. The result is that CSPs pay as little as 30% of traditional server prices for the white box alternatives.
Technology has also converged on what we call commercial off-the-shelf (COTS) systems. These are very standardized designs; Intel and AMD, for example, provide motherboard reference designs to manufacturers, and all the interfaces are standardized. This minimizes the interoperability risks and maintenance requirements that we saw with proprietary computers.
All of this changes the buying profile for servers and storage across the IT industry and, most noticeably, in the cloud. Anyone buying gear for private cloud has the option to purchase low-cost, white box models from ODMs.
In addition to being low-cost, a white box server could also reduce workloads for private cloud administrators, especially when managing the configurations and software images installed upon them. This is because white boxes adhere strictly to open COTS standards. The COTS model used in white boxes enables automated orchestration, converting manually driven scripts into automated policy deployments. Without this standardization, it’s more difficult for organizations to build a hybrid cloud.
Despite their benefits, white box servers can pose a few challenges. For instance, finding vendor support for a white box server can be more difficult. However, compared with a decade or so ago, the risks are smaller and typically within the scope of most admin teams. In addition, white box servers could require organizations to work with multiple vendors — such as different providers for drives and adapter cards — but COTS standards help with this.
Open source software that runs in clouds is flexible when it comes to hardware. It’s unusual for a COTS configuration to not run OpenStack, for example, or Ceph. The open source software vendors or communities provide guidance on minimum hardware configurations to help reduce complexity.
Many organizations wonder whether they should use designs approved by the Open Compute Project (OCP). While the OCP is a good way to see what Facebook and others do, OCP designs may not be affordable for many enterprises.
Some of the old-guard server vendors have usurped OCP, offering “OCP-compliant” products at prices similar to those for traditional systems. However, many white box products do as good or better jobs, and may still be cheaper than OCP units. In addition, users can run any x64-compatible code on a white box server, so Linux and Windows are good to go, as are all hypervisors.
Low-cost white box servers are becoming mainstream and rapidly increasing market share. This is the future of computing, unless a radical technology shift moves things back to favor traditional vendors. It also opens up a cheaper alternative that allows private or hybrid clouds to become more cost-competitive with the public clouds.
Aruba, a division of Hewlett Packard Enterprise, announced software today that’s designed to help companies speed up secure integration of mobile devices and Internet of Things objects into their networks.
Called Aruba Mobile First Platform, the software is based on application programming interfaces (APIs) for use by third-party developers and developer teams inside companies to help them boost automation with IoT devices and allow mobile workers to be more efficient.
Mobile First is built on Aruba OS 8.0, the company’s new operating system, which is deployed as a virtual machine on a server appliance.
Also, Aruba announced enhancements to its existing Aruba ClearPass software for Mobile First to make it easier for IT security teams to integrate cloud-hosted services into ClearPass. This means customers can more easily build software workflows for Enterprise Mobility Management packages.
In one example, these new ClearPass Extensions can help Intel Security McAfee ePolicy Orchestrator software check on the security settings of a connected smartphone or other device. Ozer Dondurmacioglu, senior director of product marketing at Aruba, said in an interview that multi-factor authentication (fingerprints, for example) from companies like Kasada could also more easily be integrated.
Mobile First uses analytics capabilities with Bluetooth Low Energy indoor location services that could help retail marketing teams grab insights from shoppers about the latest promotions.
Cloud-based network services that are easy to manage is the direction every major networking vendor, including Aruba, Cisco and Aerohive Networks is taking, according to Maribel Lopez, an analyst at Lopez Research.
“There’s a big move to put IoT in the cloud and Aruba has the right messaging about this transition,” Lopez said. “Everything is becoming a service. You had the data center as a service and now you have [networking] boxes where you layer on top the networking service.”
Analyst firm IDC says the emerging Network-as-a Service (NaaS) market is comprised of the cloud-managed Wireless LAN and Software Defined Networking markets, which together will grow to more than $11 billion by 2018.
Aruba separately announced it is working with Accenture and Deloitte to provide an operating expense-based NaaS pricing model, allowing it to treat its network like a utility that can scale in size as demands and services — like new security tools — grow. Retailers are likely to lead in the adoption of NaaS, Deloitte predicted.
As part of its announcements, Aruba set pricing for new Aruba OS8 virtual mobility controllers that can support hundreds of WLAN access points at $6,795. The Aruba OS8 virtual mobility master for larger groups of thousands of access points was set at $10 495.
Both will be available in the fourth quarter of this year..
Learning the soft skills you need to succeed in IT is easy. They are part of the same set of skills you need to succeed at life, many of which you will have mastered by now. They are people skills — and useful everywhere.
Well, almost everywhere. Soft skills won’t help you out in a fist fight with that annoying new coworker. But that’s OK, because they encompass everything you do to ensure you don’t end up in a fight in the first place.
Bruce Lee was a man who made a living out of beating people up, and yet much soft-skill wisdom can be found in his thoughts and writings on martial arts, one of the ultimate hard skills in life.
Read on for a collection of Bruce Lee-isms conveniently applied to soft skills in IT.
When we hold to the core, the opposite sides are the same if they are seen from the center of the moving circle.
Teamwork is a skill that places emphasis on two parts of one whole: yourself, and how you fit into a team. You are the core of teamwork, and the opposite sides of the moving circle surrounding you are your team members, each with their own core and circle.
Simply get along well enough with those on the edges of your circle, whether it’s with your assistant, your manager, or your coworkers, and you will find your core start to widen, giving more meaning to your place in your company or organization.
In essence: Relationship is the mirror in which you discover yourself – to be is to be related.
Truth has no path. Truth is living and, therefore, changing.
Information overload is an unrecognized disorder of the modern age. Just looking at the Wikipedia entry for Information overload gives you more information than you really need.
In light of this “data smog” that permeates both work life and non-work life, basic communication skills (talking, listening, writing, reading, and even email) have become cherished communication tools, thanks to their simplicity.
Don’t feel that you have to limit your tools, though. An idea is an idea no matter how it is expressed, and when you’ve got a good idea, it’s your presentation that determines whether anyone cares. Making data or ideas look attractive and understandable with presentation software can be highly effective in influencing minds.
In essence: Always be yourself, express yourself, have faith in yourself.
3. Problem Solving
Balance your thoughts with action.
We all have our own unique way of dealing with problems, but the only solution that is ever remembered is the one that gets implemented. Solving problems is about being proactive, which means taking initiative when needed.
If that initiative is a swift kick to a jammed printer to get it working again, so be it.
In essence: Use only that which works, and take it from any place you can find it.
The timeless moment. The “moment” has no yesterday or tomorrow. It is not the result of thought and therefore has no time.
Planning is something anyone can do well. It’s a handy skill to be able project yourself and tasks into the future, although it’s wise not to let planning turn into procrastination.
You can always put things off for a more convenient time, but remember that the most convenient time is the timeless moment. Right now. Go do something!
In essence: Make at least one definite move daily toward your goal.
Using no way as way; Having no limitation as limitation.
Having no limitations sounds like fun, but can also be a nightmare when it comes to negotiation – an important soft skill that translates into many situations. When presented with a new contract you don’t (or can’t) agree with, for example, you should be confident enough to say, “No way.” At least, politely.
In essence: Defeat is a state of mind. No one is ever defeated until defeat has been accepted as a reality.
The happiness that is derived from excitement is like a brilliant fire — soon it will go out.
Starting a new job or contract is exciting. But that initial excitement will fade. Finding ways to keep yourself engaged and motivated once you’re in the flow of your work can become like a second job on top of your actual one.
If you’re not that big on smiling or being extroverted, there are many other ways to show your enthusiasm and positivity, like going that extra mile on a project your manager knows you didn’t enjoy.
In essence: Optimism is a faith that leads to success.
7. Receiving Criticism
One should be in harmony with, not in opposition to, the strength and force of the opposition.
Having a tough time with a coworker or manager? Take Bruce Lee’s advice: Recognize the conflict, and at the same time, be cool with it. The worst you can do in a situation of conflict is to lose your cool.
In IT, as in life, sometimes you just have to be the board.
In essence: Boards don’t hit back.
Life itself is your teacher, and you are in a state of constant learning.
Be comfortable knowing that everyone is always learning. That’s life. What will distinguish you among your peers is what you do with what you have been given.
Practice your critical thinking alongside your observation skills by simply thinking before you speak.
In essence: The spirit of the individual is determined by his dominating thought habits.
Empty your mind, be formless, shapeless — like water. Now you put water in a cup, it becomes the cup; You put water into a bottle it becomes the bottle; You put it in a teapot it becomes the teapot. Now water can flow or it can crash. Be water, my friend.
Bruce Lee’s preferred style of fighting was ‘no style,’ as he believed that existing martial arts styles were too rigid to take to the streets. Instead, he saw opportunity in having no style as a way to master all styles.
Adaptability is a skill that you can’t really practice. You simply have to take things as they come. Be mindful of your habitual reactions, and keep an eye out for opportunities in disguise.
In essence: Do you know why this cup is useful? Because it is empty.
Instead of dedicating your life to actualize a concept of what you should be like, actualize yourself.
Creativity picks up where hard skills and knowledge leave off. Being able to articulate creative solutions to problems based on your unique experience is a skill that deserves to be nurtured.
In essence: There are no limits. There are plateaus, but you must not stay there, you must go beyond them.
11. Self Improvement
Seek to understand the root. It is futile to argue as to which single leaf, which design of branch, or which attractive flower you like; when you understand the root, you understand all its blossoming.
To master soft skills, ask yourself which areas you need to improve. Only you can know this. Once you’ve identified your weak points, you can work on them with purpose and resolve, and truly start blossoming.
Be honest with yourself, and you’ll always get to where you want to be in your career.
In essence: Be happy, but never satisfied.
The goal of NFV is to decouple network functions from dedicated hardware devices and allow network services that are now being carried out by routers, firewalls, load balancers and other dedicated hardware devices to be hosted on virtual machines (VMs). Once the network functions are under the control of a hypervisor, the services that once require dedicated hardware can be performed on standard x86 servers
This capability is important because it means that network administrators will no longer need to purchase dedicated hardware devices in order to build a service chain. Because server capacity will be able to be added through software, there will be no need for network administrators to overprovision their data centers which will reduce both capital expenses (CAPex) and operating expenses (OPex). If an application running on a VM required more bandwidth, for example, the administrator could move the VM to another physical server or provision another virtual machine on the original server to take part of the load. Having this flexibility will allow an IT department to respond in a more agile manner to changing business goals and network service demands.
NFV is different from software-defined networking (SDN) but is complementary to it; when SDN runs on the NFV infrastructure, the SDN forwards the data packets from one network device to another while the network routing (control) functions run on a virtual machine in, for example, a rack mount server. The NFV concept, which was presented by a group of network service providers at the Software Defined Network and OpenFlow World Congress in October 2012, is being developed by the ETSI Industry Specification Group (ISG) for Network Functions Virtualization.
Public sector CIOs can lead a digital revolution in their organisations, creating new citizen services, according to Gartner, but only if they can overcome the risk-adverse culture typically found in government.
The analyst company says that CIOs in government organisations are well positioned to drive digitisation efforts and to implement better ways of working, but that change requires vision and changes to culture and leadership practices.
Public sector organisations often face restraint from top-down hierarchies, cultural legacies and the lack of a compelling vision, Gartner said, but there are successful examples of organisations that have changed focus for the better.
Elise Olding, research vice president at Gartner, said that public sector leaders — including CIOs — must create a culture that is less averse to change, unified in vision and direction, and that can manage change more effectively over longer time frames.
“Public sector organisations often have cultural and organisational mechanisms to buffer them from rapid swings in the political or economic landscape. While this provides stability, it also makes large-scale organisational change a difficult prospect,” Olding said.
“None of these challenges are insurmountable. Based on our conversations with public sector CIOs who have seen success in their digital transformation, Gartner has identified three key recommendations,” she added.
Gartner’s key recommendations for successful digital leadership are:
1- Promote a Compelling Vision
In an ideal scenario, a CIO will receive clear direction on the strategic intent of the organisation and the role IT will play in that. Too often, however, public sector organisations lack a clear ‘business’ strategy to which the CIO can align IT investments. Yet, in either case, it’s vital the CIO formulates a vision of how technology investments will achieve a desired future state for the organization.
“The best kind of vision should fit on a postcard,” said Olding. “It expresses in clear, non-technical terms on one page what is wrong with the status quo, and outlines a set of activities and investments that will improve things.”
A vision like this allows for engagement with executive leaders, so they can affirm, revise or reject and replace the strategic direction the CIO has outlined for the IT organisation. If clear executive direction was lacking from the outset, this engagement may serve as a catalyst to improve the strategy outside the IT organisation. If a clear direction was in place, the vision will still affirm and provide a template for IT’s role in bringing it to reality.
2- Make Change Inclusive
“Getting executive buy-in is just the first step; the vision is the cornerstone for action,” said Olding. “It’s critical to communicate the vision to midlevel management and frontline workers in a way that demonstrates how their role fits into the vision, and how the completed vision will improve their role. A credible answer to the question, ‘What’s in it for me?’ builds caring and belief.”
It’s also important that the vision shows how it builds on the good work of earlier efforts. This will not be the first vision seen by most employees. Many of them will have invested in one or more previous visions, only to see them swept away or discredited by a new round of leaders. They may be justifiably sceptical of a new picture. To win their support CIOs must avoid hyping their vision as a panacea, but rather present it as an iteration and expansion of previous achievements.
In addition to honouring the culture and legacy of an organisation and how it contributes to the future vision, CIOs must cultivate ‘change agents’. These are employees who clearly understand the vision and its benefits, and champion it among their peers. CIOs can better harness the creativity and insights of the entire organisation when they constantly invite, encourage and support employees at all levels who show desire to make the vision a reality.
3- Alter Leadership Practices
Embracing change will require changes for everyone, and that starts with leadership. Organisational cultures can foster myths that are comfortable yet counterproductive. Such myths are rooted in the language of “that’s how we’ve always done things,” which reinforces a victim mentality and smothers innovation.
“The CIOs who succeed in transforming the business actively confront ingrained behaviours, traditions and legacy processes,” said. Olding. “They challenge leadership and are successful in instilling a clearly defined sense of urgency around their vision that gains the trust and support of the entire organisation, from leadership to frontline workers.”
One of the biggest confusions in the world of augmented reality is the difference between augmented reality and virtual reality. Both are earning a lot of media attention and are promising tremendous growth. So what is the difference between virtual reality vs. augmented reality?
What is Virtual Reality?
Virtual reality (VR) is an artificial, computer-generated simulation or recreation of a real life environment or situation. It immerses the user by making them feel like they are experiencing the simulated reality firsthand, primarily by stimulating their vision and hearing.
VR is typically achieved by wearing a headset like Facebook’s Oculus equipped with the technology, and is used prominently in two different ways:
To create and enhance an imaginary reality for gaming, entertainment, and play (Such as video and computer games, or 3D movies, head mounted display).
To enhance training for real life environments by creating a simulation of reality where people can practice beforehand (Such as flight simulators for pilots).
Virtual reality is possible through a coding language known as VRML (Virtual Reality Modeling Language) which can be used to create a series of images, and specify what types of interactions are possible for them.
What is Augmented Reality?
Augmented reality (AR) is a technology that layers computer-generated enhancements atop an existing reality in order to make it more meaningful through the ability to interact with it. AR is developed into apps and used on mobile devices to blends digital components into the real world in such a way that they enhance one another, but can also be told apart easily.
AR technology is quickly coming into the mainstream. It is used to display score overlays on telecasted sports games and pop out 3D emails, photos or text messages on mobile devices. Leaders of the tech industry are also using AR to do amazing and revolutionary things with holograms and motion activated commands.
Augmented Reality vs. Virtual Reality
Augmented reality and virtual reality are inverse reflections of one in another with what each technology seeks to accomplish and deliver for the user. Virtual reality offers a digital recreation of a real life setting, while augmented reality delivers virtual elements as an overlay to the real world.
How are Virtual Reality and Augmented Reality Similar?
Augmented and virtual realities both leverage some of the same types of technology, and they each exist to serve the user with an enhanced or enriched experience.
Both technologies enable experiences that are becoming more commonly expected and sought after for entertainment purposes. While in the past they seemed merely a figment of a science fiction imagination, new artificial worlds come to life under the user’s control, and deeper layers of interaction with the real world are also achievable. Leading tech moguls are investing and developing new adaptations, improvements, and releasing more and more products and apps that support these technologies for the increasingly savvy users.
Science and Medicine
Additionally, both virtual and augmented realities have great potential in changing the landscape of the medical field by making things such as remote surgeries a real possibility. These technologies been already been used to treat and heal psychological conditions such as Post Traumatic Stress Disorder (PTSD).
How do Augmented and Virtual Realities Differ?
Augmented reality enhances experiences by adding virtual components such as digital images, graphics, or sensations as a new layer of interaction with the real world. Contrastingly, virtual reality creates its own reality that is completely computer generated and driven.
Virtual Reality is usually delivered to the user through a head-mounted, or hand-held controller. This equipment connects people to the virtual reality, and allows them to control and navigate their actions in an environment meant to simulate the real world.
Augmented reality is being used more and more in mobile devices such as laptops, smart phones, and tablets to change how the real world and digital images, graphics intersect and interact.
How do they work together?
virtual reality vs. augmented reality– they do not always operate independently of one another, and in fact are often blended together to generate an even more immersing experience. For example, haptic feedback-which is the vibration and sensation added to interaction with graphics-is considered an augmentation. However, it is commonly used within a virtual reality setting in order to make the experience more lifelike though touch.
Virtual reality and augmented reality are great examples of experiences and interactions fueled by the desire to become immersed in a simulated land for entertainment and play, or to add a new dimension of interaction between digital devices and the real world. Alone or blended together, they are undoubtedly opening up worlds-both real and virtual alike.
20% percent of business content will be authored by machines.
6000,000,000 six billion connected things will be requesting support.
45% percent of the fastest-growing companies will have fewer employees than instances of smart machines.
3 three million workers globally will be supervised by a “robo-boss.”
CDA customer digital assistant will recognize individuals by face and voice across channels and partners.
2 two million employees will be required to wear health and fitness tracking devices as a condition of employment.
By 2020, Autonomous software agents outside of human control will participate in 5% of all economic transactions.
By 2020, smart agents will facilitate 40 percent of mobile interactions.
In the next five years, innovations in storage, devices, chips, and other hardware will revolutionize IT. Here are 10 emerging hardware technologies CIOs should begin to consider in their strategic roadmaps.
1: Mobile devices with hardened security
Security continues to be a major challenge with mobile devices. One option is Intel’s Software Guard Extension (SGX) technology, which will support the use of secure encrypted memory spaces on commodity CPUs. The goal is to provide applications with an area of secure and protected memory and execution. This could be a boon for mobile devices, a leading source of security breaches that corporate IT must contend with. “We will see the start of a new generation of systems solutions that guarantee security even if the operating system or other infrastructure gets compromised by hackers,” said Sriram Rajamani, Microsoft Research India’s assistant managing director, in an eWeek piece on tech predictions.
2: New chip architectures that improve machine learning performance
As more IoT and machine-based applications enter the IT mainstream, new chip architectures will improve performance over what is presently available with graphical processing units (GPUs). These performance improvements will dramatically improve data transfers and the execution of machine-based learning and analytics.
Unmanned aerial vehicles (UAVs) will continue to push themselves into commercial applications, whether it is delivering packages, taking photographic images, or surveying physical terrain that is difficult to access. They will collect IoT data through sensors and channel it into central communications.
4: Unmanned robots
Robots can carry out simple medical procedures, clean facilities, and pick and pack items in warehouses. The intelligence in these automated machines will be further increased as new technologies come onboard to collect everything that has been learned by all machines into a central data bank that any machine can access.
5: More user-friendly virtual reality gear
Bulky headsets have encumbered VR users and made them dizzy or seasick, prompting companies to avoid VR applications. That’s about to change. For example, Google cardboard provides a small holder for your smart phone and delivers a full-bodied video experience that rivals those produced through older headgear. More comfortable VR headgear will pave the way for greater corporate adoption of VR.
6: New storage technology for greener power grids
Data centers will continue to go green as power companies find better ways to seamlessly blend diverse energy sources, such as solar, wind, and traditional fossil fuel, into a seamless and uninterrupted supply of energy. Today, the use of hybrid energy is difficult because sources like wind and solar can be variable. But better storage can solve this and usher in a new green era that could save data centers and other energy users an estimated $3.4 billion per year.
7: More on-the-job wearables
Jupiter research predicts that smart glasses, smart watches, and a range of motion-sensing devices could improve productivity by 30%. Gartner predicts that by 2018, two million employees, such as law enforcement officers and paramedics, will be required to wear health and fitness tracking devices.
8: Local energy harvesting for Internet access
With automation and a plethora of IoT devices being added to the internet’s workload, new technology is needed to add to bandwidth and ready access. University of Washington researchers have developed technology that enables internet-connected temperature and motion sensors, cameras, etc., to communicate by using only energy harvested from nearby TV, radio, cellphone, and Wi-Fi signals. A principle known as backscattering allows IoT devices to absorb energy emitted by other electronics, enabling them to reduce their internet bandwidth demands. This localized Wi-Fi consumes just 1/10,000th as much power as existing Wi-Fi chipsets.
9: More compact flash memory
3D NAND technology continues to move forward, delivering smaller and more lightweight laptops, tablets, and other devices. Much of this progress is due to the ability of companies like Intel and Micron to stack flash memory cells vertically, which conserves space and enables devices to be smaller and thinner.
10: Nonvolatile memory
With nonvolatile memory, computers can retrieve information even after being turned off and back on. Going forward, we will see new forms of nonvolatile memory that will enable data to be stored at less cost and less power. This will enable smaller devices to store even more data.
Welcome on board
Get the full image
Understanding the work space (people, equipment, software)
Explore the production workflow processes, business model
Familiarize with organization policies and procedures
Determine performance influencers and key indicators
Socialize with board members
Find underestimated unhappy mentors
Avoid undercover agents insiders and gossip tellers
To know the communication deficits and blockbusters
Search for bullies and donkey workers and progress suppressors
Define a plan from where to start and whom to start with
Be effective and efficient
Show self esteem
Find shortcuts and zigzaggers
Capacity sizing and planning
Define Communication channels
Discover failure stories
Keep listening and learn
Evaluate underpinning contracts
Establish direct vendor relationships and SLA