Saturday, December 26, 2015

Netiquette IQ Blog Of 12/26/2015 - Gartner’s top 10 strategic technologies for 2016 from information-age.com

Gartner’s top 10 strategic technologies for 2016 from information-age.com

Analyst firm shoots for machine learning, autonomous agents and the Internet of Things among the technologies that will most impact business strategies next year

Posted by Ben Rossi
on 7 October 2015

Analyst firm Gartner has revealed the top ten technology trends that it predicts will be strategic for most organisations in 2016.
The company defines a strategic technology trend as one with the potential for significant impact on the organisation.
Factors that denote significant impact include a high potential for disruption to the business, end users or IT, the need for a major investment, or the risk of being late to adopt. These technologies impact the organisation's long-term plans, programmes and initiatives.
"Gartner's top ten strategic technology trends will shape digital business opportunities through 2020," said David Cearley, VP and Gartner Fellow. "The first three trends address merging the physical and virtual worlds and the emergence of the digital mesh. While organisations focus on digital business today, algorithmic business is emerging.
“Algorithms – relationships and interconnections – define the future of business. In algorithmic business, much happens in the background in which people are not directly involved. This is enabled by smart machines, which our next three trends address.
“Our final four trends address the new IT reality, the new architecture and platform trends needed to support digital and algorithmic business.”
1. The device mesh
The device mesh refers to an expanding set of endpoints people use to access applications and information or interact with people, social communities, governments and businesses.
This includes mobile devices, wearable, consumer and home electronic devices, automotive devices and environmental devices – such as sensors in the Internet of Things (IoT).
"In the post-mobile world, the focus shifts to the mobile user who is surrounded by a mesh of devices extending well beyond traditional mobile devices," said Cearley.
While devices are increasingly connected to back-end systems through various networks, they have often operated in isolation from one another.
As the device mesh evolves, Gartner expects connection models to expand and greater cooperative interaction between devices to emerge.
2. Ambient user experience
The device mesh creates the foundation for a new continuous and ambient user experience. Immersive environments delivering augmented and virtual reality hold significant potential but are only one aspect of the experience.
The ambient user experience preserves continuity across boundaries of device mesh, time and space. The experience seamlessly flows across a shifting set of devices and interaction channels blending physical, virtual and electronic environment as the user moves from one place to another.
"Designing mobile apps remains an important strategic focus for the enterprise," said Cearley. "However, the leading edge of that design is focused on providing an experience that flows across and exploits different devices, including IoT sensors, common objects such as automobiles, or even factories.
“Designing these advanced experiences will be a major differentiator for independent software vendors (ISVs) and enterprises alike by 2018."
3. 3D printing materials
Advances in 3D printing have already enabled 3D printing to use a wide range of materials, including advanced nickel alloys, carbon fiber, glass, conductive ink, electronics, pharmaceuticals and biological materials.
These innovations are driving user demand, as the practical applications for 3D printers expand to more sectors, including aerospace, medical, automotive, energy and the military.
The growing range of 3D-printable materials will drive a compound annual growth rate of 64.1% for enterprise 3D-printer shipments through 2019, according to Gartner.
These advances will necessitate a rethinking of assembly line and supply chain processes to exploit 3D printing.
"3D printing will see a steady expansion over the next 20 years of the materials that can be printed, improvement in the speed with which items can be printed and emergence of new models to print and assemble composite parts," said Cearley.
4. Information of everything
Everything in the digital mesh produces, uses and transmits information. This information goes beyond textual, audio and video information to include sensory and contextual information. Information of everything addresses this influx with strategies and technologies to link data from all these different data sources.
Information has always existed everywhere but has often been isolated, incomplete, unavailable or unintelligible. Advances in semantic tools such as graph databases as well as other emerging data classification and information analysis techniques will bring meaning to the often-chaotic deluge of information.
5. Advanced machine learning
In advanced machine learning, deep neural nets (DNNs) move beyond classic computing and information management to create systems that can autonomously learn to perceive the world, on their own.
The explosion of data sources and complexity of information makes manual classification and analysis infeasible and uneconomic. DNNs automate these tasks and make it possible to address key challenges related to the information of everything trend.
DNNs (an advanced form of machine learning particularly applicable to large, complex datasets) is what makes smart machines appear ‘intelligent’.
They enable hardware- or software-based machines to learn for themselves all the features in their environment, from the finest details to broad sweeping abstract classes of content.
This area is evolving quickly, and Gartner advises organisations to assess how they can apply these technologies to gain competitive advantage.
6. Autonomous agents and things
Machine learning gives rise to a spectrum of smart machine implementations – including robots, autonomous vehicles, virtual personal assistants (VPAs) and smart advisors – that act in an autonomous (or at least semiautonomous) manner.
While advances in physical smart machines, such as robots, get a great deal of attention, the software-based smart machines have a more near-term and broader impact.
VPAs such as Google Now, Microsoft's Cortana and Apple's Siri are becoming smarter and are precursors to autonomous agents.
The emerging notion of assistance feeds into the ambient user experience in which an autonomous agent becomes the main user interface.
Instead of interacting with menus, forms and buttons on a smartphone, the user speaks to an app, which is really an intelligent agent.
"Over the next five years we will evolve to a post-app world with intelligent agents delivering dynamic and contextual actions and interfaces," said Cearley. "IT leaders should explore how they can use autonomous things and agents to augment human activity and free people for work that only people can do.
“However, they must recognise that smart agents and things are a long-term phenomenon that will continually evolve and expand their uses for the next 20 years."
7. Adaptive security architecture
The complexities of digital business and the algorithmic economy combined with an emerging ‘hacker industry’ significantly increase the threat surface for an organisation.
Relying on perimeter defense and rule-based security is inadequate, especially as organisations exploit more cloud-based services and open APIs for customers and partners to integrate with their systems.
IT leaders must focus on detecting and responding to threats, as well as more traditional blocking and other measures to prevent attacks, says Gartner. Application self-protection, as well as user and entity behavior analytics, will help fulfill the adaptive security architecture.
8. Advanced system architecture
The digital mesh and smart machines require intense computing architecture demands to make them viable for organisations. Providing this required boost are high-powered and ultraefficient neuromorphic architectures.
Fueled by field-programmable gate arrays (FPGAs) as an underlining technology for neuromorphic architectures, there are significant gains to this architecture, such as being able to run at speeds of greater than a teraflop with high-energy efficiency.
"Systems built on GPUs and FPGAs will function more like human brains that are particularly suited to be applied to deep learning and other pattern-matching algorithms that smart machines use," said Cearley.
"FPGA-based architecture will allow further distribution of algorithms into smaller form factors, with considerably less electrical power in the device mesh, thus allowing advanced machine learning capabilities to be proliferated into the tiniest IoT endpoints, such as homes, cars, wristwatches and even human beings."
9. Mesh app and service architecture
Monolithic, linear application designs (e.g., the three-tier architecture) are giving way to a more loosely coupled integrative approach: the apps and services architecture.
Enabled by software-defined application services, this new approach enables web-scale performance, flexibility and agility.
Microservice architecture is an emerging pattern for building distributed applications that support agile delivery and scalable deployment, both on-premises and in the cloud.
Containers are emerging as a critical technology for enabling agile development and microservice architectures.
Bringing mobile and IoT elements into the app and service architecture creates a comprehensive model to address back-end cloud scalability and front-end device mesh experiences.
Application teams must create new modern architectures to deliver agile, flexible and dynamic cloud-based applications with agile, flexible and dynamic user experiences that span the digital mesh.
10. Internet of Things platforms
IoT platforms complement the mesh app and service architecture. The management, security, integration and other technologies and standards of the IoT platform are the base set of capabilities for building, managing and securing elements in the IoT.
IoT platforms constitute the work IT does behind the scenes from an architectural and a technology standpoint to make the IoT a reality. The IoT is an integral part of the digital mesh and ambient user experience and the emerging and dynamic world of IoT platforms is what makes them possible.
"Any enterprise embracing the IoT will need to develop an IoT platform strategy, but incomplete competing vendor approaches will make standardisation difficult through 2018," said Cearley.
===========================================
For a great email parody, see the link below:
https://www.youtube.com/watch?v=HTgYHHKs0Zw
scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Tabula Rosa Systems Definition Of The Day - Going Dark

Going dark – from whatis.com
Part of the Customer data management glossary:
Going dark is slang for the sudden termination of communication. In the military, the term is also used to describe a scenario in which communication appears to have ceased, but in reality has just moved from a public communication channel, where it could be monitored, to a private communication channel that prevents eavesdropping.
According to the United States Federal Bureau of Investigation (FBI), terrorists use mobile apps and encryption to go dark and make it difficult for the Bureau to monitor conversations in legally-intercepted transmissions. FBI Director James Comey described the going dark problem at the Aspen Security Conference in July 2015: “ISIL's M.O. is to broadcast on Twitter, get people to follow them, then move them to Twitter Direct Messaging" to evaluate them as recruits. "Then they'll move them to an encrypted mobile-messaging app so they go dark to us."
Mobile apps that use end-to-end encryption (E2EE) are designed to protect data at rest and in transit and keep the end user's text messages, emails and video chats private and secure. However, the same technologies that protect user communications from intruders make it impossible for government agencies to make sense of the transmissions they legally gather, especially if the app uses strong encryption.
The National Security Agency (NSA) has proposed two potential encryption methods to solve the going dark problem: split-key encryption and encryption using "key escrow." In split key encryption, also known as secret sharing, the technology vendor or service provider retains half of a master key and law enforcement retains the other half so that decryption requires participation of both parties. For key escrow, decryption requires multiple keys, one of which is stored separately from the user, possibly in a government agency location.
Opponents of the proposed technologies maintain that both methods would be prohibitively complex to implement and the complexity would provide points of entry that would ultimately endanger user data security.
https://www.youtube.com/watch?v=HTgYHHKs0Zw
scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================

Friday, December 25, 2015

Tabula Rosa Systems On Ecards - Security Concerns







It's holiday time for many around the world. Sending ecards for many is something they feel awkward about doing. Others would much rather receive a personalized greeting. Nonetheless, ecards do give you the capability to send many cards which was impossible just a few years ago. The article below, taken from my book, discusses some of the downsides and solutions.

Happy Holidays and Peace for all throughout the world!
=====================================
==========================================
One of the major downsides of ecards is that security can be compromised: when someone purchases an ecard, he or she is providing information to the seller, or third party. One of the more extreme examples of this is that the Children’s Online Privacy Protection Act (COPPA) is suspended to allow sites to accept a child’s ecard request and addresses without parental permission, as would normally be the case. There are also countless scams involving ecards, which can mislead children or people of any age. It is almost too much to ask certain people to have the discipline not to open ecards.
While there is much positive impact associated with ecards, as has been discussed, the negative issues, particularly many of the most significant ones, can have, more often, negative effects. After all, far more people would rather have a real or, at the very least, personalized ecard.

For those who will steadfastly refuse to open an ecard, there may very well be times when a legitimate message goes unopened—still another negative outcome. This can end up with an effect such as having the recipient feel disappointment that he or she did not receive a greeting or invitation by someone he or she was expecting to hear from. What is a good solution? There are some very popular ecard providers. If you want to use trusted sources of ecards, go to either www.jacquielawson.com or www.care2.com/ecards  ==============================================================

https://www.youtube.com/watch?v=HTgYHHKs0Zw
scoop_post=bcaa0440-2548-11e5-c1bd-90b11c3d2b20&__scoop_topic=2455618



==============================================

Special Bulletin - My just released book

"You're Hired. Super Charge our Email Skills in 60 Minutes! (And Get That Job...) 

is now on sales at Amazon.com 

Great Reasons for Purchasing Netiquette IQ
·         Get more email opens.  Improve 100% or more.
·         Receive more responses, interviews, appointments, prospects and sales.
·         Be better understood.
·         Eliminate indecision.
·         Avoid being spammed 100% or more.
·         Have recipient finish reading your email content. 
·         Save time by reducing questions.
·         Increase your level of clarity.
·         Improve you time management with your email.
·        Have quick access to a wealth of relevant email information.
Enjoy most of what you need for email in a single book.

 =================================

**Important note** - contact our company for very powerful solutions for IP
 management (IPv4 and IPv6, security, firewall and APT solutions:
www.tabularosa.net
==================================================

Another Special Announcement - Tune in to my radio interview,  on Rider University's station, www.1077thebronc.com I discuss my recent book, above on "Your Career Is Calling", hosted by Wanda Ellett.   

In addition to this blog, Netiquette IQ has a website with great assets which are being added to on a regular basis. I have authored the premiere book on Netiquette, “Netiquette IQ - A Comprehensive Guide to Improve, Enhance and Add Power to Your Email". My new book, “You’re Hired! Super Charge Your Email Skills in 60 Minutes. . . And Get That Job!” has just been published and will be followed by a trilogy of books on Netiquette for young people. You can view my profile, reviews of the book and content excerpts at:

 www.amazon.com/author/paulbabicki

In addition to this blog, I maintain a radio show on BlogtalkRadio  and an online newsletter via paper.li.I have established Netiquette discussion groups with Linkedin and  Yahoo I am also a member of the International Business Etiquette and Protocol Group and Minding Manners among others. I regularly consult for the Gerson Lehrman Group, a worldwide network of subject matter experts and I have been contributing to the blogs Everything Email and emailmonday . My work has appeared in numerous publications and I have presented to groups such as The Breakfast Club of NJ and  PSG of Mercer County, NJ.


I am the president of Tabula Rosa Systems, a “best of breed” reseller of products for communications, email, network management software, security products and professional services.  Also, I am the president of Netiquette IQ. We are currently developing an email IQ rating system, Netiquette IQ, which promotes the fundamentals outlined in my book.

Over the past twenty-five years, I have enjoyed a dynamic and successful career and have attained an extensive background in IT and electronic communications by selling and marketing within the information technology marketplace.Anyone who would like to review the book and have it posted on my blog or website, please contact me paul@netiquetteiq.com.
=============================================================