Tag Archives: orange county pr

10Fold – Security Never Sleeps – 72

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: First, an anonymous twitter account found a way around having to pay ransomware. Security researcher Zach Straley exposed a way to permanently brick your iPhone. Cisco Talos Lab released a report that highlights what ransomware could have in store next. BAE Systems discovered new shape-shifting malware that is now targeting the public sector.

Experts crack nasty ransomware that took crypto-extortion to new heights – Publication: Ars Technica- Reporter name: Dan Goodin

A nasty piece of ransomware that took crypto-extortion to new heights contains a fatal weakness that allows victims to decrypt their data without paying the hefty ransom. When it came to light two weeks ago, Petya was notable because it targeted a victim’s entire startup drive by rendering its master boot record inoperable. It accomplished this by encrypting the master boot file and displaying a ransom note. As a result, without the decryption password, the infected computer wouldn’t boot up, and all files on the startup disk were inaccessible.

New Threat Can Auto-Brick Apple Devices – Publication: Krebs on Security – Reporter name:Brian Krebs

If you use an Apple iPhone, iPad or other iDevice, now would be an excellent time to ensure that the machine is running the latest version of Apple’s mobile operating system — version 9.3.1. Failing to do so could expose your devices to automated threats capable of rendering them unresponsive and perhaps forever useless.

Imagining The Ransomware Of The Future – Publication: Dark Reading – Reporter name: Sara Peters

That’s the nightmare that researchers at Cisco Talos Labs described in a report today: a self-propagating, stealthy, modular ransomware that can move laterally across internal networks and cross air-gapped systems. In addition to the standard core ransomware functionality, Cisco Talos’ hypothesized “King’s Ransom framework” has a variety of modules for both stealth and propagation.

This new strain of Qbot malware is tougher than ever to find and destroy– Publication: ITPro – Reporter name: Rene Millman

Researchers managed to analyze the new strain and discovered a number of modifications had been made to the original Qbot malware to make it harder to detect and intercept. These included a new ‘shape-changing’ or polymorphic code, which meant that each time the malware’s code was issued by the servers controlling it, it was compiled afresh with additional content, making it look like a completely different program to researchers looking for specific signatures.

10Fold – Security Never Sleeps – 68

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  The entire Turkish citizen database has been leaked online, and the hack appears to be politically motivated. Microsoft released a 64-bit version of Windows 10 IoT Pro that is specifically designed for small internet-connected devices. Today Toyota announced a partnership with Microsoft to further develop a connected car and their systems to personalize to every driver. Lastly, in an interesting blog post, a security researcher explained how he hacked the Domino’s pizza app to bypass the payment page and get free pizza which highlighted the vulnerabilities located in company apps.


The entire Turkish citizenship database has allegedly been leaked online – Publication: Business Insider – Reporter name: Lianna Brinded

The entire Turkish citizenship database has allegedly been hacked and leaked online. A website with purportedly leaked details of 49,611,709 Turkish citizens is online and allegedly gives the following details of each citizen — including the Turkish President Tayyip Erdogan: National Identifier (TC Kimlik No), First Name, Last Name, Mother’s First Name, Father’s First Name, Gender, City of Birth, Date of Birth, ID Registration City and District, Full Address. The apparent hack seems to be politically motivated. The website reads: “Who would have imagined that backwards ideologies, cronyism and rising religious extremism in Turkey would lead to a crumbling and vulnerable technical infrastructure?”

Microsoft releases a 64-bit version of Windows 10 IoT Core Pro – Publication: VentureBeat – Reporter name: Jordan Novet

Microsoft today announced that it’s releasing a 64-bit (x64) version of Windows 10 IoT Core Pro. This is a special flavor of the edition of Windows 10 designed for small Internet-connected devices that’s exclusively available to original equipment manufacturers (OEM). “This will enable OEM/ODMs (original design manufacturers) to move between Windows 10 IoT Core and Windows 10 IoT Enterprise without the need to maintain a separate firmware image for their devices,” Brett Bentsen, partner group program manager for Windows IoT at Microsoft, wrote in a blog post. “Additionally, we’re making the Board Support Package for the Raspberry Pi open source (except for the UEFI parts) to help OEM/ODMs provide a customized board experience.”

Toyota teams with Microsoft on connected cars – Publication: USA Today – Reporter name: Nathan Bomey & Chris Woodyard

Toyota announced an enhanced relationship with Microsoft on Monday aimed at delivering “connected car” services to drivers in ways they probably never could have imagined. Already, drivers ask the infotainment system in their cars for restaurant recommendations, but many locations often would require that a driver turn around. But with Toyota Connected, the system might be modified to only recommend restaurants on the highway ahead — and then only the kinds of food that the driver usually prefers.

This Hacker Found a Way to Get Free Domino’s Pizza for Life – Publication: Fortune – Reporter name: Robert Hackett

Paul Price, a computer security researcher based in the United Kingdom, three years ago hit the pizza jackpot. He found a computer bug affecting a Domino’s mobile app on Google Android that allowed him to place orders free of charge. All Price had to do to hack the system was to input some obviously fake debit card information (Visa number: 4111111111111111), intercept the traffic between his phone and Domino’s computer servers, and tweak the data that typically turns up an error message, he says. Literally, he rewrote some code to read “accepted” instead of “declined,” which green-lit the order.

10Fold – Security Never Sleeps – 66

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider:  Leaked documents dubbed the “Panama Papers” revealed financial schemes and offshore financing from some of the world’s most powerful people. The FBI has now promised to help unlock iPhones across the country, although not guaranteeing it will be able to use the same method that successful unlocked the San Bernardino terrorist phone. The investigation into MedStar Health continues as experts look into how to better protect hospitals. A study found that 90 percent of corporate executives said they don’t know how to read a cybersecurity report and 40 said they don’t feel responsible for the repercussions of hacking.

World figures deny wrongdoing as ‘Panama Papers’ turn spotlight on tax evasion – Publication: Reuters – Reporter name: Kylie Maclellan & Elida Moreno

Governments across the world began investigating possible financial wrongdoing by the rich and powerful on Monday following a leak of documents from a Panamanian law firm which allegedly showed how clients avoided tax or laundered money. The documents detailed schemes involving an array of figures from friends of Russian President Vladimir Putin to relatives of the prime ministers of Britain, Iceland and Pakistan and as well as the president of Ukraine, journalists who received them said. While the “Panama Papers” detail complex financial arrangements benefiting the world’s elite, they do not necessarily mean the schemes were all illegal.

FBI will help US agencies with tools to unlock encrypted devices – Publication: CIO – Reporter name: John Riberiro

The FBI has promised to help local law enforcement authorities crack encrypted devices, in a letter that refers to the federal agency’s success in accessing the data on an iPhone 5c running iOS 9 that was used by one of the San Bernardino terrorists. The agency did not, however, explicitly promise investigators that it would deploy the same tool, said to have been developed by an outside organization, on other iPhones.

Under pressure to digitize everything, hospitals are hackers’ biggest new target – Publication: The Washington Post – Reporter name: Carolyn Y. Johnson & Matt Zapotosky

In some ways, health care is an easy target: Its security systems tend to be less mature than those of other industries, such as banking and tech, and its doctors and nurses depend on data to perform time-sensitive, life-saving work. Where a financial-services firm might spend a third of its budget on information technology, hospitals spend only about 2 to 3 percent, said John Halamka, the chief information officer of Beth Israel Deaconess Medical Center in Boston. “If you’re a hacker… would you go to Fidelity or an underfunded hospital?” Halamka said. “You’re going to go where the money is and the safe is easiest to open.”

Execs: We’re not responsible for cybersecurity – Publication: CNBC – Reporter name: Tom DiChristopher

More than 90 percent of corporate executives said they cannot read a cybersecurity report and are not prepared to handle a major attack, according to a new survey. More distressing is that 40 percent of executives said they don’t feel responsible for the repercussions of hackings, said Dave Damato, chief security officer at Tanium, which commissioned the survey with the Nasdaq. The findings come at a time when companies around the world are losing $445 billion due to cybercrime last year, according to an estimate by the Center for Strategic and International Studies.

10Fold – Security Never Sleeps – 63

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: A new sneaky form of malware can be found on USB devices. This week, personal data from thousands of foreign nationals living in Thailand was leaked and appeared on the dark web. Six people have been charged with tampering a lottery terminal to produce more winning tickets. An art gallery is highlighting the intrusive nature of live surveillance cameras by spotting people jaywalking and allowing random people to report her jaywalker.

Dangerous New USB Trojan Discovered – Publication: Dark Reading – Reporter name: Jai Vijayan

The Internet and the growing interconnectedness of networks have made it incredibly easy for threat actors to deliver and propagate malware. But not all cyber threats are Internet-borne. Take USB Thief, new malware sample that researchers at security firm ESET recently discovered.  As its name implies, the malware is completely USB-borne, meaning it spreads exclusively through devices that plug into the USB port of computers.

Data Breach Reveals Expat Details in Thailand – Publication: SecurityWeek – Reporter name: STAFF

The personal details of thousands of foreign nationals living in southern Thailand were briefly leaked online in what the site’s developer admitted Monday was a data breach during a test for police. The gaffe was spotted by social media users late Sunday when a database appeared online containing the names, addresses, professions and passport numbers of more than 2,000 foreigners living in Thailand’s southern provinces.

Cops: Lottery terminal hack allowed suspects to print more winning tickets – Publication: Ars Technica – Reporter name: Dan Goodin

Six people have been charged in what prosecutors say was a scheme to hack Connecticut state lottery terminals so they produced more winning tickets and fewer losing ones. Of tickets generated at one liquor store, for instance, 76 percent were instant winners in one sample and 59 percentin another sample. The state-wide average, meanwhile, was just 24 percent. After manipulating the terminals, the suspects cashed the tickets and took the proceeds, prosecutors alleged.

Turning Live Surveillance Feeds Into Unsettling Works of Art – Publication: Wired – Reporter name: Andy Greenberg

The webcam’s public feed, like thousands of others like it, is accessible to anyone who can find its URL with a Google search. At an art gallery thousands of miles away, a tiny Raspberry Pi computer is streaming the video to a monitor while it analyzes the footage with a simple computer vision algorithm. It instantly snitches, flashing, “WOULD YOU LIKE TO REPORT THE JAYWALKER?” on the screen. If you’re a visitor at this gallery, you’ll face a choice: hit a red button in front of the computer, and it will send a screenshot of the incident in an email to the nearest police precinct, potentially costing her a $42 fine. Or you can let the oblivious lawbreaker go on her way.

What’s New in App Development #2

Your regular digest of “What’s New in App Development” gathered and collected by the 10Fold Enterprise, Mobility & Telecom Practice Team.

Big items to consider: A recent TechTarget story highlights the evolution of network platform requirements as more and more devices – from cars to shipping containers – become connected. The U.S. Federal Trade Commission recent issued warnings to a dozen Android app developers for using code known as “SilverPush” in their apps, which uses a smartphone’s microphone to listen to nearby TV audio in an effort to deliver more targeted ads. A recent report around mobile app risk assessment by Flexera Software talks about BYOD security issues related to ‘March Madness’. And finally, Nintendo recently announced its entry in the mobile app business with its latest app Miitomo launched in Japan, an app that has already been downloaded by a million users.

Building enterprise network platforms for tomorrow – SearchSDN (TechTarget)

As analyst Lee Doyle recently noted, the complexity of IoT networking needs – in terms of device connectivity, data analysis and security and integration with existing IT systems – represents a major challenge for most organizations.

For example, selecting the right wireless network is key for collecting and handling a heavy stream of real-time data. The industry also currently lacks mature standards that are essential for interoperability of various IoT devices/systems. There are also multiple challenges with regard to securing, managing and integrating network platforms when it comes to IoT applications. Overall, organizations need partners that can “provide the expertise and professional services capabilities to integrate, secure and manage a number of network platform elements.”

FTC warns app developers against using audio monitoring software – InfoWorld

Is your cell phone spying on you? Thanks to hidden code in some Apps, concerns about illegal cell phone spying are growing. The U.S. Federal Trade Commission recently sent warning letters to 12 smartphone app developers for allegedly compromising users’ privacy by packaging audio monitoring software into their products.

The software, from an Indian company called SilverPush, allows apps to use the smartphone’s microphone to listen to nearby TV audio in an effort to deliver more targeted ads. SilverPush allows the apps to surreptitiously monitor the television viewing habits of people who downloaded apps with the software included, the FTC said.

March Madness Apps May Be Accessing Your Data – App Developer Magazine

In its mobile app risk assessment report, “March Madness or April Fools,” Flexera Software highlighted BYOD security issues by analyzing the annual March Madness craze as employees are using apps on their corporate and BYOD devices to stream content, complete brackets and track March Madness activities.

The report focused on what data these apps access, what device features they can interact with and could these apps pose a potential security risk to organizations or violate their BYOD policies. The report examined 28 popular media and sporting apps that are available in the Apple App Store to assess them for potential BYOD risk to organizations.

Here’s How Nintendo Just Got a Whole Lot More Valuable – Fortune

Remember your favorite video game company, Nintendo? Considered a latecomer to mobile gaming, it has finally launched its first mobile app, Miitomo, in Japan and it is expected to be available for users in the U.S. by the end of this month.

The new social messaging service has already garnered more than a million Japanese users and it is the No. 1 free download in the country’s App Store, according to data from App Annie. Nintendo’s stock is getting a big boost off the news. Nintendo shares rose Tuesday more than they have in over a month in Japan, jumping 8.2%, as Bloomberg reports. It’s a promising sign for a company that has lost about 80% of its stock value since Apple’s iPhone came on the market back in 2007.

This Week in MarTech: The Inevitable Move Towards Mobile Marketing

With more than seven billion mobile devices worldwide and 1.8 billion smartphones in use (a 25% increase in the past year alone), we can’t over-emphasize the fact that the adoption of mobile devices is still accelerating. We are witnessing a clear shift towards a mobile-first world; this change creates both opportunities and new challenges for brands that are constantly coveting the most effective marketing strategies.  Organizations are tasked with finding the right moment to attract, convert, and retain the right customers in a crowded and evolving mobile-first ecosystem. No wonder Google is changing its search algorithms to encourage mobile adoption for marketing purposes. Below is a recap of the latest news and insights from the marketing technology industry.

Mobile marketers are embracing emojis to reach consumers – Business Insider

A new report by Appboy, a marketing automation company, reveals that mobile marketers are using more emojis in their email and push campaigns. Appboy analyzed almost 9,400 marketing campaigns across iOS and Android platforms and discovered that emoji usage within those messages had soared 775% year-over-year in the period ending March 2016. The analysis also revealed that annual emoji usage growth was greater on Android (1,070%) than on iOS (662%).

Google’s latest mobile search algorithm update makes having a mobile-friendly site even more important – TechCrunch

To give publishers even more of an incentive to offer mobile-friendly pages, Google announced recently that, in May, it will increase the importance of having a mobile page, and sites that are not mobile-friendly will rank even lower than before. The search giant wants to focus on mobile friendly real time search results and it has also introduced a mobile friendly Inbox.

Don’t believe (all) the martech hype – CIO

In this article, Sharon Goldman, reporter at CIO, explains that while advances in marketing technology can help companies discover, track and engage with customers in new ways, one should not be fooled into thinking that martech is the silver bullet for all marketing needs. Sharon explains that instead of relying heavily on Martech solutions to drive ROI, companies first need to determine specific end goals, then use marketing technologies to help them reach those said goals.

The Hottest Trend in Marketing – Huffington Post

In this contributed article, Joanne Tombrakos, Marketing and Sales Consultant and an adjunct Professor at NYU recaps a presentation by Scott Galloway, founder and chairman of L2 Inc. at the Digital Bok World conference. Scott explains that many companies end up losing their customers because they never listen to what their customers are saying or how they are reacting in real time. Per Joanne, today customer service is a differentiating factor and it’s easier to keep a customer than get a new one.

5 marketing trends surfacing at SXSW 2016 – VentureBeat

SXSW Interactive 2016 wrapped up last week with thousands of marketers descending upon Austin, Texas for food, fun, and a glimpse at new and emerging technologies that will impact how brands connect with consumers. Even in its 23rd year, SXSW Interactive’s influence and role in innovation is not waning. Several trends surfacing this year will greatly impact how brands and consumers interact, including – virtual reality is here to stay, social media is evolving into social messaging, and an era of connected everything is upon us.


Salesforce Launches Field Service Lightning and Salesforce IQ Inbox to Transform Field Service – MarTech Advisor

Salesforce has taken note of the growing demand for tools that connect the on-field workforce with the announcement of Field Service Lightning – a product that promises to connect field service agents with customer data on a single platform. The competition for the field service software market with new entrants such as ServiceMax, as well as rivals Microsoft and Oracle, all competing to build a field service platform.


HP Software Simplifies Digital Experience Management for Marketers – MarTech Advisor

This week, HP Software announced the launch of HP TeamSite 8.1 which aims to help marketers move easily from design to templates, adds push notifications for mobile apps, and delivers integrated analytic insights. According to HP software, the upgrade adds a new way to enhance mobile experiences with push notifications, making it faster and easier to send reminders or announcements to app users, and includes geo-fencing to specific locations or regions.

10Fold – Big Data Business Insights – 43

Big Data

10 FOLD ICON 15x15 For big data technologies like Hadoop and Spark, complexity remains a major barrier for their adoption. BlueData’s software makes it easier to deploy big data infrastructure and applications. Today, BlueData is launching the latest release of its EPIC software platform, which introduces several security and other upgrades to provide a smoother Big-Data-as-a-Service experience. The latest release incorporates many features and functionality enhancements requested by BlueData’s customers across multiple industries including financial services, pharmaceuticals, healthcare, technology, telecommunications, energy, government, and education. Additional new features include more granular resource management controls, QoS-based allocation, performance optimizations, and quota enforcement for multi-tenant big data deployments. The enterprise version of BlueData’s platform now provides additional security and governance capabilities to meet enterprise-class auditing and regulatory compliance requirements.

10 FOLD ICON 15x15  In order to take full advantage of big data platforms, such as Hadoop and Spark, IT and analytics teams often require a new education for configuring systems and partition data to maximize processing speeds. TechTarget examines the challenges some businesses have encountered when deploying Hadoop, including Valence Health, Progressive Insurance, and Sellpoints Inc. All organizations encountered issues with understanding Hadoop’s underlying structure and how to leverage the technology efficiently and quickly enough to receive a productive return-on-investment.

New platform aims to break down barriers to big data adoption – BetaNews

Big data platforms pose structural issues for new users – Tech Target

Self Service / Enterprise

10 FOLD ICON 15x15 Alteryx has deepened its relationship with Microsoft in an announcement that sees Alteryx Designer available from a virtual machine on the Azure marketplace. This extends the relationship announced in October 2015 which saw Alteryx integrate with Microsoft Power BI. Alteryx Designer users are able to create a pre-configured virtual machine to rapidly speed up their time scales for realizing the benefits of analytics of their data. Using the Alteryx Designer workflows, analysts can reduce their time to insight in what Alteryx believes is hours rather than weeks. For those companies already invested in Alteryx it also seems like it is possible to migrate licenses from existing solutions onto the Azure platform, although Alteryx need to be contacted to process this. The Alteryx designer platform on Azure will not only be pre-configured to integrate with Power-BI but will also come with other new features. Among those are pre-defined examples of workflows that allow data analysts, new to the solution, to be able to rapidly deploy insights using their own data using the examples as a template for their own solutions. Alteryx Designer also delivers an intuitive user interface for self service analytics with workflows that combine data preparation, data blending, and analytics (predictive, statistical and spatial)

How close can Alteryx and Microsoft get?–Enterprise Times


10 FOLD ICON 15x15 Marketing today walks a thin line between creepiness and helpfulness. B2C offers eight suggestions for marketers to follow to avoid being viewed as a “peeping tom.” The article suggests marketers refrain from making language and targeted advertising too personal before a customer relationship has been established. Additionally, marketers should practice patience with new customers and avoid bombarding them with emails simply because they purchased one item from a website. Another tip recommends avoiding personalizing a shopper’s experienced based upon minimal searches — e-marketers should segment their viewers and customers to target them in the correct ways.

Run, Buyer, Run! When Personalization Borders on Harassment/Creepiness – B2C

Software Defined Networking

10 FOLD ICON 15x15 In a new white paper from Cloud Security Alliance, there is some important information about security challenges and the increased risks of implementing virtual networks. The first risk of SDN is how SDN needs to be centralized around an overall controller that keeps track of the virtual network deployments and operations. This goes against the nature of cloud computing environments. Second, NFV infrastructure may not be compatible with existing virtual machine hypervisors and cloud servers. Third, the typical SDN deployment has its own hardware and management systems that may be unfamiliar to network administrators who are steeped in running traditional networks. The added complexity of NFV can hide potentially dire consequences including successful intruders that may manipulate the network routes. There are some benefits that can improve enterprise security with properly planned NFV, companies can build in security functions as part of their network fabric, such as intrusion prevention devices, virtual load balancers and firewalls.

Security Challenges with the Virtual Network: Part II – Security Intelligence – Security Intelligence (IBM Blog)

What’s New in App Development #1

Your regular digest of “What’s New in App Development” gathered and collected by the 10Fold Enterprise, Mobility & Telecom Practice Team.

Big items to consider: WhatsApp, a popular messaging app, recently announced app updates and mobile platform changes as it celebrates its 7th anniversary. Apple may also be getting us closer to making the term, ‘Anybody can code,’ a reality, with its Apple Swift programming language. Finally, a recent survey by InMobi focuses on the mobile app ecosystem to examine the most popular apps – and where the app money truly lies.

WhatsApp to only support phones with the latest mobile platforms by 2017; Bad news for Blackberry, Nokia? – Lawyer Herald

Big changes are coming to WhatsApp, the popular messaging app. WhatsApp Inc. recently announced that in order to improve its mobile messaging app’s speed, reliability, and security, it will only support phones with the latest mobile platforms. This move might affect users of Blackberry and Nokia devices, which do not run iOS or Android platforms. WhatsApp has also finally decided to get rid of its $1 annual subscription fee to attract more users.  The company continues to grow as it celebrates its 7th founding anniversary (WhatsApp was introduced in 2009). Today, WhatsApp has an estimated one billion monthly active users worldwide.

Apple Swift language gains traction among mobile app developersTech Target

Apple’s latest programming language, Swift, is becoming more popular among developers — largely due to its ease of use.  It has ability to analyzes the code and detect any mistakes, and “ready to use” SDK frameworks.

Swift’s biggest benefit is that it makes it simpler to write apps. It requires less text to code a given command. Plus, using the Swift Playgrounds feature in XCode, Apple’s suite for building apps, developers can get a real-time preview of the app. To help avoid common coding errors, Swift programmers can enter an evaluation command that analyzes the code and detects any mistakes — a feature Objective-C lacks. These new developments will definitely help app developers save precious time, though it does leave us with one important question: what will happen to custom app developers? Only time will tell.

It’s the end of “euphoric times” for custom app developers – Tech Crunch

For the first time in about eight years, we saw a decline in the small business customer base of app developers (in terms of revenue and per-project value). The primary reason cited is the rise of white labels and SDKs. “Uber for X” toolkits have indeed become a force to reckon with. Small businesses increasingly rely on “ready to use” frameworks rather than opting for custom development.

Research: Insights on the State of App Developers 2016 – Developer Tech

The mobile revolution and the surge in smartphone usage is driving the market for mobile applications while mobile app development is a prospering industry which continues to expand. The growth in consumer demand for mobile apps and the increase in time spent on the apps is encouraging for both aspiring and seasoned developers to innovate across mobile devices.

InMobi surveyed mobile developers across the world to better understand the ever-growing ecosystem. These insights were drawn from over 1,000+ respondents across 155 countries on the latest trends in the mobile app ecosystem, including developer mindshare, platform of choice, revenue models, challenges and motivations, and mobile ad network preferences. The survey found that Android is by far the most popular platform among developers (86%), followed by Apple iOS (57%). However, when it comes to making money, Windows Phone apps developers seem to earn the highest per month, per app, when compared to iOS and Android developers.

10Fold – Big Data Business Insights – 39

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 With the Star Wars craze of the last year, TechCrunch has taken a completely different approach to fan theories surrounding the series, wondering, “How much data do they need to manage in the Death Star?” It is estimated that 1.7 million military personnel (stormtroopers and their commanders, trash compactor operators, etc.) and 400,000 droids were on board the Death Star. This is close to the population of Philadelphia — if you don’t count the droids. The amount of data created each year by all the people here on earth is growing exponentially, and is expected to double each year. In 2012 alone, 2.8 zettabytes of data were collected. By 2020, that number isexpected to have increased to 40 zetabytes. That’s 5,200 GB of data for every person on earth. Using that estimate, TechCrunch figures that the 1.7 million personnel on the Death Star would generate 8.84 exabytes of data per year. If you prefer to express data in factors of 1024 bytes, the number is 8.63 exabytes (or “exbibytes”). Of course, that’s assuming residents of the Death Star generate as much data as a human living in the year 2020, but it’s likely the galaxy far, far away may be far more advanced than that.

10 FOLD ICON 15x15  Forbes reported on Forrester’s TechRadar methodology, which evaluates the potential success of 10 Big Data techniques, which, the research firm believes, are projected to have “significant success.” In addition, each technology is placed in a specific maturity phase—from creation to decline—based on the level of development of its technology ecosystem. The first 8 technologies above are considered to be in the Growth stage and the last 2 in the Survival stage. Forrester also estimates the time it will take the technology to get to the next stage and predictive analytics is the only one with a “>10 years” designation, expected to “deliver high business value in late Growth through Equilibrium phase for a long time.” Technologies #2 to #8 above are all expected to reach the next phase in 3 to 5 years and the last 2 technologies are expected to move from the Survival to the Growth phase in 1-3 years.

10 FOLD ICON 15x15  UK and EU policy-makers have urged governments to raise their data capture and analytics game to the level demanded by the digital economy. Charlie Bean, a former deputy governor of the Bank of England, announced the findings of his report into the state of UK economic statistics, under the auspices of the Cabinet Office and the Treasury, on March 11. Meanwhile, the European Parliament debated and passed a resolution on March 10 that urged the European Commission to boost a “data-driven economy” in the European Union. Bean’s report – Independent review of UK economic statistics – commissioned in 2015 by the chancellor George Osborne and the minister for the Cabinet Office Matt Hancock, found that British government statistics need to be recast to capture the economic data characteristics of a digital economy.

Big Data and the Death Star – TechCrunch

Top 10 Hot Big Data Technologies – Forbes

UK government and EU Parliament step up big data analytics policy push – ComputerWeekly


10 FOLD ICON 15x15 Market Research Store has released a new market research report “Global Hadoop-as-a-Service (HaaS) Market Size, Share, Trends, Demand, Analysis, Research, Report, Segmentation and Forecast, 2013 – 2020” to add to its collection of research reports. The report comprises of data storage in the cloud and its analysis through Hadoop without the need to install any infrastructure in the premises. HaaS market has witnessed a tremendous growth in 2013 and has doubled from the market size in 2012. However, it is expected to witness a tremendous growth in the next 7 years, expanding its horizon into the end user industries of conventional Hadoop.

Learn details of the global hadoop-as-a-service (haas) market 2016 analysis and growth to 2020—WhaTech


10 FOLD ICON 15x15 Forbes examines how the use of key performance indicators, in conjunction with the real-time IoT data, creates opportunities for companies to provide new or improved services that are transforming their industries. A few examples include opportunities in risk reduction, especially when trading commodities like energy precious metals, livestock, and in the mining and oil industries, new pricing models such as tiered services from basic to premium, which is beneficial to both consumers and providers, and flexible pricing.

10 FOLD ICON 15x15 ZDNet examines the new trend of services arising aimed at helping hardware developers connect with experts and suppliers, including HWTRek, which bills itself as a one stop shop for IoT hardware innovators working to manage their product development, connect with manufacturing and supply chain industry experts, and bring their connected device projects to market. The IoT market is expected to reach $1.7 trillion in 2020, up from $655.8 billion in 2014 according to IDC. Meanwhile, the electronics manufacturing services (EMS) industry, including electronics original design services (ODM), should expect revenues of $505 billion in 2019. The source of innovation is shifting to small and medium-sized businesses in these industries due to the obstacles of collaboration in the traditional supply chain model.

How IoT Changes Pricing Models – Forbes

Collaboration Tools for IoT devs – ZDNet


10 FOLD ICON 15x15 Amid the peak of SXSW, Austin, TX has been pinned as a “laboratory for [IIoT 5G] innovation.” RCR Wireless has partnered with leading technologists and industrial Internet of Things and 5G leaders to create a 10-episode, immersive documentary series on the “technologies, vertical markets, policies and investments driving what Goldman Sachs and others have termed the next mega trend, a 4th Industrial Revolution that will make the steam-driven transformation of 1800s look like a blip on the economic radar screen.” In the series, Austin is highlighted for its long history of tech innocation and its established ecosystem required for IIoT 5G innovation, as evidenced by AT&T’s recent selection of the city for its 5G trials and Spectrum Lab, in addition to the University of Texas-Austin and its world-renowned Wireless Networking and Communications group as well as Google’s ongoing deployment of its Google Fiber service and tests of its self-driving vehicles.

Austin, Texas: Where IIoT 5G technology sparks fly – RCR Wireless

Cognitive Computing

10 FOLD ICON 15x15 According to a new study by IBM and Forbes Insights, cognitive computing will help companies that have experienced the effects of a natural disaster to get back up and running much faster than they were previously able to. IBM provides three ways that cognitive computing can help keep businesses afloat in the event of a natural disaster: predicting/avoiding damages from disasters, analyzing best practices of other  companies previously affected by damage, and integrating the cognitive agent into technical support to help businesses get systems back online when there are technical issues.

How Cognitive Computing can get businesses up and running faster after disasters – Forbes

Self Service and Enterprise

10 FOLD ICON 15x15 Datawatch Corporation announced today that it has teamed with IBM to deliver better and faster data access and self-service data preparation to IBM Watson Analytics and IBM Cognos Analytics users. As part of this agreement, IBM will resell Datawatch Monarch, Datawatch’s market-leading self-service data preparation solution, which enables business analysts to rapidly access, manipulate and blend data from the widest variety of sources.

Datawatch Brings Powerful Self-Service Data Preparation Capabilities to IBM Watson Analytics and IBM Cognos Analytics Users—EconoTimes

Software Defined Networks

10 FOLD ICON 15x15 With the growing certainty that cybersecurity vulnerabilities will increase over the next couple of years,  Alternative Global Networks (AGNs) is creating a new, more secure internet that will dramatically improve cyber resilience, and at the same time, reduce expenditures on cybersecurity. AGN benefits can include all that software-defined networking (SDN) aim to introduce, such as cost reduction, software-defined packet forwarding, central management, but on a global scale. One of the most important benefits will be simplified virtual management. Virtualization in networking will be similar to that of virtualization in computing, as it will completely revolutionize the paradigm of the existing coupling between hardware and software. This will also simplify implementing security tools.

Building a Brand New Internet – TechCrunch

Network Function Virtualization

10 FOLD ICON 15x15 Ericsson and NEC both came out as vendor partners for NTT DoCoMo’s network functions virtualization plans, including the telecom giant’s recently announced multi-vendor NFV platform. Ericsson said its platform is based on the Open Platform for NFV network architecture and was used for NTT’s commercial service launch. “To maximize benefit of NFV, DoCoMo expects to virtualize many other key components of its mobile network, aiming to eventually establish a fully virtualized network,” explained Seizo Onoe, EVP and CTO at NTT. “I’m convinced that our multi-vendor NFV is the first step toward our goal.”

Ericsson and NEC tout their support for NTT DoCoMo’s multivendor NFV deployment – RCR Wireless

10Fold – Big Data Business Insights – 23

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 Businesses that use software to collect data are vulnerable to cyber risks. According to a new report by the European Network and Information Security Agency (ENISA), companies are urged to follow the ‘security-by-default principle.’ ENISA warned that the potential for data to be breached, leaked, or degraded is a result of the replication of big data storage, and frequency of outsourcing big data. Companies can avoid these by implementing big data tools, such as the use of cryptography, access controls, or pseudonymisation techniques.

EU Agency warns of cyber risk from using big data tools – The Register


10 FOLD ICON 15x15 The U.S. Insurance Industry is currently the largest insurance market, employing 2.5 million people. The industry is expected to experience rapid change with the addition of the Internet of Things. In an interview from Forbes contributor Robert Reiss with Vik Renjen of SVP Sutherland Global Services,   Renjen says he sees the industry transforming in a couple ways – with geospacial applications, environmental sensors, connected biometrics, diagnostics, and lastly, with carrier process transformation. These new opportunities for finer product segmentation will help improve loss control and accelerate premium growth.

5 Ways IoT will Transform the Insurance Industry – Forbes


10 FOLD ICON 15x15 MapR is expanding its free training on Hadoop and Spark since the advanced analytics market is growing very quickly. MapR is considered one of the three biggest Apache Hadoop distribution companies. Many developers, administrators, and data analysts will benefit from the skills offered by MapR’s free on-demand Hadoop training, including hands-on labs, exercises and quizzes. Additionally, students can complete certification exams that lead to Hadoop and HBase professional designations.

Free Hadoop, Spark Training; Advanced Analytics Market Grows: Big Data Roundup – Informationweek


10 FOLD ICON 15x15 We’re used to hearing about the IoT… but have you heard of the Internet of Emotions? Companies largely rely on personalization methods, including pop-up ads, to provide value for customers. But in the near future, with devices equipped with facial, vocal, and biometric sensors that will be able to analyze and influence our feelings, personalization will be influenced by this “Internet of Emotions, With the combination of the IoT and “IoE”, humans could be forced to become more emotionally aware, as machines are already doing the same.

The Internet of Emotions: Putting the person back into personalization – Mashable