Tag Archives: public relations

Inside the Newsroom: Media Talk Tech with VentureBeat, Wired and Fast Company

Organized by PRSA

On July 26, a handful of 10Fold crew members joined the Silicon Valley and San Francisco Chapters of the Public Relations Society of America (PRSA) for the “Inside the Newsroom: Media Talk Tech” panel event with Fast Company, Wired, and VentureBeat.

Panelists included:

 Jason Wilson, Managing Editor, VentureBeat

 David Pierce, Senior Staff Writer, WIRED

 Sean Captain, Tech Editor, Fast Company

Below is a collection of insights, trends, and other interesting thoughts by 10Fold’s own Drew Smith, Jordan Tewell, Webbo Chen, Katrina Cameron and Kyra Tillmans following the event.

Artificial Intelligence, Digital Transformation, Virtual Reality…What’s Next?

These buzzwords are top-of-mind in today’s technology landscape, and it was no surprise that the first panel question regarded these hot topics. When Jason Wilson of VentureBeat called for a show of hands on how many audience members regularly used voice assistance, the number of hands was noticeably few. Despite all the buzz surrounding AI (i.e. in voice assistants, like Siri or Amazon Alexa) there is still a long way to go. The panelists noted that, for example, voice assistance users tend to use those features for only the things they know work well, showcasing the disparity between where the day-to-day benefits of AI voice assistance currently stand and where they could/should be.

Another salient point that David made was the different growth trajectories of augmented reality versus virtual reality. AR will improve quickly, he noted, while VR is more likely to just chug along. This might come as a surprise, as VR is typically viewed as the more “futuristic” innovation.

Trends of the Media-scape

The panelists agreed the intersection of technology and politics is a big trend on everyone’s mind. It was much easier to separate the two in the past, but now reporters who cover cyber security are often times writing about national security too. The intersection of technology and politics matter now more than ever, and we should address this when talking strategy internally and with our clients.

David made an interesting comment about video journalism. At Conde Nast (parent company of Wired), they want to ensure that video isn’t treated as a bolt-on, and they’ve started to consider video as one of the primary channels when they’re determining what goes where during their editorial meetings. Instead of slapping on video at the end of everything, reporters are putting significant thought into which platform is best – i.e. a 2,000-word feature, a photo essay, or maybe even a Snapchat video. It raises the question for PR pros to determine which avenue is best to take for which story and set expectations accordingly. Not everything will be a full-length feature story these days.

Via the Twitter hashtag #MediaTechTalk, attendees posed a question about non-Silicon Valley tech hotbeds. The panel agreed on Pittsburgh as a favorite, which wasn’t wholly surprising, because the Pennsylvania, Massachusetts and Tri-State region is becoming widely known as an area of innovation. However, Fargo came as a surprise. And David made a good point of thinking about the world outside of the U.S., because all too often we have proximity bias – especially when you’re based in Silicon Valley like we are!

Tips by the Media for the Media

Sean from Fast Company continually reiterated the importance of clicks/views in judging how successful an article was. He and his editors clearly pay a lot of attention to this in a rapidly changing media landscape. Ultimately, what readers think is most important for both reporters and PR folks alike. Reporters approach stories they’re pitched by gauging whether their readers will care in order to gain as many eyeballs as possible. In tech PR, companies like to focus on news developments and its impact on the broader landscape rather than the personalities behind the tech. Instead of product launch stories, technology reporters are interested to learn about the human side of the story. As an example, David brought up a feature story on employees who were affected by Dropbox dropping AWS. The topic was very dry, and David didn’t expect it to do as well as it did. Yet, by adding in the human element, the story became one of his most popular reads to date.

As PR professionals, we can help orchestrate these stories by doing background interviews with our clients to develop a narrative that will resonate well with readers. Who is the main character in the story? It’s important to remember that if you have interesting execs, you should flesh out their bios/background and occasionally lead with that when approaching media.

As a final takeaway, all the panelists mentioned that they’d love to have more conversations with both PR folks’ clients – and the PR people themselves – that have no agenda whatsoever. Not many PR people would propose a “no agenda briefing” to a journalist – if only because that’s not likely to hook the journalist – but I’d be interested to see the results from the brave PR pro who does this.

Journalists and PR professionals agree that the media landscape is changing actively and dramatically. Events like the Media Tech Talks are a great way to engage with the media, understand their thinking and likewise share your own. A big “thank you” to PRSA for putting it together! 10Fold is looking forward to the next one.

By Kyra Tillmans

(Contributions from Drew Smith, Jordan Tewell, Webbo Chen, and Katrina Cameron)

Enjoy your read? Check out our other content here.

Building Influence on Twitter

Recently we posted a few tips that covered the basics of growing your Twitter presence. This blog offers a few more ideas that will boost growth and build your influence.

Use Nuvi, TrendKite, Zignal or Another Metric Tracking Application to Guide Your Strategy
Metric applications are a nuvi snapconvenient way to track how your audience is responding to your content, so that you can focus and prioritize your efforts. These tools most importantly allow you to analyze success or failures of your posts by measuring the impact your content had with your audience from an engagement (e.g. shares, likes, retweets) perspective. Most find that visuals, recognition of a person or a team, and the occasional personal picture or thought all enhance engagement.  But, every audience is different and the only way to find out what works for your “peeps” is to measure their responses.

Evaluate Your Follower Base
The point is that bigger isn’t always better.  It’s exciting to see growth in followers, but have you taken the time to see what type of people or companies are following you?  If you gather followers that look like bots or the followers link to inactive or spam accounts, remove them from your list. While reducing the number of followers you have may sound counter-intuitive, Twitter’s news feed algorithm explains that these non-user accounts can become a significant percentage of those that see your posts – meaning your posts were not seen by nearly as many people as you had planned. This is because Twitter allows only a select few of those who follow you to see your tweets without being directly on your page, and the greater amount of inactive followers you have the greater the chance that your tweets won’t reach the engaged portion of your follower base.

Keeping it Simple
unfollowLuckily, this can be remedied quite easily. Some applications such as ‘Unfollowers for Twitter’ have specific filters that allow you to find ‘Inactive Users’, which also typically capture the vast majority of fake or spam accounts. The filter allows for varying lengths of time to find and unfollow relevant followers. There is another way to remove these accounts as well. Simply find the follower you believe is inactive and click on the gear icon by the follow button and click the block button. This will remove the follower from your followers list, and can always be undone if you feel as though you have made a mistake.

Set Up an Auto-Messaging System
message snap Short messages to followers engage users personally in your content. This step is a basic, yet important step in making new followers feel welcomed. Constructing a personalized message sent when you receive a follower gives each new user a sense of your sincere gratitude and encourages them to return to your content because of a perceived personal connection to the content creator. There are many applications you can use with your Twitter account that will automatically send a message you draft yourself if you experience large quantities of new followers, but isolated drafts to individual followers of such messages work just as well!

There is no question that Twitter has become a very important publishing mechanism for many.  Everyone from Hollywood stars to corporate giants are using the social media platform to build influence and status.  There’s so much noise, it’s hard to know how to get ahead and build your own following.  Using these three simple tips:  measure, evaluate and respond – you too can become influential on Twitter.

Enjoy your read? Browse our other blogs as well!

 

10Fold – Big Data Business Insights – 23

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 Businesses that use software to collect data are vulnerable to cyber risks. According to a new report by the European Network and Information Security Agency (ENISA), companies are urged to follow the ‘security-by-default principle.’ ENISA warned that the potential for data to be breached, leaked, or degraded is a result of the replication of big data storage, and frequency of outsourcing big data. Companies can avoid these by implementing big data tools, such as the use of cryptography, access controls, or pseudonymisation techniques.

EU Agency warns of cyber risk from using big data tools – The Register

IoT

10 FOLD ICON 15x15 The U.S. Insurance Industry is currently the largest insurance market, employing 2.5 million people. The industry is expected to experience rapid change with the addition of the Internet of Things. In an interview from Forbes contributor Robert Reiss with Vik Renjen of SVP Sutherland Global Services,   Renjen says he sees the industry transforming in a couple ways – with geospacial applications, environmental sensors, connected biometrics, diagnostics, and lastly, with carrier process transformation. These new opportunities for finer product segmentation will help improve loss control and accelerate premium growth.

5 Ways IoT will Transform the Insurance Industry – Forbes

Hadoop

10 FOLD ICON 15x15 MapR is expanding its free training on Hadoop and Spark since the advanced analytics market is growing very quickly. MapR is considered one of the three biggest Apache Hadoop distribution companies. Many developers, administrators, and data analysts will benefit from the skills offered by MapR’s free on-demand Hadoop training, including hands-on labs, exercises and quizzes. Additionally, students can complete certification exams that lead to Hadoop and HBase professional designations.

Free Hadoop, Spark Training; Advanced Analytics Market Grows: Big Data Roundup – Informationweek

Personalization

10 FOLD ICON 15x15 We’re used to hearing about the IoT… but have you heard of the Internet of Emotions? Companies largely rely on personalization methods, including pop-up ads, to provide value for customers. But in the near future, with devices equipped with facial, vocal, and biometric sensors that will be able to analyze and influence our feelings, personalization will be influenced by this “Internet of Emotions, With the combination of the IoT and “IoE”, humans could be forced to become more emotionally aware, as machines are already doing the same.

The Internet of Emotions: Putting the person back into personalization – Mashable

10Fold – Security Never Sleeps – 38

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: HSBC blames the banking outage on a DDoS attack and claims that everything is fine, contrary to what the customers believe. OpenSSL cryptographic code library suffered a high-severity vulnerability that allowed attackers to obtain the key’s to decrypts secured communication. NYC has launched an investigation into four baby monitor companies that have been lacking in security for their devices. A report released by a security researcher revealed that UK businesses are 25% more likely to suffer from constant threats.

HSBC online banking suffers major outage, blames DDoS attack Publication: Ars Technica Reporter name: Kelly Fiveash

HSBC has been battling an apparent Distributed Denial of Service (DDoS) attack on its online banking system for the past few hours. HSBC blamed the outage on a DDoS attack, and attempted to spin the whole thing as a success story to mainstream news outlets. By way of example, witness this headline over at ITV News. The bank’s customers may see things a little differently, however, given the major disruption to the service on what will be one of the busiest days of the year for many people. Not only is the final Friday of the month payday for many folk in the UK, it’s also the end of January—which is a big deal for any freelance bods currently filing their annual tax returns.


High-severity bug in OpenSSL allows attackers to decrypt HTTPS traffic Publication: Ars Technica Reporter name: Dan Goodin

Maintainers of the OpenSSL cryptographic code library have fixed a high-severity vulnerability that made it possible for attackers to obtain the key that decrypts communications secured in HTTPS and other transport layer security channels. While the potential impact is high, the vulnerability can be exploited only when a variety of conditions are met. First, it’s present only in OpenSSL version 1.0.2. Applications that rely on it must use groups based on the digital signature algorithm to generate ephemeral keys based on the Diffie Hellman key exchange. By default, servers that do this will reuse the same private Diffie-Hellman exponent for the life of the server process, and that makes them vulnerable to the key-recovery attack.


NYC Launches Investigation Into Hackable Baby Monitors Publication: Wired Reporter name: Andy Greenberg

On Wednesday the New York City Department of Consumer Affairs launched an investigation into the baby monitor industry’s hackable vulnerabilities, sending subpoenas to four companies—which the agency has declined to name for now—demanding information about their security practices. The subpoenas, according to the agency, demand to see evidence to back up claims that the companies make about the security of their devices, complaints they’ve received about unauthorized access to the cameras, their use of encryption on the devices, and their history of handling vulnerabilities discovered in the devices, including alerting customers, releasing patches, and whether those patches were actually implemented by the devices’ owners.


UK businesses under constant and increasing malware threat Publication: ITProPortal Reporter name: Sead Fadilpasic

UK’s businesses have had a bigger chance of being attacked by a malware than those in the US or the Republic of Ireland in December 2015, a new report by security researchers suggest. The risk of malware infection in the UK thus increased 17 percent, the company concludes, with the number of active malware families increasing by 25 percent. The company says more than 1,500 different active malware families were identified in December, up from 1,200 in November same year.

10Fold – Security Never Sleeps – 39

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Twelve Chicago area restaurants have been comprised by a malicious program installed on their payment processing devices. The security firm responsible for finding the ‘cesspit’ vulnerability on eBay’s global sales platform has released a statement saying eBay has yet to fix this vulnerability and makes no plan to in the near future. Melbourn Health Center is still struggling with the QBot that infiltrated the pathology department and drown the system forcing staff to do all processes manually. Lastly, a Forbes insider interview takes a look a what is happening to cybersecurity firm Norse.

12 Chicago Area Restaurants Affected by Massive Credit Card Data Breach – Publication: NBC – Reporter name: Staff

Secure credit card information was compromised at a dozen Chicago area restaurant locations during a massive data breach at Landry’s restaurants and Golden Nugget Casinos nationwide. Findings showed that hackers were able to install a program on payment card processing devices at certain restaurants, food and beverage outlets, spas, entertainment destinations, and managed properties.


Update: eBay ‘cesspit’ has ‘no plans’ to fix severe vulnerability – Publication: SC Magazine – Reporter name: Max Metzger

eBay will apparently not be fixing a ‘severe vulnerability’ on the company’s global sales platform. Check Point Software’s research team apparently disclosed details of just such a vulnerability in mid-December last year.  This ‘severe vulnerability’ allows the bypass of the global bidding platform’s code validation, from which point, any wilful attacker can manipulate the vulnerable code remotely and release malicious javascript code on users. If the vulnerability is left unpatched, Check Point told press in a statement “eBay’s customers will continue to be exposed to potential phishing attacks and data theft.”


Melbourne Health still grappling with Qbot malware – Publication: IT News – Reporter name: Allie Coyne

Melbourne Health is still working to contain a dangerous strain of malware that attacked its systems more than two weeks ago due to the virus’ ability to mutate and hide itself from discovery. On January 18 the health network revealed malicious software had infected Windows XP computers through Royal Melbourne Hospital’s pathology department. The malware downed the hospital’s pathology systems and forced staff into manual workarounds.


Norse Founder Doesn’t Know Whether His Cybersecurity Business Is Still Alive – Publication: Forbes – Reporter name: Thomas Fox-Brewster

The company website is down and a report claiming the firm is imploding might well have hammered down the final nail in the coffin for an information security startup that appeared to be on the up with more than $40 million in VC investment to date. Such is the chaos at Norse, even co-founder and current CTO Tommy Stiansen is in the dark, telling FORBES today he didn’t know whether the firm he set up in 2011 would continue to operate. When asked if the company was still alive, Stiansen responded: “I currently don’t have any view over what’s going on… I haven’t heard anything.”

10Fold – Security Never Sleeps – 37

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: HSBC has been hit by a cyber attack causing its personal banking website and mobile application to shut down, only weeks after a systems failure that left thousands of its customers without access to digital services. Researchers at Kaspersky Lab spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine. Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected over the course of the year. A bug exposed an Uber driver’s tax information including her name and social security number to all drivers who logged onto their dashboard in what the company calls, a ‘bug.’

HSBC cyber attack brings Internet banking to its knees – Publication: Financial Times – Reporter name: Emma Dunkley

HSBC has been hit by a cyber attack causing its personal banking website and mobile application to shut down, only weeks after a systems failure that left thousands of its customers without access to digital services. The bank said in a statement that it had “successfully defended against the attack, and customer transactions were not affected.” However by early afternoon on Friday its online banking services were still unavailable to some customers. Alex Kwiatkowski, a senior strategist at software group Misys, said the attack was “very concerning” and “shines a bright spotlight” upon HSBC’s systems weaknesses.


BlackEnergy malware deployed using malicious Word docs – Publication: SC Magazine – Reporter name: Robert Abel

Researchers at Kaspersky Lab spotted attackers using malicious Microsoft Word documents distributed via spearphishing emails to spread the Black Energy Trojan in Ukraine. Russian-speaking threat actors in the BlackEnergy APT group have been using malicious Excel and PowerPoint files to spread the group’s malware since last year but Kaspersky’s Global Research and Analysis Team Director Costin Raiu claimed this was the first time Word documents have been used. The BlackEnergy APT group has been actively targeting energy, government and media in Ukraine, and industrial controls systems supervisory control and data acquisition (ICS/SCADA) and energy companies worldwide.


 27% of all malware variants in history were created in 2015 – Publication: CSO Online – Reporter name: Maria Korolov

Last year was a record year for malware, according to a new report from Panda Security, with more than 84 million new malware samples collected over the course of the year. Trojans continued to account for the main bulk of malware, at 51.45 percent, followed by viruses at 22.79 percent, worms at 13.22 percent, potentially unwanted programs such as adware at 10.71 percent and cases of spyware at 1.83 percent.


‘Bug’ Exposes Uber Driver’s Tax Information, Including Name and Social Security Number – Publication: Forbes – Reporter name: Kelly Phillips

It was an über bad day for one driver who had her personal tax information, including her Social Security number, exposed due to what the drive on demand company is calling a “bug.” When Uber drivers logged on to the Uber partner dashboard to check their own 1099 information for 2015, they instead received information relating to someone else: a Florida woman who also drives for the company. The form in question was a federal form 1099-K, Merchant Card and Third Party Network Payments. Technically, drivers for Uber are not employees which is why they fill out the 1099-MISC. The driver’s 1099-K information remained on the Uber dashboard for a short time and it’s not known how many other drivers might have viewed it during that time. When made aware of the error, the company removed the tax tab on the dashboard altogether while the mistake was corrected.

10Fold – Big Data Business Insights – 22

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 Within the last couple of years, every industry is starting to look to big data to help add business value. Colleges and universities, have begun to link disparate information from across campus. However, big questions still remain: how will schools use big data for existing privacy and security policies? and how will big data help with a more diverse student population?

Big Data’s Coming Of Age In Higher Education – Forbes

IoT

10 FOLD ICON 15x15 The next wave of automation is here and it involves making the Internet invisible and ubiquitous. One of the more famous applications for IoT whas been innovation in home appliances like the thermostat, which can now be turned on remotely. Surprisingly, retail IoT products like ovens, door locks and baby monitors have yet to find a firm ground among consumers perhaps due to security concerns. At hospitals, IoT will allow a patient’s vital signs to be monitored via a sensor in her hospital bed, and trigger medication and outreach to doctors and nurses at programmed intervals, as well as provide updates to family members. The floodgates to the machine-to-machine (M2M) market have opened up and will only be accelerated going forward.

IoT Ushers In A New Wave Of Automation – PYMNTS

eCommerce

10 FOLD ICON 15x15 eCommerce around the world is growing quickly- in France especially. eCommerce in France was worth 64.9 billion euros last year and could reach the 70 billion euro milestone this year. For 2016, Fevad expects consumers to make nearly 1 billion transactions this year. It is also believed that there will be more than 200,000 eCommerce platforms for the French to choose from by the end of 2016.

10 FOLD ICON 15x15 The Chinese eCommerce powerhouse, Alibaba, is hoping its good third-quarter report will help reassure investors worried about the state of the Chinese economy. Alibaba is benefiting from a shift to mobile spending and a growth in users. Mobile spending accounted for 65 per cent of total China retail revenue, up from 30 per cent last year. Annual active buyers rose 22 per cent to 407 million.

Ecommerce in France was worth €65 billion in 2015 – eCommerce News

Alibaba’s profit jumps on strong eCommerce sales – The Star Business

NFV/ SDN

10 FOLD ICON 15x15 Telecom operators are expected to increase their reliance on software technologies based on NFV and SDN to reduce costs and compete with well established providers. The TBR report claims telecom operators over the next year will look to focus on consolidation and cost-cutting initiatives “to improve the profitability of their enterprise business,” citing recent moves by CenturyLink and Verizon Communications in looking to divest their data centers. Another influences was IBM’s recent acquisition of AT&T’s managed application and hosting service business. TBR also noted carriers were adopting NFV and SDN to reduce costs and gain agility in service offerings.

NFV and SDN core to telecom operators service positioning – RCR Wireless

10Fold – Big Data Business Insights – 21

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 Many operators within the food industry are using some sort of data to make business decisions. Specifically, multiunit operators already have access to the tools needed to put their big data to work improving their businesses. QSR recommends three reasons why analytics can help improve businesses. First, businesses will get better information. Spreadsheets have limitations, and cannot handle all of a company’s data. Secondly, with better information companies can make better decisions. A thorough analytical system will compare labor costs against a store’s high and low volume sales to determine where staff is needed. Lastly, better decisions help increase profits. With more information, operators can take action on opportunities sooner that were not seen before.

10 FOLD ICON 15x15 Big Data mobile gaming startup Icejam Games, Inc. raised $2.13 million in Series A funding. IceJam integrates real-world “Playable Data” into its games utilizing any dataset or combination of datasets. The company believes that Playable Data makes mobile gaming more interesting, and integrates real-time, real-world experiences for customers. The company plans to use new funds to continue development of of Playable Data and to help prepare for their first game for market introduction.

Embrace your Big Data– QSR

Big Data mobile gaming startup Icejam raises $2.13m Series A – Silicon Angle

Hadoop

10 FOLD ICON 15x15 Hadoop creator, Doug Cutting, recently spoke with The Next Platform about how the last decade of Hadoop has shaped the meaning of data in the enterprise. While working with his collaborator, Mike Cantrella, on the Nutch search engine back in 2004, he began to see the possibility of an ecosystem. Eventually, his open source roots taught him that projects are not developed as comprehensive applications but rather components with the expectation that some stitching is required to create functionality. This lead him to the creation of Hadoop.

A decade of Hadoop: Creator cutting on the right place for the right time – The Next Platform

IoT

10 FOLD ICON 15x15 Samsung Electronics has just reported a large decline in their 2015 sales with a weakening demand for consumer electronics. The company has also hinted at a profit decline for the first half of 2016. In attempt to increase sales for the remainder of 2016, Samsung plans to lead the Smart Home era with diverse IoT-enabled products. They plan to use their smart TVs as the center for controlling IoT devices within the home including connected lights, sound, and security devices.

Samsung Electronics yearly net profit at lowest level in four years – ZD Net

Advanced Analytics

10 FOLD ICON 15x15 Gartner predicts that by the time we reach 2018, more than half of large businesses will rely heavily on advanced analytics and proprietary algorithms. Another big term Gartner used was trust. They predict that businesses that choose to proactively govern ethical impacts of advanced analytics, including the relationship between data, trust and business outcomes, will create more trusted relationships with their customers.

Gartner: Advanced analytics will be (a) key business tool by 2018 – IT Pro Portal

eCommerce

10 FOLD ICON 15x15  Magneto continues to be a hot topic in eCommerce as many merchants are now potentially at risk of a hijacking attack. The bug has been found in all versions of the Magneto Community and Enterprise Edition edition. Security researchers have reported that a hacker could use the flaw to embed malicious JavaScript code inside customer registration forms. This type of vulnerability can also be used by attackers to take over victims’ websites, create new admin accounts, steal client information, and anything else a legitimate administrator account is allowed to do.

Millions of eCommerce Sites At Risk from the Magneto Bug – PYMNTS

10Fold – Big Data Business Insights – 20

Your daily digest of “All Things Big Data” gathered, collected and researched by your very own 10Fold Big Data Practice team.

Big Data

10 FOLD ICON 15x15 InformationWeek spoke with Informatica’s new CEO, Anil Chakravarthy. He talks about his journey to becoming CEO and receiving the board’s approval. He also went over trends that he predicts for 2016. Chakravarthy believes that enterprises are going to be looking more into the cloud and that customers are figuring out how to combine the cloud with big data. Lastly, he reveals that Informatica will be unveiling a new product that combines “the best of what IT wants and business wants” during 2016.

Big Data Must Deliver Business Value: Informatica CEO – Information Week

Docker/ Container

10 FOLD ICON 15x15 Yelp released a minimal init system for Docker containers called dumb-init. It acts as a signal handing proxy and performs other init functions. According to Yelp, the primary motivation behind creating dumb-init was to make it easier for developers to move containers.

Yelp Releases dumb-init, a Minimal init System for Docker Containers – Info Q

Self Service and Enterprise

10 FOLD ICON 15x15  Self-serving is becoming more and more popular, especially in restaurants. Kiosks are becoming common in diners, which help with self-service payments (ability to split the bill and coordinate multiple payments) and customizing food orders with this self-service technology.

Growing reception and use of self-service POS – Pizza Marketplace

 

eCommerce

10 FOLD ICON 15x15  Partical eCommerce provides 6 different content marketing tactics for eCommerce merchants. It suggests informative eCommerce businesses use product videos, provide useful articles that help their consumer solve a problem or task, captivating photography that engages the shoppers, and fun contest or polls that engage potential customers.

 6 Content marketing Tactics for Ecommerce Merchants – Partical Ecommerce

SDN

10 FOLD ICON 15x15  Several articles covered Big Switch Networks’ news that it has released a free version of its software. The company hopes to entice potential customers and help developers find new use for its products. These free software downloads are available on the company’s website.

 Big Switch releases freemium software for SDN developers – TechTarget

Big Switch unveils Free version of its SDN Software– eWeek

IoT

10 FOLD ICON 15x15 The IoT industry is growing rapidly and Gartner predicts that by 2020 there will be at least 21 billion connected devices. When consumers search for a list of IoT products online, they often get confusing technical jargon about embedded products. So, Forbes created a list of 5 easy to understand IoT examples, including Hello Barbie, a product from Mattel with speech recognition technology, allowing it to engage with the person playing with it. Other examples include L’Oreal’s connected mascara, which will be able to give users feedback on products that will help complement their beauty look, a bottle of vodka that can interact with its consumer from Asbolut Vodka, smart cities designed by Altiux using real-time plant analytics solutions, and Samsung’s “Family Hub” refrigerator that allows consumers to use their phone to post content, use a calendar, pin photos, write notes, provide camera images of the contents inside, and gives users the ability to shop online, manage recipes, and compile and compare shopping lists.

10 FOLD ICON 15x15  CIO examines how the real of the “consumer Internet” is becoming more and more similar to the Internet of things, as retailers are starting to use technology like Bluetooth to gain more granular location data, or using video feeds to evaluate emotional reactions to products live in stores. Brands are also using consumers’ social media data, such as likes, dislikes, tweets and posts to improve the buying experience. With all of this data, the consumer Internet mimics that of the industrial Internet by using analytics platforms to slice and dice all this data.

5 Easy to Understand Examples of the Internet of Things – Forbes

The line between the consumer Internet and IoT are blurring fast– CIO

10Fold – Security Never Sleeps – 36

Your daily digest of “All Things Security” gathered, collected and researched by your very own 10Fold Security Practice team.

Big items to consider: Israel’s Electricity Authority experienced a serious hack attack that officials are still working to repel- though they have identified the virus and the software to neutralize it. A security breach discovered at software Juniper Networks has U.S. Officials worried that foreign hackers have been reading the encrypted communications of U.S. Government agencies for the past three years. Independent security researcher Michael Stepankin has reported a since-patched remote code execution hole in Paypal that could have allowed attackers to hijack production systems. The FBI discussed one if its top attacks based in the UK which offered a terse defense of those sometimes-controversial tactics and described how innocents on the Tor anonymizing network were protected from digital exploits with a human “wall” that sifted hacked data before it landed in the hands of investigators.

Israel’s electric authority hit by “severe” hack attack Publication: ARS Technica Reporter name: Dan Goodin

Israel’s Electricity Authority experienced a serious hack attack that officials are still working to repel, the country’s energy minister said Tuesday. The virus was already identified and the right software was already prepared to neutralize it according to the Israeli Energy Minister, Yuval Steinitz- but the computer systems of the Israeli Electricity Authority are still not working as they should. There’s no indication Israel’s power grid was attacked, though the attack followed five weeks after Ukraine’s power grid was disrupted in what is believed to be the world’s first known hacker power outage.


The Data Breach You Haven’t Heard About Publication: The Wall Street Journal Reporter name: Will Hurd

A security breach recently discovered at software Juniper Networks has U.S. Officials worried that foreign hackers have been reading the encrypted communications of U.S.government agencies for the past three years. On Dec. 17 the California-based Juniper Networks announced that an unauthorized backdoor had been placed in its ScreenOS software, and a breach was possible since 2013. This allowed an outside actor to monitor network traffic, potentially decrypt information, and even take control of firewalls. Days later the company provided its clients—which include various U.S. intelligence entities—with an “emergency security patch” to close the backdoor. The federal government has yet to determine which agencies are using the affected software or if any agencies have used the patch to close the backdoor.


PayPal is the latest victim of Java deserialization bugs in the Web apps Publication: PC World Reporter name: Lucian Constantin

PayPal has fixed a serious vulnerability in its back-end management system that could have allowed attackers to execute arbitrary commands on the server and potentially install a backdoor. Independent security researcher Michael Stepankin has reported a since-patched remote code execution hole in Paypal that could have allowed attackers to hijack production systems. The critical vulnerability affecting manager.paypal.com revealed overnight was reported December 13th and patched soon after disclosure. After determining that the PayPal site was vulnerable to Java deserialization, Stepankin was able to exploit the flaw in order to execute arbitrary commands on its underlying Web server. After he reported the issue to PayPal and it got fixed, the company gave him a reward through its bug bounty program, even though his report was marked as a duplicate.


FBI: A ‘Human Wall’ Protects Innocents From Our Hacking Exploits Publication: Forbes Reporter name: Thomas Fox-Brewster

The FBI doesn’t often publicly discuss its use of Network Investigative Techniques, a catch-all term for digital attacks on suspect computers. But one of its top attaches based in the UK offered FORBES a terse defense of those sometimes-controversial tactics and described how innocents were protected from digital exploits with a human “wall” that sifted hacked data before it landed in the hands of investigators. TorMail was compromised by law enforcement back in 2013 and used to hack customers suspected of involvement in child abuse, according to a Washington Post report. Investigator Michael Driscoll explained to FORBES that, the “wall” was predominantly human, one consisting of people trained to determine what data could be used in an investigation. As the FBI continues to test the waters with fresh hacking techniques, it can expect more of those questions about its activities.