Adobe’s Scott Belsky says that augmented reality will be as big or bigger than the Web itself. “Augmented reality, to me, is the next major medium,” says Belsky. “I actually would go on the record saying that I think someday AR will be as big, if not bigger, than the Web because it will literally be everywhere.”
Scott Belsky was recently interviewed on CXOTalk with Michael Krigsman about AI and AR and how it will impact the customer experience (video below):
The Age of Artificial Intelligence
This is probably the most exciting part of my job is thinking about these future mediums. Everyone is going to have to take them into consideration. If those terms sounded new to any of your viewers, it’s a problem, and for a few reasons.
On the AI side, every company has a lot of data on its customers that they need to use to make the customer experience better. Customers are going to stop being forgiving of presumptuous defaults that don’t work for them, of questions that they should know the answer to already.
In the Age of AI, Customers Will Expect Personalization
Customers are going to expect a personalized experience because we’re in the age of AI. That starts with instrumenting your services and products to start collecting the right data. Then it means hiring a team that can understand and starts to extrapolate some lessons from that data. Then it also means designing products to take it into account, which is personalization.
It’s a real vector of the future. I think that companies are going to start competing on the data that they have to enable a better customer experience for their customers. I think that every company, especially big ones if they don’t start to leverage their understanding of their customers, they will be trampled by those that can. We can talk more about that.
Augmented Reality Will Be Bigger than the Web
Augmented reality, to me, is the next major medium. I actually would go on the record saying that I think someday AR will be as big, if not bigger, than the Web because it will literally be everywhere. It will be a layer on everything we see. We will walk down the street, and we will know who we know was everywhere and what their ratings were. Yelp will come alive to us, right? Directions will be transformed. There will be LinkedIn bubbles over everyone’s heads. You’ll have this amazing amount of knowledge and insight about everyone in every room you enter.
Then, if you take those glasses off or whatever you’re looking through, you’ll feel somewhat dumb. You’re like be like, “Oh, my goodness. I don’t know my connections to anyone around here. I don’t know. There’s nothing left for me here. There are no remnants from when I was here last and my old notes.” You’ll want to put it back on. That is this future world.
At Adobe, we think about the fact that that world will be very dry if it isn’t rich with creativity and content. That’s why we’re very focused on the future of augmented reality from the creative tooling and marketing analytics perspective.
Expectation That We Can Talk to Any App or Device
Let’s talk about Voice for a moment. I think we’re going to have an expectation that we can talk to any application or device that is in our lives and ask simple questions and get very, very quick answers. Look no further than anyone who has young kids. They can’t necessarily navigate to a song on Spotify on a phone or whatever, but they can ask for the song from Alexa, and they can use that all day. It’s very, very, very powerful. [There’s] a lot of design implications for voice interfaces as well, and that’s why these new mediums are super exciting, ripe with challenges, but everyone has to start thinking about them.
SAP CEO Bill McDermott, in a wide-ranging interview with Bloomberg talked about enterprises moving to the cloud, competing with Oracle’s new autonomous database, competing with Salesforce, and its huge business in China:
SAP Has Taken Over the Enterprise Database Market
Do you have a major move to the cloud? If legacy companies haven’t fully invested themselves in the cloud where they’ve converted their revenue streams more to cloud than on-premise I think you will see them make bold moves to get cloud-ready. No choice, that’s where the customer wants us.
We obviously have taken over the enterprise database market with HANA. HANA has many of the characteristics that you mentioned (referencing Oracle). HANA can take data from any source, everything that is either structured or unstructured and data from any source in the enterprise. HANA is running the biggest enterprises in the world now with 25,000 customers at mass scale. We like our HANA database very much.
It’s All About the Customer Experience
We see a fourth-generation of CRM where we go beyond the current market participants. Basically, they focus on sales, marketing campaigns, things that essentially take money out of the customers pocket. What we want to do is focus on an omnichannel ecommerce world where we connect the demand chain because our customers are social, mobile and on the run. They shop in every channel, direct to consumer, wholesale, retail. We want to connect that demand chain to the supply chain so that we have a complete end-to-end business.
Why is this so important? We are not just talking about CRM, we are talking about customer experience. The way CEOs think about their brand, their products, their human capital, their customers. All of the people inside of the company have to be completely committed to the customers outside the company. This is what we call fourth-generation CRM. It’s all about the customer experience.
We’d Like to See China and the US Cooperate
The most important thing is that we get paid to run businesses and work in an environment where we let government do what government does. All government leaders have to do what’s best for their country and best for their constituents. These tariffs are obviously a serious situation. You have the two largest economies in the world with $30 trillion in combined economic firepower that right now are at a little bit at odds with each other.
It’s good, as we saw in today’s tweet, it was stated that at the G20 President Xi and President Trump will sit down and talk. That’s very encouraging to the market. Markets like certainty. So certainly we would like to see China and the US cooperate. It’s good for supply chain, it’s good for business.
China is Regarded as SAP’s Second Home
Germain engineering is highly regarding in China, as it is in the United States and around the world, but we do particularly well in China. China is our fastest growing market. We think that China is easily regarded as SAP’s second home in terms of market receptivity, ecosystem growth in China, and our long-term prospects. We think China will end up being the biggest market in the world soon.
We have the most sophisticated data privacy in the world. We acquired a company called Gigya where we have billions and billions of customer records. We protect your privacy, we don’t let customers actually engage you unless you agree that you want to opt-in on various offerings from our customers and they serve their customers. We follow the same reference architecture, the same high-security standards and cloud standards in China that we do in Europe, the United States, and every other theater in the world.
We are very confident in China in the way enterprises can serve their customers in China with high-security standards. We recently announced a very important partnership with Alibaba and that is a cloud partnership that will not only impact our growth in one of the fastest growing regions in the world.
We Are Very Diverse and Highly Inclusive
We actually have appointed in the last 12 months two women to our Executive Board, not just because they are women, but because they are great leaders. That would be Adaire Fox-Martin and Jennifer Morgan. If you look at our company we have a third of our workforce that is female and we also have a third of our leaders that are female.
We are very diverse and highly inclusive. One of the things we really enjoy is what we have done with Autism at Work and now we have dedicated one percent of our hiring to autistic folks, at least on the spectrum somewhere, to help our workforce be highly productive and diverse. That extends also to the solutions that we have. If you look at success factors, the number one human capital solution in the world, we have a business without bias mentality.
Computers don’t have bias. In the way we build the algorithms in the software they eliminate bias from the hiring process. The computer doesn’t have a bias. It looks for the best candidates and it fills an algorithm or model that the company is trying to get at. If you want 40 percent of your workforce to be diverse and inclusive, the model is built to do that for you. You don’t leave it up to humans, you let the software do the work and then the human judgment comes in at the final phase of hiring. It’s changing companies everywhere.
Oracle co-founder Larry Ellison says that Amazon does not even use their own database to run their business. “Amazon runs their entire business on top of Oracle, on top of the Oracle Database,” Ellison said. “They have been unable to migrate to AWS because it is not good enough.”
Larry Ellison, Oracle co-founder, discussed why Oracle is still the best database in the world and why it’s significantly better than Amazon and SAP databases in an interview this morning:
Amazon Does Not Use AWS to Run Their Business
Sometimes I liken the computer industry to the fashion industry. Certain brands get popular, certain brands get unpopular. IBM when I first came into the industry was the ultimate brand. It was not a company against whom you would compete, it was the environment which you would compete. Amazon now is the number one brand in infrastructure cloud computing.
Let me tell you an interesting fact. Amazon does not use AWS to run their business. Amazon runs their entire business on top of Oracle, on top of the Oracle Database. They have been unable to migrate to AWS because it is not good enough. I keep saying this because they just spent another 50 million dollars last year buying still more Oracle Database. I keep saying this because well maybe our database is better than Amazon’s databases. Why else would Amazon keep buying our database?
Last year they bravely said that they are sick of these comments of mine and they are going to move off of Oracle. They said they are going to move off of Oracle by 2020. Well guess what, they took their first step, they just moved a bunch of their warehouses off of Oracle and guess what happened. I will send you a copy of Amazon’s internal memo. It went down. It failed. They had a huge outage. They said that if they would have stayed with the Oracle Database this wouldn’t have happened.
All of the World’s Most Valuable Data Runs on Oracle, Not Amazon
The Oracle Database manages most of the world’s data, today and ten years ago. Nothing has changed. All of the world’s important valuable data is in an Oracle Database. They’re not in Amazon’s database. Amazon won’t use its own database to run its business.
So if our database is so great what have we done wrong? We didn’t get our database to the cloud quickly enough. If you wanted a cloud database, you had to go to Amazon for a database. Then you were able to go to Microsoft for a database. It took a while for us to build a secure cloud. It’s really hard to build a secure cloud. We think we are there now.
We have by far and away the best database in the world. Nothing is close. We show a series of benchmarks where we are ten times faster than Amazon. More importantly, we are ten times cheaper to run the same exact thing on Amazon on our database. So if you want all that security and want all that reliability, you have to be able to spend less. That’s what we’ve shown in a series of benchmarks. Even Amazon can’t move.
People say that Oracle has no chance in database and Amazon’s going to dominate everything, well you would think that one of the early customers that Amazon would move, how about Amazon. No, Amazon picked Oracle.
We Have a 10-20 Year Lead on Amazon
We think we have a 10-20 year lead on Amazon on databases. Let me prove it. Another thing, Amazon uses Oracle not Amazon. Amazon’s transaction processing database that they have is called Aurora. Aurora is an open source database. They just it picked up and made it closed source on Amazon. They didn’t write any of that. They picked up Aurora, put it on Amazon and made it available on their cloud. Well, so who owns Aurora? Who develops Aurora? That would be Oracle. It’s called MySQL. That’s our small open source database which they claim is their big transaction processing database that’s going to replace Oracle. It’s just preposterous that Amazon didn’t even develop the Amazon database. It’s just a chunk of open source that we are responsible for called MySQL. MySQL does not compare to the Oracle Database. There is a reason Amazon uses Oracle.
SAP Also Uses Oracle Everywhere
You know who else uses Oracle? Another company that hates us, SAP uses Oracle everywhere. SAP ten years ago said I hate Oracle, I’m getting off of Oracle, I can’t stand these guys, especially this guy that goes on TV and makes fun of us. They say we have this great new database called Hanna. It’s awesome. Well, they have all of these cloud services such as SuccessFactors. Does it run on Hanna? But oh no, it runs on Oracle. Actually, 98 percent of everything SAP does runs on Oracle. A decade later, they still use Oracle, can’t get to Hanna.
The Oracle Database beat IBM in the database business and beat Microsoft in the database business. We’ve been in this business for 20 years constantly making our database better. Now it’s the world’s first autonomous system.
The Oracle Database is Much Better Than Anyone Else Has
The EU actually did a study, of the top hundred SAP customers in Europe how many of them run the Oracle Database? Only 99 percent. One actually ran IBM DB2. All of their cloud services, whether it’s SuccessFactors, Ariba, all of these things which they’ve been trying to get off of Oracle and onto Hanna for a decade still all run Oracle. The reason is that Oracle is just a much better database than anyone else has.
Microsoft CEO Satya Nadella was asked if I can have any other piece of software in the world what would it be? Everyone thought he was going to say Google Search. He said the Oracle Database because it’s the information age and all of the world’s most valuable information is stored in an Oracle Database.
Oracle CEO Mark Hurd says that because they have a founder like Larry Ellison they are focused on generational changes. “At the end of the day what’s in our DNA deeply is to build for the future,” said Hurd.
Mark Hurd, Oracle CEO, discussed Oracle’s growth strategy in an interview earlier today:
We have a technical strategy. It’s very important in a technology company that you have a technology strategy. When you listen to companies that say here’s our strategy, produce a lot of cash flow, buy back stock, increase our dividend… that not a technology strategy.
Lead in Cloud Applications and Database Technology
Our strategy is to lead the applications market as it moves to the cloud and lead the movement of database technology as it moves to the cloud. I think our strategy is irrefutable. That said, almost everything in our company is at some stage in transition, moving from the old model to the new model. The company is going to grow its revenue and applications is just one example of that.
Our DNA is to Build for the Future
When you have a founder like Larry Ellison he’s very focused on generational changes. It doesn’t mean he doesn’t care about Quarter or care about our year, but at the end of the day what’s in our DNA deeply is to build for the future.
We have in some cases given away revenue that we could have had in the interest of moving our business to where we think the market is headed. If our sole objective was to grow our revenue on a quarterly basis we wouldn’t have deemphasized many of our businesses in order to pursue where we think the market is headed years from now.
If we Were Only Focused on the Short-Term Numbers…
We wouldn’t have made the applications transition. Our applications business is now in aggregate growing double digits. We could have stayed on the old model and probably had some short-term growth better than we had when we went through the transition. But it wouldn’t be where we want to be five years from now.
We’ve pretty much played the long game at every chance to move to where the market is headed. It will result in long-term revenue growth as our legacy businesses as a percent of our revenue goes down.
We Have No Business in Oracle Growing at the Rate of Oracle
We have no business in Oracle growing at the growth rate of Oracle. We have businesses either growing 40 percent or declining 30 percent and as you mix them up you get to the result of Oracle.
As those businesses become a smaller part of our total and the growth businesses become a bigger part of the total revenue will grow. One thing you can say when you look at the numbers is that when we hit revenue growth we know how to turn it into cash flow and earnings.
There Will Be Extreme Growth for Us
Executing the applications strategy, moving our customers, and then taking other peoples customers into the more modern world of SAT, there will be extreme growth for us. The ability to move our database to Gen 2 Oracle cloud infrastructure and Autonomous Database is actually more growth opportunity than the applications business. Just executing those two things is huge for us.
Apple CEO Tim Cook spoke at 2018 International Conference of Data Protection and Privacy Commissioners in Brussels last night and gave a bold and possibly controversial privacy speech. Cook directly challenged Facebook, and tech companies in general, to change their perspective on privacy. He also said that Apple is fully supportive of ‘a comprehensive federal privacy law in the United States.’
Below is the full text of Apple CEO Tim Cook’s speech followed by the full video embed:
Apple CEO Tim Cook – The Privacy Speech
It is an honor to be here with you today in this grand hall, a room that represents what is possible when people of different backgrounds, histories, and philosophies come together to build something bigger than themselves. I am deeply grateful to our hosts. I want to recognize Ventsislav Karadjov for his service and leadership. And it’s a true privilege to be introduced by his co-host, a statesman I admire greatly, Giovanni Butarelli.
Now Italy has produced more than its fair share of great leaders and public servants. Machiavelli taught us how leaders can get away with evil deeds, and Dante showed us what happens when they get caught.
You Set an Example for the World
Giovanni has done something very different. Through his values, his dedication, his thoughtful work, Giovanni, his predecessor Peter Hustinx, and all of you have set an example for the world. We are deeply grateful.
We need you to keep making progress, now more than ever. Because these are transformative times. Around the world, from Copenhagen to Chennai to Cupertino, new technologies are driving breakthroughs in humanity’s greatest common projects. From preventing and fighting disease, to curbing the effects of climate change, to ensuring every person has access to information and economic opportunity.
We See Vividly, Painfully, How Technology Can Harm Rather Than Help
At the same time, we see vividly, painfully, how technology can harm rather than help. Platforms and algorithms that promised to improve our lives can actually magnify our worst human tendencies. Rogue actors and even governments have taken advantage of user trust to deepen divisions, incite violence, and even undermine our shared sense of what is true and what is false.
This crisis is real. It is not imagined, or exaggerated, or crazy. And those of us who believe in technology’s potential for good must not shrink from this moment. Now, more than ever, as leaders of governments, as decision-makers in business, and as citizens, we must ask ourselves a fundamental question: What kind of world do we want to live in? I’m here today because we hope to work with you as partners in answering this question.
Technology Doesn’t Want To Do Great Things – That Part Takes Us
At Apple, we are optimistic about technology’s awesome potential for good. But we know that it won’t happen on its own. Every day, we work to infuse the devices we make with the humanity that makes us. As I’ve said before, technology is capable of doing great things, but it doesn’t want to do great things. It doesn’t want anything. That part takes all of us.
That’s why I believe that our missions are so closely aligned. As Giovanni puts it, “We must act to ensure that technology is designed and developed to serve humankind and not the other way around.”
Privacy is a Fundamental Human Right
We at Apple believe that privacy is a fundamental human right. But we also recognize that not everyone sees it that way. In a way, the desire to put profits over privacy is nothing new.
As far back as 1890, future Supreme Court Justice Louis Brandeis published an article in the Harvard Law Review making the case for a “Right to Privacy” in the United States. He warned, “Gossip is no longer the resource of the idle and of the vicious, but has become a trade.”
Our Own Information is Being Weaponized Against Us
Today that trade has exploded into a data industrial complex. Our own information, from the every day to the deeply personal, is being weaponized against us with military efficiency. Every day, billions of dollars change hands, and countless decisions are made, on the basis of our likes and dislikes, our friends and families, our relationships and conversations, our wishes and fears, our hopes and dreams.
These scraps of data, each one harmless enough on its own, are carefully assembled, synthesized, traded, and sold. Taken to its extreme, this process creates an enduring digital profile and lets companies know YOU better than YOU may know yourself.
We Shouldn’t Sugarcoat the Consequences… This is Surveillance
Your profile is then run through algorithms that can serve up increasingly extreme content, pounding our harmless preferences into hardened convictions. If green is your favorite color, you may find yourself reading a lot of articles or watching a lot of videos about the insidious threat from people who like orange.
In the news, almost every day, we bear witness to the harmful, even deadly, effects of these narrowed worldviews. We shouldn’t sugarcoat the consequences. This is surveillance. And these stockpiles of personal data serve only to enrich the companies that collect them. This should make us very uncomfortable. It should unsettle us. And it illustrates the importance of our shared work and the challenges still ahead of us.
We Support a Comprehensive Federal Privacy Law in the US
Fortunately, this year, you’ve shown the world that good policy and political will can come together to protect the rights of everyone. We should celebrate the transformative work of the European institutions tasked with the successful implementation of the GDPR. We also celebrate the new steps taken, not only here in Europe, but around the world. In Singapore, Japan, Brazil, New Zealand, and many more nations, regulators are asking tough questions and crafting effective reforms.
It is time for the rest of the world, including my home country, to follow your lead. We at Apple are in full support of a comprehensive federal privacy law in the United States. There and everywhere, it should be rooted in four essential rights.
First, the right to have personal data minimized. Companies should challenge themselves to de-identify customer data, or not to collect it in the first place. Second, the right to knowledge. Users should always know what data is being collected and what it is being collected for. This is the only way to empower users to decide what collection is legitimate and what isn’t. Anything less is a sham.
Third, the right to access. Companies should recognize that data belongs to users, and we should all make it easy for users to get a copy of, correct, and delete their personal data. And fourth, the right to security. Security is foundational to trust and all other privacy rights.
There Are Those Who Would Prefer I Hadn’t Said All of That
Now, there are those who would prefer I hadn’t said all of that. Some oppose any form of privacy legislation. Others will endorse reform in public and then resist and undermine it behind closed doors. They may say to you, ‘our companies will never achieve technology’s true potential if they are constrained with privacy regulation.’ But this notion isn’t just wrong, it is destructive.
Technology’s potential is, and always must be, rooted in the faith people have in it, in the optimism and creativity that it stirs in the hearts of individuals, and in its promise and capacity to make the world a better place. It’s time to face facts. We will never achieve technology’s true potential without the full faith and confidence of the people who use it.
At Apple, Respect for Privacy and Suspicion of Authority Are in Our Blood
At Apple, respect for privacy and a healthy suspicion of authority have always been in our bloodstream. Our first computers were built by misfits, tinkerers, and rebels, not in a laboratory or a boardroom, but in a suburban garage. We introduced the Macintosh with a famous TV ad channeling George Orwell’s 1984, a warning of what can happen when technology becomes a tool of power and loses touch with humanity.
And way back in 2010, Steve Jobs said in no uncertain terms, “Privacy means people know what they’re signing up for, in plain language, and repeatedly. It’s worth remembering the foresight and courage it took to make that statement.
When we designed this device we knew it could put more personal data in your pocket than most of us keep in our homes. And there was enormous pressure on Steve and Apple to bend our values and to freely share the information. But we refused to compromise.
In fact, we’ve only deepened our commitment in the decade since. From hardware breakthroughs that encrypt fingerprints and faces securely and only on your device to simple and powerful notifications that make clear to every user precisely what they’re sharing and when they are sharing it. We aren’t absolutists, and we don’t claim to have all the answers. Instead, we always try to return to that simple question: What kind of world do we want to live in?
At every stage of the creative process, then and now, we engage in an open, honest, and robust ethical debate about the products we make and the impact they will have. That’s just a part of our culture. We don’t do it because we have to, we do it because we ought to. The values behind our products are as important to us as any feature.
The Dangers Are Real From Cyber-Criminals to Rogue Nation States
We understand that the dangers are real from cyber-criminals to rogue nation states. We’re not willing to leave our users to fend for themselves. And, we’ve shown, we’ll defend them, we will defend our principles when challenged.
Those values, that commitment to thoughtful debate and transparency, they’re only going to get more important. As progress speeds up, these things should continue to ground us and connect us, first and foremost, to the people we serve.
For AI to be Truly Smart, It Must Respect Human Values
Artificial Intelligence is one area I think a lot about. Clearly, it’s on the minds of many of my peers as well. At its core, this technology promises to learn from people individually to benefit us all. Yet advancing AI by collecting huge personal profiles is laziness, not efficiency. For Artificial Intelligence to be truly smart, it must respect human values, including privacy.
If we get this wrong, the dangers are profound. We can achieve both great Artificial Intelligence and great privacy standards. It’s not only a possibility, it is a responsibility. In the pursuit of artificial intelligence, we should not sacrifice the humanity, creativity, and ingenuity that define our human intelligence. And at Apple, we never will.
In the mid-19th Century, the great American writer Henry David Thoreau found himself so fed up with the pace and change of Industrial society that he moved to a cabin in the woods by Walden Pond. Call it the first digital cleanse.
Yet even there, where he hoped to find a bit of peace, he could hear a distant clatter and whistle of a steam engine passing by. “We do not ride on the railroad,” he said. “It rides upon us.”
Those of us who are fortunate enough to work in technology have an enormous responsibility. It is not to please every grumpy Thoreau out there. That’s an unreasonable standard, and we’ll never meet it. We are responsible, however, for recognizing that the devices we make and the platforms we build have real lasting, even permanent effects, on the individuals and communities who use them.
What Kind of World Do We Want to Live In?
We must never stop asking ourselves, what kind of world do we want to live in? The answer to that question must not be an afterthought, it should be our primary concern. We at Apple can, and do, provide the very best to our users while treating their most personal data like the precious cargo that it is. And if we can do it, then everyone can do it.
Fortunately, we have your example before us. Thank you for your work, for your commitment to the possibility of human-centered technology, and for your firm belief that our best days are still ahead of us.
Oracle’s Larry Ellison introduced the Generation 2 Cloud at Oracle OpenWorld 2018 yesterday with a primary emphasis on security. “Other clouds have been around for a long time, and they were not designed for the enterprise,” Ellison said. “We will never put our cloud control code in the same computer that has customer code.”
Oracle’s focus on security was also the theme of statements made by Oracle CEO Mark Hurd in an interview today:
Three Big Things in the Oracle Gen 2 Cloud… Security, Security, Security
It isn’t just AWS, there’s a broad set of breaches across the industry. The level of sophistication of the attacks is ever increasing, so just as our capabilities to defend are increasing so are the ability to attack. Larry’s (Oracle co-founder Larry Ellison) message started with three big things in Gen 2, security, security, security. He really hit home on the security side.
In addition to that, we focused on the evolution of our database technology, which is just as important in the context of the entire Gen 2 approach. This is the most exciting database release we’ve had in concert with Gen 2 in the history of the company. This autonomous self-driving database.
The Autonomous Self-Driving Database
When we release a patch to the database of a vulnerability that gets patched it typically takes six to nine months for our customers to implement those through their entire ecosystem. This now gets done automatically. You automatically get the protection of the patch with the push of a button.
The ability now to do this, the ability now to auto-tune the database, these are huge improvements in the database that we’ve never seen before in concert with Gen 2.
Apps Are 25-30 Percent of the Business
Apps are about 25 to 30 percent of the business. It’s growing double digits, that’s a holistic number for the applications business across all of Oracle whether it’s our support, SAS, and SAS is, of course, driving all of that plus some. Now in TAC what we did in Q2 of last year we introduced a concept called bring your own license (BYOL). That had the effect of making a license portable, whether using in your data center or whether you’re using it in the cloud.
The impact of that was our license revenue actually went up. People decided to buy more of those licenses the traditional way if you would for a couple of reasons. One is our customers have a hard time predicting the workload that’ll be on-premise versus the cloud. Will it change four or five percent? I don’t know. Therefore, I’ll buy a traditional license which caused our licenses to go up and what you would think of as our non-SAS platform revenue to actually not grow as fast as it was previously.
Oracle Will Have Data Center Capabilities in the Middle East.
The Middle East as a region is a very strong region for Oracle and we will have a data center in the Middle East. Whether that’s in UAE, whether that’s in some other part of the Middle East, we’ll see. But we will put a data center capability in the Middle East. We always like to have all the facts (Regarding the Kashoggi allegations) before we jump to any conclusions. We have some and certainly, we’ll look to get all those facts. That said if some of these things were true obviously that would be of great concern to us.
Again, it’s an important region for us and I don’t want to take one action and paint a picture across an entire region. There’s an entire region of very good customers and we will have some data center capabilities in the Middle East.
There was a session at the recent GeekWire Summit on how the IoT explosion will impact retail stores where underpants were discussed. It’s humous but very illustrative of how every item in every store, electronic or not, will be tracked in order to provide personalized shopping experiences and to bring massive efficiencies to the supply chain.
Below is a conversation with Hointer CEO Nadia Shouraboura and Impinj CEO Chris Diorio on the importance of all items, even underpants, being eventually connected to the internet:
Hointer CEO Nadia Shouraboura – What is the Internet of Things?
The Internet of Things is just one part of the puzzle and many things need to come together to make this puzzle happen. For example, in the retail space, product is very important, price is very important, but experience is very important too, so IOT is just one part of that puzzle.
Impinj CEO Chris Diorio – Connect Every Item in the World
Impinj builds products around a certain type of RFID technology called Rain for radio identification. Our vision is to connect every item in your everyday world to the Internet, everything. Every apparel item, every food item, just literally have connectivity for every item in the world. Impinj has connected more than 25 billion items to date and more than seven billion last year alone.
We connect those items wirelessly and what we’re focused on delivering is for each item is its unique identity, its location, and its authenticity, and in so doing extending the reach of the Internet to everybody and to everyday items. For us, the Internet of Things truly means things, not just connectivity for powered electronic devices, but for everything, and in so doing bring benefits to industries and consumers.
Impinj CEO Chris Diorio – Connecting Underpants?
When you go into the store and you want to find the ones that you want to buy in the right size and the right type if you’re like me you know exactly what you want to buy and when you go in the store you want it to be there. If it’s not there because the supply chain inefficiencies you’re probably not going to buy anything.
Hointer CEO Nadia Shouraboura – IoT and Underpants
The importance of IoT to underpants is to measure results and what IoT delivers in terms of results. One thing which is important when you think about Underpants is sex. To me, sex is defined by two metrics which is quantity and quality. What I discovered personally is, for example, IoT lights, beautiful lights.
The experience is you come in and you’re tired and you don’t want to think about sex and suddenly the whole room turns to your mood in soft blue and it genuinely works. If you measure IoT devices and lights and its correlation with quantity and quality of sex in underpants there is a very strong correlation. That’s an example of the impact of IoT to your underpants.
Impinj CEO Chris Diorio – Even Your Underpants
There’s a retailer that we work within France that if you are a consumer and you walk into the store, there’s a kiosk you basically where you decide what you want and when you click the item within 90 seconds the item comes down in a little tube like they used to have in the banks. A little tube comes down with your little capsule with exactly what you want to buy. Just check it out right there just walk out of the store, even if it’s your underpants.
Facebook has created a War Room ahead of the midterm election that is filled with data scientists and specialists trying to stop the spread of what it considers fake news. However, conservatives on YouTube see this as really an attempt to stop the spread of conservative thought.
“Calling it the “Department of Censorship” would have been a bit too embarrassing,” one commenter said. Another called it, “Facebook’s “Get Democrats elected in the mid-terms” campaign HQ and a warm-up for their much larger “Get a Democrat in the White House 2020” campaign.”
Perhaps reinforcing this perception of bias is that the War Room is lead by former Obama Administration appointee, Nathaniel Gleicher, who is now Head of Cybersecurity Policy at Facebook.
Here are some other comments from people concerned about Facebook bias against conservatives and also those who just don’t like the idea of censorship:
“They are only blocking conservatives.”
“They call it patrolling. I simply call it selective censoring.”
“DNC extension war room😔”
“This is scary. We must have a better way to screen fake news.”
“To be clear: had HRC won in 2016, none of this would be happening.”
“USA learning tricks from Chinese.”
Others are concerned that Facebook’s entire advertising model motivates polarization. “The advertising business model creates the wrong incentives for Facebook,” says Roger McNamee in a discussion on Bloomberg. “Essentially, it forces them to use highly addictive technology and to basically push people to increasingly extreme positions, so polarization is good for their business. Anger and fear are good for their business.”
Facebook is confident that the War Room will be effective in stopping election manipulation, especially by foreign actors. Nathaniel Gleicher, Nathaniel Gleicher, Head of Cybersecurity Policy at Facebook and Samidh Chakrabarti, Facebook’s Head of Civic Engagement discussed the War Room in a recent interview:
Nathaniel Gleicher – Head of Cybersecurity Policy at Facebook:
In order to manipulate public debate, first, you have to understand the culture you are targeting. There’s always going to be more people inside a country that understand that than outside.
We are talking volume. The interference that comes from overseas can be particularly pernicious because there you have a public State that’s looking to influence or manipulate or mettle in another country’s public debate.
Part of what we’ve tried to do, particularly as we need to move very quickly is pushing as much of the decision making to the teams as possible, but obviously, there’s an escalation chain available so that when we need to move something up to Mark (Zuckerberg) or Sheryl (Sandberg) we can do it quickly.
I think our goal and our responsibility is to ensure that we are helping democracy more than we are hurting it. We are ready. That doesn’t mean that there aren’t going to be challenges. When you have malicious actors like this there are always efforts, there are always going to be unexpected threats.
Samidh Chakrabarti – Facebook Head of Civic Engagement:
Right now we have experts from across the company. Data scientists are looking at dashboards and seeing for example if there is any kind of spike in content that could be related to voter suppression to prevent any of it from going viral.
Our investments in machine learning have actually allowed us to block fake accounts usually at the moment of creation.
Oracle just released a new video commercial for the Oracle Autonomous Database featuring Oracle co-founder, executive chairman, and chief technology officer Larry Ellison:
The world’s first and only fully autonomous database. Oracle Autonomous Database is 100% self-driving. It needs no human intervention. The Oracle autonomous database continuously tunes itself. This makes it faster and much cheaper to operate. It will automatically scale itself up as the demands on the system go up and will automatically scale itself down so when there isn’t a lot of demand on the system you’re not paying for what you don’t use.
We are using machine learning to make our software self-driving. We have to automate our cyber defenses. The Oracle autonomous database automates the entire thing. A much more reliable system. A much more secure system. The system that protects against data theft. The system that’s up 99.995% at a time and a system that makes you and your developers dramatically more productive.
“This is a generational release for us as we bring it to market.”
Oracle co-founder Larry Ellison has previously said about the database:
“The cool thing about the Autonomous Database Cloud is because it is autonomous the database is fully automated. Human Beings don’t create the database, the database creates itself. Human Beings don’t tune the database, the database tunes itself.”
Hopper, an AI-driven prediction travel app that competes with Priceline and Expedia, is somewhat under the radar but actually has been around for over 3 years and has over 30 million users. Hopper founder and CEO Frederic Lalonde says that Hopper is fundamentally different because the app sees into the future.
“We’re fundamentally different because the Hopper app sees into the future. We were built on the premise of big data so we collect billions, actually 750 billion prices every month, and we track airfare predictively.”
Frederic Lalonde, CEO of Hopper, talks about Hopper and how it is fundamentally different than Priceline and Expedia in a recent interview.
New Round of Fundraising For International Growth
This round of fundraising is all about international growth for us. The Hopper app has been around for about three and a half years and on and off and it’s the number one travel app in the US. We have over 30 million users, but what’s really changed in the course of the last year is our pickup outside of North America.
There are markets like Europe, Southeast Asia, Australia, and Latin America where we’ve seen extraordinary growth, upwards of 300 percent year-over-year, because we’ve been adding inventory to the app. This latest funding puts us in a position to continue that growth and become the worldwide leader in mobile travel.
The Hopper App Sees Into the Future and Predicts Prices
We compete directly against anybody who sells travel online, that’s Priceline and Expedia, and those companies own all the brands that you’re using. We’re fundamentally different because the Hopper app sees into the future. We were built on the premise of big data so we collect billions, actually 750 billion prices every month, and we track airfare predictively. If a user is looking to go from New York to London, Hopper up to a year in advance will tell you the best day in the future to buy your airfare. we also do the same thing for hotels and we’re expanding.
We’ve been doing this for over a decade and we have proprietary algorithms that also operate. Fundamentally, Hopper is part of a new generation of commerce marketplaces that are deeply built on data and AI. You can see by the success of the platform that it’s different.
Hopper is Mobile Only
The other thing that makes us totally different is the fact that we’re only an app. We’re mobile only and the user experience is totally different because you’re letting the app do all of the heavy lifting for you. You’re saying when you want to travel and you can even leave that open and where you want to go and the app continuously tracks and shops all of these prices for you and you receive push notifications. For scale, we’ve sent about 2 billion push notifications to our users over the last two years.
The other things that we compete against are websites where you have to do all the work yourself. What we’ve seen because we track all the data is when we as human beings do this we end up on average paying 5 percent more than we would have if we bought the first price that we’ve seen.
Some people will score some deals, but on average we do much worse because we’re being tracked by cookies and the airline companies and the websites know that we’re doing this at predictable hours. The Hopper model does this for you and the outcomes are actually much better.
Peter Lee, Corporate Vice President of Microsoft Healthcare, says “It’s a historic time right now with whole health industry moving to the cloud.”
Peter Lee and Aneesh Chopra, former Chief Technology Officer of CareJourney, discussed how the healthcare industry and all of the cloud providers including Microsoft, Google, Amazon, IBM, Salesforce, and Oracle are in agreement on data standards that are making this move to the cloud possible.
It’s a historic time right now with the whole health industry moving to the cloud. We now have viable new standards for health data and there’s some pretty smart policy that you had a direct hand in creating. It all seems to be coming together right now. – Peter Lee
A Wonderful Opportunity to Show Leadership
The consumer right to access their health information and to make sure it’s available when and where it’s needed is really a bedrock principle that’s having an impact in all aspects of this. Physicians, health plans, and health systems are all trying to figure out how to communicate to consumers and how to use that infrastructure to better serve them through care teams and others. I think it is a wonderful opportunity to show some leadership. – Aneesh Chopra
All of the Major Cloud Providers Came Together
It was a pretty high point in my career to be on stage holding hands with my counterparts from Google, Amazon, IBM, Salesforce, and Oracle. It was pretty awesome. The idea is can we intervene in just the right way so that when health data moves to the cloud we will be in a more interoperable place. – Peter Lee
Embracing a Common Language and Architecture
The fact that we are not going to be Betamax versus VHS, that we preemptively said that the industry when it makes this move is going to embrace a common language and common architecture. I think that’s kind of a big deal. The more important thing is that none of this is going to happen on its own. We are going to have to have people participate.- Aneesh Chopra
Health Responders Currently Can’t Access Health Data
We heard some amazing stories, even from Seema Verma, the CMS Administrator, about what danger we put ourselves in when we get ill or something happens and the people who respond and try to help us can’t access health data. It doesn’t flow and it’s not liberative. It’s just something that we need to work together to fix. – Peter Lee
This is a Unique Moment
Everyone’s known this has been a challenge and it’s been a challenge for decades but the moment seems to be right. There is this transition to the cloud, there’s a regulatory clarity from both political parties that says with one voice we want open API’s with no special effort.
Frankly, a commitment from the major EHR vendors as well as the health systems and other stakeholders should say we’re willing to participate and we’re willing to work together. That’s a unique moment that we’ve got to take advantage of for the industry.- Aneesh Chopra
There is Some Marketing But It’s Also Authentic for Microsoft
The HR vendors, that whole industry, has done an amazing job over the last 15 years getting everything to be digital. Now that that’s been accomplished, an amazing accomplishment that was, we now need to get the value out of that data. Really open it up, really enable it to be the thing improves costs and improves outcomes.
For us, it’s also just a chance for Microsoft to play a positive role in all of this. Sure, there are big business opportunities, but when you think about Microsoft today and how open it is, the ethos to empower people and organizations, there is some marketing there but it’s also an authentic real thing for us. – Peter Lee
The Time is Now
The fact that there is a table that’s been set with all the key players including the EHR vendors and the cloud providers and even organizations like Apple saying let’s all agree that this is a path let’s start to get to work on, setting up clinical notes and all the other data that has not yet been run through a standards process.
That’s why I think the opportunity for everyone to participate is now. If you have use cases if you have an opportunity to know how to move your data to a more open environment the window of opportunity is today.- Aneesh Chopra
Facebook’s announcement last Friday that 50 million of its user accounts were compromised by hackers only emphasizes how vulnerable our data is and how little control we have over who gets to see it. This is not what Tim Berners-Lee envisioned when he created the world wide web back in the 1980s. However, the esteemed engineer’s new project will reportedly take the power away from large internet providers and give it back to ordinary users.
A Solid Way to Disrupt the Internet
Berners-Lee and his partner John Bruce have just unveiled their new startup, Inrupt. Supported by Glasswing Ventures, the company aims to change the internet and fulfill Berners-Lee’s vision of a free web where people have control of their data.
In arecent interview, the MIT professor said that he has been imaging this moment for some time now. And with everything that’s happening with Facebook, Amazon, and Google, it’s now time to move and take advantage of this “historical moment.”
Berners-Lee and his MIT team have spent the past few years developing Solid (Social Linkedsolid Data) and Inrupt is the first company to be built off it. Solid is said togive web users total control of their data through a POD, or Personal Online Data storage system. This is a file that holds all the user’s data, everything from addresses, friend lists, videos, images, and documents.
The Solid team has designed the software so that it can create and manage a POD on either a hosted server or on a personal one. Companies can also use the system to design apps using the Solid platform.
Development for the Solid POD will reportedly wrap up soon. Interested parties can actually start making their own PODs right now on the Inrupt website. However, the interface admittedly leaves a lot to be desired but you can use this time to familiarize yourself with the platform.
Users will have the option to enroll their PODs in a storage service or store them on a standalone device. Meanwhile, apps and websites that want to access a user’s information will have to request the specific POD for it. But whether the device will share the information or not depends on the user’s preference. More importantly, apps or social media platforms won’t have control of the information. The data will be automatically removed from their system once access to the POD has been disabled.
Can We Take Back the Internet?
There’s no denying the merit behind Berners-Lee’s Inrupt and that it has the potential to turn the internet on its head. But the question on everyone’s minds is iwhether it will have the chance to do so.
First, Inrupt and Solid still have a lot of questions to clarify. For instance, there’s the scope of the data that can be stored in PODs and how it will be maintained. Since a lot of people are already using the cloud for safekeeping data, would they have to migrate everything to a POD?
Then there’s the fact that generating revenue through ads is still a crucial element and Solid might hinder that. For example, a music streaming service, providers will be hard-pressed to develop user profiles and recommend songs to clients if they can’t store customer data on their servers.
Established platforms, like YouTube, would also be wary about suddenly switching to PODs. Even if they’re inclined to, their shareholders might not be too happy about it. Not only is Inrupt untested, but a lot of companies would also find that continuing with the business model they have now is simpler.
The recent massive data breach at Facebook have brought to focus that if one of largest technology companies in the world can have their data compromised then any company, regardless of the security measures they may have in place is also vulnerable. This included sectors such as healthcare, banking, and transportation.
The CEO of Rapid7, a company which offers vulnerability management solutions, says that cybercriminals have recently realized that data is money and that vulnerabilities are happening because of our speed of innovation. This is compounded because almost all companies are in essence becoming software companies.
Corey Thomas, Rapid7 President and CEO, discussed the challenges of cybersecurity on CNBC this morning:
Cybersecurity Attacks Affecting the Fundamentals of Business
What we’re finding is that more and more things are actually causing people to really understand that cybersecurity attacks are going to affect the fundamentals of the business. I think with Facebook, it was the additional layer of so much turmoil and scrutiny already that it’s just another sign that it’s going to be troubling days ahead.
I was surprised by the recent breach in some ways because of how seriously Facebook takes security. On the other hand, when you look at the details of the breach it was completely understandable. They have lots of technologists, they’re moving fast, and the compromise itself and the vulnerability itself was the interplay of a whole bunch of different errors that actually went wrong at the same time.
We Have Not Designed Our Technology Ecosystem to be 100% Secure
One way to think about it is that we have not designed our technology ecosystem to be a 100 percent sure and secure. We value speed and one of the reasons that so many companies are successful is because they’re fast at building technology that all of us love and adopt and use. The side effect of that, unfortunately, is that speed comes at a cost.
Speed of Innovation Raises Security Risks
I don’t know if we’ll be able to put the speed of innovation genie back in the box. I do think we’re going to have to raise standards and I think there are lots of fundamental things that people can and should be doing.
What actually scares me more are not the Facebook’s of the world, because I think Facebook and many companies have good security. It’s the fact that our entire economy is becoming more digital and frankly most of the companies that are starting to actually turn their services into technologies that are digitally connected are just not as sophisticated with security as a company like Facebook.
Almost Every Company is Becoming a Software Company
If you look at healthcare and the transportation ecosystem we’re connecting more and more aspects of our lives and we’re turning them into compute. You have a bunch of companies in the software industry which just ten years ago used to be an industry of relatively few names in the overall ecosystem.
If you look toward the next ten years, almost every company is becoming a software company in some way.
Cybercriminals Have Recently Realized that Data is Money
Banks have been focused on security for longer because they’ve been the targets of fraud people have always gone after the money. You can argue that it’s a relatively recent focus area to realize that data’s money. That’s something that the internet companies realized 10 plus years ago and criminals have now realized that in the last five years, so that’s a change.
The other aspect of it is banks do innovate less. If you look at one of the biggest disruptions that are coming along now is the in the financial services sector and in the consumer financial services sector. I would argue that banks are having the other outcropping of that because they innovated a slower pace typically they are now being disrupted.
Steve Stone, former CIO of L Brands and Lowes, recently discussed how retailers can use data to serve their customers better and become incredibly customer-centric:
Retail Grew Up Differently
When you think about retail, retail grew up differently. We started with stores and then we eventually added e-commerce. We were also very much notorious best-of-breed in the way we build our applications. Over time, you’ve got this technical debt where information about the customer and information about the product is stored in many different places.
When you’re trying to build an integrated seamless frictionless customer experience it’s very hard to do that if your information is disjointed. One of my favorite sayings is if the plumbing isn’t right it doesn’t matter how nice the experience is it just isn’t going to work. This is a huge challenge for retailers and it’s where technology really has to play a role, not only to combine the information but to find ways to add speed and agility to the entire process.
Data Key to Meaningful Customer Experiences
I’ve always said data governance isn’t exactly sexy but it’s it’s what really drives the ability to deliver those types of meaningful customer experiences. With the focus now today on the customer experience with the Internet of Things and with all these new technologies coming at us and especially with the advent of AI and machine learning, we now see that data has to be right, the hygiene has to be great. Suddenly, master data has become a vogue term in retail and in consumer products.
I think the biggest problem a lot of companies find is they’ve got to find a place to start. You’ve got to get that starting point. Picking an experience, an experience that you want for the customer, and then flowing back through, where are all the interaction points of data, where does it originate, and where is it getting corrupt? Cleansing that and building that one experience we’ll start you on your journey.
Be Customer Centric, Not Product Centric
After that, it’s really getting into the plumbing and understanding your data and understanding the customer. It’s always amazing when we build these great customer experiences, but they’re built more for us and not for the customer. At L Brands we always put the customer first. Be customer centric, not product-centric. How do we integrate, how do we become customer first in everything that we do?
We’re really at the point now where the technology exists to do this right. The integration platforms such as MuleSoft are really strong now that allows you to stitch together your applications plus build an extensible layer where applications can change quickly. That experience becomes one where if I’m a customer and I walk into a store and you don’t have the product I want there’s no problem. The product will still be at my doorstep the next day or hopefully that day.
Knowing Your Customer
I’m online and I want this product and I don’t want to have to wait for it to come from your distribution center in Detroit or Wisconsin. I want it and I’m in California and I get it in a couple of hours because the retailers are able to use the inventory in those local stores.
As a customer, you know me regardless of the channel, whether I came to you via the call center or whether I came to you in a store or online. You know me and that’s to me where retailers have to be. I don’t think that’s differentiating as much anymore, instead, I think that’s becoming the table stakes.
You can’t compete against the past, you’ve got to compete against what the future is going to be. I see retail changing so much from inventory, from the customer, and even the whole level of personalization that we’re trying to offer to the customer now. The customer is going to be asking for things that we would never have dreamed possible and yet in a few years we’re going to be delivering it.
The Best Retailers Cater to Their Customers
Retailers that I really admire are Costco, Lilly Pulitzer, Ulta Beauty, Tractor Supply, they have a really great connection with their customer. They cater to that customer and they’re building out technology capabilities that really allow that customer to operate on their terms, not on the retailer’s terms, and I just think that’s so powerful.
Here is a quick tutorial that will help you easily deploy IBM MQ on AWS as a managed service on AWS. Waleed (Woz) Arshad shows you how quick and easy it is to get started.
IBM MQ provides proven, enterprise-grade messaging capabilities, such as point-to-point and publish/subscribe models, to facilitate the flow of information between applications. This service enables you to use IBM MQ as a managed offering. The IBM Cloud handles upgrades, patches, and many of the operational management tasks on your behalf, so you can focus on integrating MQ with your applications. – IBM
“Our lives, both online and offline revolve around data which drives the world’s businesses and must be protected at all times,” notes an IBM representative. “Data moves via mainframe, Linux or Windows servers, and other platforms on-premises and in the cloud. IBM MQ powers thousands of businesses worldwide and visibly moving terabytes worth of data.”
You can obtain a free trial of MQ as a managed service on Cloud on the MQ IBM website.
Tutorial by Woz Arshad, Advisory Offering Manager at IBM in the UK:
We’re going to run through how quickly and easily you can deploy a queue manager that’s managed by IBM onto AWS. You’ll be able to enjoy all of the benefits of a managed service with this queue manager on AWS. These benefits include infrastructure and version maintenance by the IBM cloud team, simple scaling of your service, and being able to connect to on-premise systems and cloud applications with ease.
You begin the process of deploying your queue manager in AWS by logging into the IBM cloud console. There, you create your instance of MQ in US South. After clicking create and defining the queue manager name in its display name you can select which location you want to deploy your queue manager. From the drop-down list select AWS US East and then click create.
Then, by the time you boil the kettle and made yourself a cup of tea you’ll have a queue manager deployed and running on AWS with the benefits of a managed service.
While recent data breaches on large enterprises like Home Depot, Target, and Yahoo made headlines worldwide, a 2016 report by cybersecurity firm Symantec revealed that 43 percent of cybercrimes actually target small businesses. What’s more alarming is that the number of attacks on small business has been trending upward every year since 2011. It’s easier to target small companies because many of their owners are not educated about the risks or don’t implement adequate safeguards to protect themselves.
However, a data breach can damage your company’s reputation and revenue. It can even put you out of business altogether. In fact, a reported 60 percent of small businesses fold within six months of a cyber attack. The need to protect yourself and your customers cannot be overstated.
Here are five safety measures your small business can implement to fend off cyber attacks:
1. Install the right software and keep it updated.
Good anti-virus, spyware and/or malware prevention software is your initialline of defense. Invest in a reliable one and keep it updated regularly. As a business owner, you should never ignore an update, no matter how busy you are. The older versions of a software or system are what hackers often work on.
Minimize the risk by making sure your antivirus software and operating system are up-to-date. Once you’ve been notified of an update, designate a time of the week to install it into your data system.
A lot of small business owners also make the mistake of just buying whatever data security software was recommended to them without understanding it or using it properly. To choose the right software, you’ll need to assess the type of data you’re protecting and how it will be stored. Is the information you’re protecting sensitive or neutral? How many people will have access to the information and for how long do you intend to store it? Data security is not one size fits all.
2. Invest in a secure network.
Select a dedicated and secure server that only your company and employees use. It might mean shelling out more money upfront, but your network is guaranteed to be secure from external attacks. This will significantly reduce the risk of your customers’ information being hacked. You should also make sure that your data is always backed up. A second copy will lessen the devastation of a malware attack.
3. Implement extensive security protocols.
Use every safety protocol and security strategy to protect data while still keeping it usable. Implement steps like multi-factor authentication and data encryption. Make sure you develop strong passwords to prevent hackers from cracking your code. Experts say passwords should be around 13 to 15 characters and should not be a word. Instead, go with random symbols, letters, and numbers. Investing in good encryption software is another way toprotect your customers’ personal data.
4. Educate your team and train them to follow best practices.
Most of the time, a data breach is caused by an employee’s negligence or complacency. This was what happened in the Target hack. It’s also something you see all the time in brick-and-mortar stores. Computers are left open and available or passwords scribbled on post-its for everyone to see.
Make sure you take the time to educate your staff on security technology and train them to understand and follow best practices for preventing a security breach. Cybercriminals use ploys that look legitimate so employees should know what to look for. You should also have a memo or a list of best security practices to follow, like changing passwords regularly or being careful when using personal devices at work.
5. Secure sensitive documents.
Make it a habit to safeguard important documents even if you no longer need them. Instead of just throwing customer files and documents in the trash, take the extra step of shredding them. It’s also a good idea not to store your clients’ credit card information. After all, there’s no need for you to do so and they can’t be stolen from you if you never collected them in the first place.
These security measures might look like a lot of work, but it is all worth it. After all, it’s better to err on the side of caution instead of losing customers or your reputation because of a data breach.
The release by Oracle of its AI-powered Autonomous Database Cloud earlier this year and just adding Transactional Processing to its abilities last week is huge for Oracle and its customers who need this cutting edge technology. Oracle considers the Autonomous Cloud a generational release because it literally is the first database in the world that can build itself and update itself without human help.
Oracle Autonomous Database Is a Generational Release
Probably our most important generational database release is the Autonomous Database. This is where the database is integrated with AI and machine learning that really just self-patches and self-tunes. It actually creates a position where your security issues go down, you get higher uptime, and you pay less money. We really never in our history had a database release that had as many positive business outcomes as opposed to just technology.
This is a place where you get better performance, more uptime and you will eliminate tons of labor. Most of our customers, for example, I know this has become a bigger issue with C-Suites now where the amount of time it actually takes to patch software can be months for most of our customers.
This release of the Autonomous Database literally eliminates that need to patch. This is a generational release for us as we bring it to market.
Oracle BYOL Explained
Let me explain BYOL (Bring Your Own License). That is simply where you can buy a license and you can use it on-premise or in the cloud, so it’s basically a currency that you can move across platforms. We’re one of the very few companies that allow you to do that, so we believe it’s an advantage for our customers and what they want and that’s why we utilize that strategy.
Second, I think you need to divide up what’s happening in the applications market versus what’s happening in the infrastructure and platform market. In the applications market, there’s an opportunity now for most companies to modernize all of their systems.
ERP is Moving to the Cloud
Let’s start with the back office systems, the biggest category of back-office applications is called ERP. ERP is basically companies financial supply chain manufacturing systems, etc.
All of those are really going to get replaced over the next several years as companies move to the cloud where there are much more innovation and much more work done by somebody else as opposed to by the customer. We’re in the very early innings of that market.
Oracles Technology is a Competitor Differentiator
We have a significant lead technology wise in ERP and we went through a ton of customer wins in the quarter. That market is going to over the next several years be very exciting. The technology infrastructure market, that’s as you move further up the stack, meaning from compute and storage to database to other tools and systems, Oracle gets more differentiated from competition the further you move up the stack.
Just replacing somebody’s computer with somebody’s infrastructure, while that’s interesting, the more technology you have and the more IP differentiates Oracle. Oracle has always been differentiated by doing the hardest jobs the best, by investing in R&D and investing in innovation.
Oracle Autonomous Database for Transactional Processing Announced
Larry Ellison, Oracle Co-Founder, CTO, and Executive Chairman, made the announcement:
We’re announcing the immediate availability of the Oracle Autonomous Database transactional processing. Now the machine learning based technology not only can optimize itself for queries for database warehouses and Data Marts, but it also optimizes itself for transactions.
It can run batch programs, reporting, Internet of Things, simple transactions, complex transactions, and mixed workloads. Between these two systems, the system that is optimized for data warehousing and the system that’s optimized for transaction processing, the Oracle Autonomous Database now handles all of your workloads. All of them.
Larry Ellison also recently gave his take on the Autonomous Database Cloud:
The cool thing about the Autonomous Database Cloud is because it is autonomous the database is fully automated. Human Beings don’t create the database, the database creates itself. Human Beings don’t tune the database, the database tunes itself.
The typical use case that we’ve been seeing is media entities that have large back catalogs of content that was originally created when they didn’t have complex metadata toolsets, didn’t have necessarily the right people applying metadata, didn’t think of all the use cases on the output side, such as historical content.
Teaching Watson About Tennis
A very concrete example is work that we’ve done for the US Open. We actually took hundreds of thousands of video clips and photos and news articles and vocabulary terms and proper names and fed it to Watson and helped Watson to understand what tennis was about. This was so that it could do things like when you heard the word “ash” it was capital ASHE, Arthur Ashe, as opposed to lowercase. There was a lot of training around that.
The output then became our ability to create clips based on what was happening within an event but also to describe historical video as well. That’s critical for companies with large media back catalogs who then need to optimize that before. You can apply it to live, of course, but that’s a typical use case that we see.
It’s a Recursive Learning System
It’s a recursive learning system where we took a cross-section of a set of video assets, described it to Watson, said this is what’s going on, this is who this player is, and this is what is being said. We were then able to turn it loose really on other unstructured assets, have it say what it thought it was finding, and then we were able to correct it.
We were able to basically train it up to understand tennis specifically.
Teaching Watson to Score Excitement
Then the output was we could then turn it loose on a bunch of different kinds of outputs for the client. The outputs are closed captioning, video clips, and excitement scoring. We were able to do things like listen for crowd noise and then say this must be really exciting because the crowd is making a lot of noise at this moment, so we were able to turn that into an excitement score.
We wouldn’t be able to do that if we didn’t really help the algorithm understand what it was looking at and how it should be thinking about that body of work. Then we just turned it loose and let it go.
That’s the idea, to get it to the point where you can just turn it loose and let it run.
“We cannot control our adversary,” saysRick McElroy, Security Strategist for CarbonBlack, a leading next-generation cybersecurity firm. “Although we can choose to control them once in our environment. We have little to no control over when the “big attack” happens. For too long I think we have focused so hard on finding the adversary that our internal threat intelligence has suffered as a result”. Sharing threat intelligence has gotten easier. Vendors have done a ton to allow teams to cultivate and exchange threat intel and while there is always more work we have abandoned the one thing we have a hope of controlling. The home field advantage.”
Editor Note: CarbonBlack is offering a free webinar on why companies are moving toward next-generation security here:
McElroy adds, “I have heard major CISOs sit in a room and say “asset management is impossible, so why try?” How is this what a leader would say? Yes, this thing we do isn’t easy but giving up is a sure fire way to never achieve a strategic goal.”
“It’s time we bring this to all defenders, not just customers of a certain organization. Carbon Black is on a mission to make the world safe from cyber attacks. To achieve this mission, we need every one of us sharing and helping quiet the noise. We need application developers and threat hunters on the same page. We need to unite as a community.”
One of the things I’ve had to work on the most as an #infosec leader is patience.
Strategy and culture change take a long time. Don’t get frustrated on the journey. Be patient.
Thoughts on the long game and being patient to achieve strategy… I would love to hear them.. pic.twitter.com/XHXgYJOC3w
Just about every enterprise company is feverishly working on implementing next-generation solutions to protect against internet threats. The primary reason is that traditional AV software is no longer effective enough:
First, let’s look at why traditional AV is falling short against the cyber-attacks organizations face today. Traditional AV technologies still rely on a signature-based approach that can only identify known threats. Attackers can run circles around this approach by making small tweaks to their malware in between signature updates; this allows them to operate with impunity while organizations scramble to deploy new updates.
In short, traditional AV leaves organizations one step behind the attacker. Making matters worse, a signature-based approach cannot detect modern attacks that do not write files to disk (so-called file-less attacks) or techniques that use trusted system tools like PowerShell to perform malicious actions. In order to combat the shortcomings of traditional AV, organizations must ensure that they have AV technology that takes a proactive approach to cybersecurity. – Dan Larson, Vice President Product Marketing at CrowdStrike via Security Ledger.
The Security Fight Has Escalated
“Nearly 20 years ago, viruses such as the Melissa virus and Love Bug worm were causing millions of dollars’ worth of damage, hijacking email servers, corrupting corporate and government documents, and forcing systems to shut down,” stated Martin Borrett, IBM Distinguished Engineer and CTO IBM Security Europe. “Today, cybercrime is a global plague that will cost the world economy $6 trillion annually by 2021, according to Cybersecurity Ventures.”
Borrett added, “As cybercriminals, nation-state attackers and hacktivist groups have become more sophisticated, the security industry has grown up to defend our national security as well as the vital interests of businesses and consumers. Gradually, the battle between attackers and defenders has become something akin to an arms race: New types of attacks lead to new defenses to block them. Security innovations become outdated as soon as attackers find ways around them. Meanwhile, cyberattackers continue to rely on social engineering tricks that are hard to defend against.”
New Cybersecurity Approaches Are Clearly Needed
According to Dr. Kirk Borne, Principal Data Scientist at Booz Allen, what’s needed is for companies to modernize their current cybersecurity defenses:
For modern cybersecurity operations to be effective, it’s necessary for organizations to monitor diverse data streams to identify strong activity signals. This includes monitoring network traffic data to find well-known patterns of common adversary activities, such as data exfiltration or beaconing. While these detection techniques are critical to cybersecurity operations, it is imperative to leverage such signals to predict future activities. Further capabilities could even be created to modify the behavior of the actor (or analyst) to the benefit of the organization and mission. This could include systems on networks that are trained to autonomously take action, such as blocking access to resources or redirecting traffic, based on a predicted behavior.
Modern attackers are too agile and creative for organizations to rely on passive descriptive analytics or reactive diagnostics techniques for protection. Rather, building an ability to forecast future outcomes through predictive analytics that utilize prior knowledge of events, particularly the precursor signals evident before an attack, are proactive measures. – Dr. Kirk Borne via a recent post on O’Reilly Media.
“The thing about human resources that I’ve noticed is that I think we are really approaching the time where the end of business as usual is happening and human resources and business follows as a consequence,” noted Gerd Leonhard, Futurist and Author of ‘Technology vs Humanity‘ in a recent talk at the 2018 BeyondHR forum in Amsterdam. “When we talk about people, what do we do in the future? All of the mechanics of today’s business, salaries, hiring, firing, vetting, taxes, etc., I think machines can do a lot of that.” Of course, he’s talking about very intelligent machines that learn via machine learning and utilize cognitive computing enabling the reviewing billions of data points within seconds in order to make recommendations and in some cases actual decisions that impact humans.
Social Responsibility of HR and Technology
“Clearly, the more connected we become, the stronger we must think about responsibility, ethics, design, social contracts. When HR moves to the cloud, and many of you are already in the cloud, the possibilities are endless but the responsibility is also increasing. It’s a very powerful tool, so if something goes wrong it can also have very powerful consequences. The primary moving count is that we should put human flourishing first, put the human inside. We should never ask the question if technology can do something, just because it can. Right now, that’s still a question, but in ten years technology can literally do anything. Once we have quantum computing, that’s roughly 5-7 years to really happen, then we have unlimited juice where we could do anything. Humanity will change more in the next 20 years than it has in the previous 300 years!”
So How Does This Impact HR?
“Anything that cannot be automated or digitized becomes more valuable and that is going to be the tough part for HR,” says Leonhard. “How in the world would you measure people based on those KPI’s, so to speak, the KPI of compassion? In a way, you do that now but you do it in a non-scientific way, you do it personally. And how do you teach somebody emotional intelligence?” We are moving to a world where emotional intelligence is becoming just as important as IQ for HR managers, according to the author.
“We should embrace technology but not become it. I think for HR that holds the key to the future, embracing technology but in such a way that we can still serve humans.
A new report from the Wall Street Journal has revealed that third-party app developers have access to the emails of millions of Gmail account holders. Two companies have reportedly even allowed employees to read said emails. While Google claims that these developers have been thoroughly vetted, there are still fears that this could end up as a data breach similar to the Cambridge Analytica fiasco.
According to the Wall Street Journal, Gmail users that have signed up for some services, specifically travel and shopping price comparison tools, have agreed to terms and conditions that enabled the developers of this software andservices to read their emails.
Gmail’s access settings do allow app developers and data companies to see the user’s emails and the private details that go with it, like the recipient’s address and time stamps. They can actually even view the whole message. And while application does require user consent, the permission form is admittedly vague on letting humans read emails instead of just machines.
These third-party developers claim to only use the information gathered from Gmail account holders for advertising purposes and targeted shopping suggestions. Google asserted that it has extensively vetted these developers, a process that entails checking that the company’s identity is represented by the app, that the data requested is in line with the service it offers, and that its privacy policy clearly states that it will monitor emails.
The Wall Street Journal report mentioned two specificapps that had access to said emails – Edison Software and Return Path. The former reportedly had employees read thousands of emails to assist in the training of its “Smart Reply” feature while the latter also allowed staff to read private messages to help in the development of the company’s software. Both companies said they have permission from users and that their actions were covered in their terms and conditions.
In a blog post, Return Path gave assurances that they “take great care to limit who has access to the data, supervise all access to the data.”
Meanwhile, Edison Software CEO Mikael Berner clarified the context in which their engineers read “a small random sample of de-identified messages” by saying it was for R&D purposes. He also revealed that the company stopped the practice some time ago and that all the data has been expunged “in order to stay consistent with our company’s commitment to achieving the highest standards possible for ensuring privacy.”
It’s not certain yet what kind of blowback the news that Google has allowed third-party developers access to user emails might have on the company. In all likelihood, it will be scrutinized the same way Facebook was after the Cambridge Analytica issue.