Category: Big Data

  • Anonymous Surfing

    Anonymous Surfing

    You don’t have to be an online arsonist, hacker, or international cyber-terrorist to hide your online identity. Likewise, concealing your PC’s web address or your Internet Protocol address (IP address), making it unknown to the public, does not necessarily mean you are up to no good online.


    We will, therefore,  build a case for why it is important at times to conceal your private online location using VPNs (Virtual Private Networks).


    A VPN is a connection method used to add security and privacy to your private and public networks. This includes your Wi-fi Hotspots and access to the Internet. They are most often used by corporations to protect sensitive data but now also by people like yourselves for the same purpose.

    VPN-Protect-you

    Click on the image to view a quick video


    Let’s get back to the importance of your IP address. It is probably something you rarely think about but is crucial to your online lifestyle even as an individual. How so? You might still ask.


    Well, without an IP address, you wouldn’t be able to get the current weather, check the latest news, or view videos (streaming) online for instance.

    The uses of VPNs

    Your IP is also used to access every online service you partake in including very private things like your internet/mobile banking or online trading activity.  Think of it as your physical address and how important it is when getting things delivered by post or using it when you need to make applications for loans, jobs, etc.

    “Without a public IP address, online service providers like Netflix, BBC, or Amazon wouldn’t know where to send the information you asked for. They wouldn’t be able to get it to your computer.”


    Imagine how naked you must feel if you have nothing to protect this address from the advent of a hack without adequate data encryption.  Also the just the haggling by overzealous online marketers, spam, malware, and even ‘419 scammers’!


    Now the argument for whether using VPNs is illegal is highly debatable for some of the valid reasons highlighted above. It should, however, be a given right to be able to use it. And even though it is commonly used by cyber-thugs to mask their clandestine and often dark activities, it should not be outlawed altogether.

    The case for VPN

    The legitimacy of VPNs debate, therefore, carries on into a grey area.
    We will, however, investigate a few VPN providers that are ‘paid for services’ and even offered by established companies such as AVG (which primarily offers Antivirus protection).


    The directive is to help the everyday consumer surf the web without ‘virtual’ salespeople bombarding them with offers based on personal information gathered in an ‘unsolicited’ manner.


    Policies like the European-based GDPR law were put in place to protect consumers from the non-consensus use of their data. Even your Internet Service Providers (ISPs) can track your online activities via your IP and sell your browsing habits.


    Some forward-thinking people and companies, however, have long been shielding themselves manually using VPNs.


    One direct benefit for you as a consumer is the ability to access content (information, products, and services) from different servers. A good VPN service can enable you to obtain access to other geo-locational content despite being on a different continent.

    It is perfectly legal provided you are paying for the service. The burden falls on the provider of the service and not you if it came down to a legal “scrap”.

    Rationale for using them

    If you perform these tasks frequently, you need a VPN:

    • Hide your IP address (to enable anonymity from marketers and hackers)
    • Change your IP address (to avoid identity theft)
    • Encrypt data transfers (private and financial data)
    • Mask your location (to access other services)
    • Access blocked websites
    250x250

    A word of caution when navigating websites blocked by governments with a VPN. Unless you are a high-profile journalist working on a case and backed by good legal aid – it’s not a wise thing to do.
    Do some research if you are not sure because accessing such sites could land you in some hot water. Rather use a known privacy service like Tor to ensure full anonymity to gain access to restricted sites if you really must.


    Top Virtual Private Network Protocols

    VPN protocols and available security features are numerous. The most common (best) protocols are:
    ExpressVPNthe acclaimed best offshore VPN for privacy and unblocking.
    IPVanish great for P2P and Torrenting.
    VyprVPNthe best choice for those looking for security.
    NordVPNsecurity is its middle name.
    TunnelBeardubbed the easiest VPN to use.
    Windscribea VPN which gives you unlimited connections.
    Hotspot Shieldan awesome solution for online browsing.
    KeepSolid VPN Unlimitedthe jack of all trades of VPNs.
    CyberGhostrich clients and ease of reconfiguring.
    ZenMateuser-friendly VPN that caters to the newbies to VPN.
    PureVPNtake advantage of easy to use apps and access to many servers.

    Source: www.itproportal.com, PureVpn

    Making the choice

    Picking a VPN service can be a daunting task as there are now literally hundreds of them to choose from. Landing the right one means striking the right balance between what you are offered, the ease of use, and naturally, the price.

    Some providers offer free you VPN services while some like AVG charges for their VPN service. Paid VPN providers, however, are preferred to the free service providers as they offer robust gateways, proven security, additional free software, and unmatched speed.

    The key is to find the best VPN that meets your immediate needs while matching your budget.

  • Cloud (Storage) Wars!

    Cloud (Storage) Wars!

    The term “storage wars” has taken on a new meaning. It has shifted literally from the ability to keep one’s belongings in physical containers to having one’s data stored and managed in the digital realm.

    A question often asked is whether the (Internet) cloud is infinite. The answer is both a yes and no.

    The top four cloud tech companies are endlessly engaged in a silent market share war. It is a tough choice as they all offer millions of gigabytes in storage. We can only attempt to investigate to what extent is there an abundance of storage when we ‘run out’.


    The “Cloud” as explained in our previous blog, is a series of backed-up servers scattered across the globe.

    Consequently,  in terms of availability of storage, it is just a matter of where (location) a datacenter can be run and at what its maintenance costs are.
    The answer to how infinite is the cloud, therefore, boils down literally to a cost, rather than a capacity issue for cloud-storage providers (CSPs).

    The main CSPs vying for a market share in the paid cloud storage subscriptions are Google, Microsoft (Azure), Amazon, and IBM.

    There are also smaller yet significant players such as Box, Dropbox, Tresorit, and Barracuda.  A quick online search on their websites will reveal what they can offer you.


    Similarly, the pages of any one of the smaller companies will give some comparisons of each cloud storage offer (bundles).


    We will, however, focus on the major ‘players’ and summarize their offerings based on offers for both individuals and small to large enterprises.

    What to look out for
    stacking-up-cloud-vendors-2018-right-scale-2

    Some of the key features to look for when storing data in the cloud include Encryption at rest and in transit, as well as end-to-end encryption; 2-Step Verification, HIPAA Compliance.


    Other factors to consider are the actual server location, ability to sync any folders, and perform selective Synchronization.


    There are also key offerings such as offering the ability to edit files on mobile devices. For businesses, the ability to remotely wipe mobile devices, perform file-versioning, and other useful features for data management.

    As a business, if the above-mentioned features are not in your cloud solution, you better look into switching away.


    While you can technically run your own cloud, it would require a full-on IT team. That or a very good support system to assist in its maintenance and administration.


    It is for this very reason that a SaaS(and Hybrid)-approach to storage is preferred by many medium to large enterprises.

    4 of the most popular CSPs 


    Google

    Weaponry: 

    A standard (personal) GoogleDrive starts from 15 GB in size and comes when you open a Google email account. This is a standard with most Android-powered mobile phones which require a Gmail account to register the phone.

    It is a convenient way to store and access your pics, videos, and files across multiple devices or back them up in case of a hard drive crash.
    If you do not mind the inconvenience of having several logins, you could get away with multiple drives giving you 15 GBs each.


    There is, however, a drawback as there is no such a thing as a free lunch – the level of security and compliance features naturally are little to almost none.  Additional storage can also be purchased with different upgrade plans, which may come with more  add=ons such as extra file encryption.


    When it comes to their business offering, their Team Drive is available with the G-Suite bundle. One can upload 750 GB of data per day and up to a total of 5 TB in size.  Team Drive can contain a maximum of 100,000 files and folders, however, this limit can be increased upon request.


    The basic package including the more advanced security costs $5 per user per month and gives you 30 GB for storage and collaboration.

    A full comparison of available storage plans 

    Tactical strengths:

    The ease of accessing and using the drives via strategic partnerships such as Android provides them with a growing market share.   As it is cloud-based and not linked to physical devices,  you can access your GoogleDrive using a Mac computer as well.


    There are growing talks of incorporating Artificial Intelligence <AI> into the data management systems. They are currently building a full AI Center in Accra, Ghana. This will help bigger companies manage, access, and organize their stored information faster and with more purpose.


    They have recently launched a set of new cloud storage tiers under the branding Google One. This comes with revised pricing and storage options: 15 GB: remains Free; 100 GB costs $1.99/month; 200 GB $2.99/month  and 2 TB $9.99/month.

    Potential weakness/es:

    Google is a latecomer when it comes to offering business solutions and still battles with the stigma of being a free service and thus associated with inferior quality.


    The integration with Office applications is still something they struggle to get right. Not many are fans of  Googlesheets.


    Most non-Microsoft platforms will have this compatibility problem.
    They also run into a few data syncing problems ever so often, especially with the free storage. Google offers full 24/7 customer and technical support with their products. More aggressive advertising and pricing of their business offerings now serves to hopefully alleviate this issue for them.


    How Google bounces back from a hefty  EUR 4,34 billion fine for colluding with Android will determine if they survive the storage war. This especially if they will be now forced to allow other CSPs to offer services on mobile devices.


    Amazon

    Weaponry:

    One of the first cloud solution providers to offer eCommerce and Business-to-Business (B2B) offerings. Amazon and its Amazon Web Services (AWS) have come a long and calculated way from just offering/selling books online.


    They are actually seen as a formal threat and a direct (more superior) competitor to Microsoft’s cloud (equivalent) offering –  which we touch on next.
    Most of this comes from a robust and apparently the world’s largest global cloud infrastructure.


    Based on this, its cloud storage, dubbed Amazon S3, works on a “pay as you use” basis while its free tier starts you off on 5GB of storage. Thereafter you pay in increments based on the storage class you fall under.


    So the first 50 TB will cost  $0.023 per GB per month and then the next 450 TB will cost $0.022 per GB per month and so on.
    This is practical for businesses that do not have a limit to storage space but scale up and down very quickly based on their operations.

    Tactical strengths:

    Amazon’s storage platform gives users and businesses alike the ability to geographically store and move data with the highest levels of encryption. In addition, one can use data analytics on your data without moving the data into a separate analytics system.


    Amazon Athena additionally provides anyone who knows SQL on-demand query access to vast amounts of unstructured data. As with Google, AI incorporation along with Alexa would facilitate this even further.


    Other notable benefits offered include open workflows, Hybrid-cloud storage capability, powerful APIs, and easy and reliable access to many Third-Party vendors & Partners.


    Naturally, you get access to its AWS Marketplaces. It also has a strong compliance adherence including HIPAA/HITECH, EU Data Protection Directive, and FISMA.

    Comparison of the various storage classes available.

    Potential weakness/es:

    Its primary offering of consumer goods and online delivery will make it prone to any bad press received if that arm of operations does not work well.


    Further expansion into areas like streaming TV via Amazon Prime and cashless stores might result in a jack of all trades expert in none phenomenon. They are, nevertheless, handling all well so far.


    Microsoft

    Weaponry:

    The “go-to” tech company for word-processing software as well as operating systems. This software giant like Amazon is branching into many products.


    They now offer games, server hosting software, applications, an online store for all its devices, software, services, and of course, storage.
    Its Azure platform powers certain parts of Nasa and utility giant Schneider Electric to mention a few clients. Its purchase works similarly to Amazon via ‘pay-as-you-use’ terms.


    Storage users need to have a .Net Framework and SQL installed to use the storage. For those looking for quick storing solutions without building heavy infrastructure, they can adopt the cloud completely.


    With the launch of its online services (Microsoft 365), it has had to repackage a portion of its Azure platform to cater to small to mid-sized businesses.


    These include functional/specific bundles such as OneDrive (personal), OneDrive for Business, and Sharepoint (powerful storage and content management tool).


    The online version of the Sharepoint starts at $5.00 per user per month for a rather limited 1 TB per organization. Thereafter, users can purchase more in 1 GB increments of 12 to 16 (US) cents depending on the total (storage space) size ordered.

    Tactical strengths

    Also early adopters of AI (Machine Learning) and recently, the Blockchain (Blockchain Workbench), Microsoft is providing its developers with more and better reasons to use its storage space for practicality.
    Like their online storage offers on Office 365, Azure storage packages are also quite structured and well categorised.


    There are specific functions such as a database server-data management system. Then there is one for application running services, and others to handle rest-based object storage (Blob Storage).
    Lastly, they offer storage to help perform computations and process events (Functions).
    These bundles are all provided free for the first 12 months and then range from $0.002 per GB to about US 0.20c per million executions.


    They have a good Partner system to help distinguish and provide support for the best storage package based on one’s immediate needs.


    To bolster their growing Marketplace, they recently also purchased a business that deals with OpenSource (GitHub).  This enables more freedom for developers to manipulate the software on their platform.

    For a comparison of the storage types via Azure and pricing for each, click here.

    Potential weakness/es:

    People have found its pricing a little to steep on the storage side and so keeping market share will be tough.  Many new smaller CSPs offering cheaper per GB rates.


    They can only counter this by offering more products that require their storage (compatibility-wise).
    Some other cumbersome restrictions like users being only able to upload 20 000 files at once or the actual file-size limit might not bode too well with heavy cloud data users.


    They also don’t have as many APIs as Google or Amazon does, but these are growing by the day.


    IBM

    Weaponry:

    Probably the first of the CSP batch that provided cloud computing. It therefore has had the experience of honing ways of storing and retrieving data for larger businesses. International Business Machines (or IBM) can be considered as the grandfather of data storage.


    As with the other CSPs, there is a free offering called the “Lite plan” consisting of a single IBM Cloud service instance with storage up to 25 GB/month.
    Paid storage is staggered, per consumption and based on complex costing tiers based on location, storage class, and resiliency choice.


    Storage charges start from $0.09 for up to 50 GB down to $0.014 for 500+ TB on what they call the Cross-Region Flex plan.

    For more insight into the complex costing table, visit the IBM storage pricing page here.

    Tactical strengths:

    Their security is their biggest pride and strength and makes them a firm favourite for large companies and potentially governmental institutions.
    The fact that they do not actively advertise as much as Google or Microsoft is telling. They clearly need to provide high secrecy and protection for their existing clients.


    One such feature unique to the way data is stored on their cloud servers is using Information Dispersal Algorithms (IDAs). This helps to separate data in unrecognizable “slices” that are distributed across datacenters.


    So basically the complete copy of the data resides in any single storage node, and only a subset of nodes are available in order to fully retrieve the data on the network. This is similar to how peer-to-peer sharing or data encryption works.


    And speaking of heavy encryption, they have allegedly recently also started on the Blockchain and are experimenting with a particular Cryptocurrency to enable ease of payments. This in the light of IBM with its Watson platform looking to become more of a cloud-based data operating system.

    Potential weakness/es:

    IBM relies too much on its reputation as a forerunner for tech and cloud-based computing. It has earned that title for several decades before the likes of Google and Amazon barged in.


    They might lose out on market share once the newer CSPs start to offer more robust products and compliance services like theirs.


    Their high security and complex system come at a premium so designed for or rather restricted to wealthy companies essentially. The hosting option (main server locations) looks limited and restricted to geographical areas primarily in the US and EU.


    250x250

    Be wary of clandestine terminology such as ‘unlimited archiving/storage’ even with a paid subscription. This usually refers to storing data at rest and not the ability to constantly and unlimitedly sync files.


    Another salient factor to compare would be the number of files that you can upload or sync at the same time.
    This will be relevant for larger companies that need to upload large files and by large, we mean 10 GB files (2 and a half HD DVDs’ worth of content) and upwards.

    Making a choice

    At the end of the day, your decision to take on a faction in the storage war should be based on your priorities. You simply match it to what each of the companies is offering taking your budget into consideration of course.


    You may need to consider running a combination of two or more of them.
    Some larger companies offer storage as a “must-have” with hosted email or something as basic as purchasing a new smartphone.


    You will, however, have to ask yourself a few more pressing questions around functionality, data security, and compliance before taking it up.

    Or you can simply not accept the offer or disable it in cases where it is presented as a freebie!
  • How would you like to be served?

    How would you like to be served?

    The thought of “servers” and “hosting” are rarely things you consider on a daily basis. If you are not an IT or a software architect, then probably not at all.

    For the mentioned professionals, however, these decisions are critical to the operations of a business however large or small.


    There is a fine line between how (and where) your software systems are used. This line has become thinner because of evolving cloud technology and automation.


    Sourcing and deploying the right IT architecture could therefore help your business stay afloat, or sink without.

    Communication is key

    The most effective mode of communication in any business (other than verbally or telephonically) is still electronic mail (E-mail).


    It is effective because it helps you get a time-stamp and a reference point when it comes to the documentation of your conversations. This is important tool when it comes to your legal obligations and commitments.

    Emails are, therefore, something that should not be taken for granted!
    We consequently send, receive emails with attachments through various devices. All this without a second thought as to how this happens.


    After all, this is the job of the IT-guys, right?


    Well quite rightly so. They often clash with their management and board of directors for funds to keep this going without compromising operations. Emails are crucial not only from a daily functional point of view but from security but also the compliance facet.

    Defining servers

    Your company’s IT infrastructure: Emails; File-servers; Databases (CRMs and ERPs) and other communication tools are commonly managed on-site on systems referred to as ‘on-premise’ solutions.


    These are managed by computer-like CPUs that look like the standard boxes that you plug your monitor and keyboards. They, however, have a lot more processing power and storage than your average desktop and are called Servers.


    Your servers naturally must be kept cool because of the heat they generate from being on all the time. As you can imagine, built-in fans are far from being enough to cool them off!


    There an array of server types. Each of them is designed to run the tasks of your mail exchanges, file storage, and the storing/deploying of remote PC operating systems. Others handle your databases and other dedicated functions.


    You would need to have the licensed software to operate each server providing unique services. This makes it quite an expensive outlay if you have all of the abovementioned requirements!


    Servers are not irreplaceable and can overheat, get corrupted, or crash like a hard-drive (or a NAS server system). You, therefore, need to be maintain them at a cost to your business via your IT department.


    Depending on the amount of data and complexity, the maintenance is outsourced to specialized IT companies or software license providers.

    Cloud-computing

    technology-3406895_640

    In the early 2000s, ‘the cloud’ or ‘cloud computing’ became a new concept. It is basically a very large set of high-end servers equipped with software to manage all the tasks mentioned above. It is usually offered as a service under a single (monthly or annual) subscription.


    So basically, you are renting the service of a server as opposed to owning it. Renting, just like with property or cars, relieves the user of all the costs of maintaining the product in question.


    This sort of rental service offered by cloud service providers is now known as Software as a Service (SaaS). This also saves you from purchasing any hardware let alone paying for the extra electricity bill to cool a server room.


    According to Quora.com, the main difference between a cloud and a datacenter is that a cloud is an ‘off-premise’ form of computing that stores data on the Internet.


    A Datacenter, on the other hand, is an on-premise set of hardware that stores data within an organization’s local network.

    As an IT professional, you constantly face the burning question of whether to go for a solution that will relieve you of mundane tasks – like server maintenance. Naturally, you would also want a solution that facilitates the daily administering of user-profiles, data archiving, and backups.  But to what costs then?

    Deciding on which to go for

    There are many pros and cons when it comes to the hosting of your company’s data on a local server as opposed to having it run via the cloud.  There is also a massive array of choices and bundles between the top cloud service providers.


    Cloud service providers have several data centers used as backups. So your email hosting may have several servers in different locations to serve that function.  This curbs the risk of your data getting lost, unavailable, or hacked.

    Naturally, Datacenters are kept highly secure in undisclosed locations globally. Google is known to have one of its datacenters floating on a massive container ship somewhere over the Atlantic ocean.

    Maintenance

    Maintaining a server is expensive as you require massive cooling systems. Some smarter companies like Microsoft, are now taking to the deep oceans for that function.

    When it comes to email hosting or the storage of your files in the cloud only five large multinational corporations’ names come to mind. Microsoft, Oracle, Google, IBM, and Amazon.

    These companies however bear the burden of maintenance, while providing just the service you require on a subscription basis.


    Setting up an on-premise solution, in contrast, can be a tedious exercise and an expensive one. This is more applicable to smaller companies that do not have large IT budgets.

    Licensing your server is no child’s play either!

    Having to decide on costs versus functionality will determine how to license your server. This would be either per-server, per virtual machine needed, or per processor core and then you need CALs). If you don’t believe it, just have a look at this licensing guide!

    An example

    To illustrate the difference, let’s say you have an outlay of a hundred thousand dollars to acquire the software licenses for three years. This compared to a cloud-hosted package that performs the same function over the same timeframe.

    You can then piggy-back off companies like Amazon and Microsoft’s security services, which then costs eight thousand dollars monthly ($96k annually).


    So, within three years of using the cloud, you would have reached the $100K cap that would be spent only for licenses. You would have also saved with an extra $188K in additional services.


    This is a portion of what you would have been spent on maintenance, technical support, security, upgrades, and updates.


    These figures are rudimentary, but the long-term savings are noticeable as cloud service providers tend to provide value-add solutions when pricing their bundles.


    Microsoft recently launched its Microsoft 365 package which includes an upgrade to the latest operating system (Windows 10 Professional or Enterprise). This is something you would have had to source and pay for separately.

    Stress relievers

    Software deployment and the administration of user accounts is cloud-based. This means you can do this conveniently and remotely from your PC, laptop, tablet, or even your smartphone!


    This means as an IT professional, you will now have more time to oversee more important issues like data security and overall IT policies. Better yet, you would have the time to investigate ways to automate and improve your systems.


    This is possible without the inconvenience of running from PC-to-PC to install operating systems, Office software, or manage mailboxes.


    Remote desktop services of an on-premise server were a step in this direction – but are a pain to set up. So, you can view the cloud as an evolution of remote-desktop services.

    Infrastructural setbacks

    120x600

    The only (and potential) hindrance to using cloud services naturally would be the availability of good and cheap broadband (Internet connectivity).


    Without both, the justification for running your business fully on the cloud would not stick. Some businesses, especially in developing countries, go endure desperates attempts to adopt the cloud.

    They use what is known as hybrid-systems: a combination of cloud and on-premise solutions.


    If you operate in a country without forward-thinking government officials that facilitate broadband availability, you will suffer the most.


    Like an old, car, outdated hardware and software can lead to costly services (out-of-date and warranty solutions). This leads to you having heftier maintenance fees and support costs by third-party IT professionals.


    The old rhetoric of ‘not trusting the cloud’ is now one of the past. Cloud services often outperform on-premise solutions when it comes to high-end security software and data protection. This is because of the obvious economies of scale involved in setting up expensive security software.


    The level of security has to be the digital equivalent of Fort Knox. This especially if you are dealing with sensitive data such as financial, legal services, healthcare, and educational institutions.


    Your company would need a system that will keep all such data secure and data compliant.


    Data is now treated as a commodity. There is now a subsequent need to trade and value it. We now have Blockchain-based solutions like IOTA to facilitate your payments. This while keeping data encrypted, decentralized, and safe.

    In the advent of the new GDPR laws, some companies will still opt to keep and maintain their servers internally.  By doing this, however, you might lack the transparency and tools needed to show your consumers how you handle their sensitve data.

  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over billions of dollars.

    No free service can generate that amount of money out of goodwill and thin air. So much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.


    There really is no such thing as a free lunch. If you believe that all these online social platforms would keep it that way, then you are as naive as they are hoping you to be.


    Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally.


    And the simple fact of the matter is that in order for them to pay all their staff of programmers, developers, executives, lawyers, and other stakeholders. They need to be paid!

    What your data means

    Facebook, Google, Twitter, Snapchat, and any social media platform that has over 100 million users sit on a goldmine for advertisers.

    The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter.

    The commodity is simply you, the user. So, your preferences, habits, and views along with their personal data are analyzed via machine-learning systems to study behaviours and habits.


    The data, in turn, is used for constant revenue maximization. In some extreme cases, it is used for political, psychological, and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes. Opting out of marketing would give you true ‘free use’ of the service. But no profiteering company offers you that privilege today. The best you can get is a month’s free trial.”

    Your likes, spending habits, music preferences, political views, location and working habits enables marketers to present their goods and services.


    They can position their offerings (sometimes subliminally) into spaces where you are likely to indulge in them.


    Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Social network sites worldwide as of January 2018, ranked by the number of active users (in millions).
    Most famous social network sites worldwide

    Source: © Statista 2018

    How the mining works

    text-mining-icon-2793702_640


    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service. The terms get longer by the day (small print) that we don’t bother to read them.
    Microsoft envisioned this a decade ago and changed the way its operating systems work (with its Windows 8 series).

    Its operating systems are now more of a social, interactive, and information gathering system. Allegedly designed to “help you” organize things better.
    This is fostered by a voice-activated app called Cortana – all under one Microsoft account.


    Amazon has its own ways of data mining via your shopping habits and Alexa – is its own voice-activated search and information-providing device.
    Google (owned by Alphabet company) has the biggest stranglehold of the lot. They must, therefore, be the most cautious when it comes to data privacy and security.


    This applies especially with its partnership with Android, which makes it a requirement for you to use for all their devices to link all your data.


    These include phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies, etc) orders via the Google (Play)Store, and social media (Google+).


    You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.


    You are now having to give up your personal details to unknown affiliated marketers and partners of tech giants. They get first dibs on this data – and paying good money for it.

    Read more about Affiliate Marketing here

    Required by regulation

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers. Such things could be countered with a clause.
    They may have strategically stuck one in while you were busy posting selfies and liking random videos of cats.


    The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purposes. This can be facilitated by the use of artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    250x250

    It is possible for you to have full data privacy and absolute freedom from advertising on social platforms. This, however, comes at a ‘cost’.

    This was reiterated recently by the COO of Facebook who admittedly confirmed that ‘opting out’ would mean you will have to pay to use Facebook in the future.
    They had just not put this in place but will now forcibly have to make it a clearly visible option.

    The fact of the matter is we are in an era of Big Data, the Internet of Things (IoT), and AI. All of these require your data to ‘operate’.

    Data mining is here to stay

    Though many were reluctant at first, pretty much every company now has a Facebook, Twitter, or Instagram page. It serves as a platform to showcase and communicate with thier clients via the newly termed phrase ‘social engagement’.

    This has turned out to become a strong branding and marketing tool for them.


    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn, and so on.


    There is, in fact, nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser: Not many of us actively use ad-blockers: but your browsing data is being scanned and processed by external third-parties companies.


    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it! Along with some good plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.
    It will be interesting to see the outcome and verdict of the probe into the Facebook case.

    Rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers. Especially ones that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in the verification of marketers, data storage and data security laws (such as the new GDPR law) were long overdue. Facebook will now be the scapegoat to enforce data security laws on social media.
  • Data (Gold) Mining

    Data (Gold) Mining

    Let’s face it, if you really were going to quit Facebook, you would have a few years ago. Fact is, you should have asked the serious questions when the ‘free’ social media platform started turning over millions and even billions of dollars in revenue. No free service can generate that amount money out of goodwill and thin air – so much that they could list on the stock exchange. So, we are not quite sure why everyone is acting amazed or why the knee-jerk #DeleteFacebook campaign is only now coming to light.

    There really is no such thing as a free lunch and if you believe that all these online social platforms – who may have started off with sole intentions to provide a free service, would keep it that way, then you are as naive as they are hoping you to be. Think about it, the companies behind the platforms, actively recruit in pretty much tens and hundreds of cities globally. And the simple fact of the matter is that in order for them to pay all their (global) staff of programmers, developers, executives, lawyers and other stakeholders – they need revenue.

    Facebook, Google, Twitter, Snapchat and pretty much any social media platform that has over 100 million users, therefore, sit on a goldmine for advertisers. The commodity, however, is not just what their users wish to own in the short term, or their purchasing power directly for that matter. The commodity is simply you, the user. So, your preferences, habits and views along with their personal data are analysed via machine-learning systems to study behaviours and habits for constant revenue maximization or in some extreme cases: political, psychological and social manipulation!

    “Your ‘payment’ on a social media platform is your consent to have your information used for marketing purposes – opting out of marketing would give you true free use of the service. But no profiteering company offers that privilege today – the best you can get is a month’s free trial.”

    Knowing your likes, spending habits, music preferences, political views, personal information including location and working habits is enough for any company or institution to cater their goods and services and position them (sometimes subliminally) into spaces where you are likely to indulge in them. Social media platforms, in this case, become the marketplace for them to ‘mine’ data to use.

    Most famous social network sites worldwide as of January 2018, ranked by number of active users (in millions).

    Most famous social network sites worldwide

    Source: © Statista 2018

    text-mining-icon-2793702_640

    Data mining is not a new idea and completely legal if presented transparently in the terms and conditions of any service – which are getting longer by the day (and smaller in print) that we don’t bother to read them. In fact, Microsoft envisioned this a decade ago and changed the way its operating systems work (beginning with its Windows 8 series), to more of a social, interactive and information gathering system – designed to “help you” organize things better. This is fostered by a voice-activated app called Cortana – all under one Microsoft account.

    Amazon has its own ways of data mining via your shopping habits and Alexa – is own voice-activated search and information-providing device. Google (owned by a group called the Alphabet company) has the biggest stranglehold of the lot and must, therefore, be the most cautious when it comes to data privacy and security.

    This applies especially with its partnership with Android, which makes it a requirement to use for all their devices (phones and tablets) to link up all your data including phone contacts, emails via Gmail, pictures via GoogleDrive, apps (music, movies and games) orders via the Google (Play)Store and social media via Google+. You can even have your search fields stored and synced onto your devices – from your laptop to phone and tablet via Google.

    You are now having to (almost mandatorily) give up your telephone number, location, and other preferences indirectly to unknown affiliated marketers and partners of the tech giants who are getting first dibs on this data – and paying good money for it.

    The main violation by Facebook, therefore, might not even be non-consensus selling of data to marketers, because such things could be countered with a clause they may have strategically stuck in while you were busy posting selfies and liking random videos of cats making funny faces. The real issue is the potential use of the data for political or advanced manipulation of data for fraudulent purpose with the use of sophisticated and artificial intelligence to influence you without your knowledge.

    Read more about the uses of Artificial Intelligence here

    N26_banner-300x250-EN

    Full data privacy, though not conceivable, and absolute freedom from advertising on social platforms is possible – but at a cost. This was reiterated recently by the COO of Facebook who admittedly confirmed that opting out of the terms to have your data sold or used would lead to you having to pay to use Facebook in future. They had just not put this in place but will now forcibly have to make it a clearly visible option.

    250x250The fact of the matter is we are in an era of Big Data, Internet of Things (IoT) and AI – all which require data to analyze. These platforms are thus here to stay and still serve their specific functions well. More importantly, they’re also the livelihood for many small-to-medium-sized businesses. Though many were reluctant at first, pretty much every company now has a Facebook, Twitter or Instagram page to showcase and communicate with their clients via the newly termed phrase ‘social engagement’ – a strong branding and marketing tool.

    And if you think you are out of it by leaving one platform, just remember this: Facebook owns WhatsApp & Instagram; Google owns YouTube; Microsoft owns LinkedIn and so on – there is nowhere to hide if complete online privacy is important to you. And let’s not forget your web-browser – not many people actively use ad-blockers unaware that even their browsing data is being scanned and processed always by external third-parties companies.

    If you aren’t using a Virtual Private Network (VPN), you should seriously consider it along with some good (some free) plug-ins to help secure your online browsing from all types of behind the scenes snooping and ransomware.

    It will be interesting to see the outcome and verdict of the probe into the Facebook case and rest assured, many other heavily used platforms will be deleting and removing ties with data mining marketers that have had a similar agenda to what Cambridge Analytica was accused of conducting.

    A change in verification of marketers, data storage, management and data security laws (such as the new GDPR law targeting businesses coming in May 2018 to the EU region) were long overdue, and Facebook will now be the scapegoat to enforce data security laws on social media.

  • Life hacks using tech

    Life hacks using tech

    We often do things out of routine without considering if there is an easier way to achieve the same result quicker and even more effectively. In a larger company or organization, this is the job of the business analyst.

    What if we applied this to other daily activities and tasks that shape the way we live?

    This would give us more time to partake in the things we love.
    It’s hard enough for most working-class adults to spend most of their days in the week behind a PC. This is usually followed by hours behind the wheel in traffic or commuting via public transportation.
    This makes the task of going shopping or even attending a doctor’s check-up after an 8-hour work stint more of a burden or chore. Worse over if you must queue further to get the service.


    This very example came to mind when a relative complained about having to go from one doctor to another. When referred to a specialist they had to then book another appointment by calling that specialist’s practice.


    Now granted, this is basically a ´first world problem’. Because having a specialist attend to a back problem after your doctor recommends it during an initial check-up is a luxury. One that third world citizens could only dream of having in the first place!

    Problem-solving scenario

    So, in the case of the referral to a specialist, a simple unified medical system can resolve this. A CRM database linking all the medical practitioners including their schedules can save you the time taken to arrange the new appointment.
    This system would also have a secure high-tech scanning and attachment add-on so that X-rays, scans, diagnoses and the attending doctor’s notes can be attached. All for the attention of the specialist.
    The times for the new appointment can be chosen quickly while the patient is at the doctor’s practice.  When convenient, you could then go to the specialist directly.

    The concept explained

    This is one very basic and rudimentary example of how an automated, centralized software solution can help schedule appointments.
    To achieve maximum optimization the system would clearly require several tests before implementation.

    Too often systems analysts and developers do not consider the end users. The user experience (UX) is the most crucial aspect of software development and should be the first step in building an automated system or it will never achieve its purpose.

    It doesn’t have to be used as a national health solution. This is because centrally planned systems, as mentioned in a previous blog, can lead to inefficiencies.
    It would need to be localized in order to make the system easier to maintain and be updated with contact details.  This especially when information can change on a weekly or monthly basis.


    Naturally, and for decades, health insurance companies have utilized card systems to document patient visits to practitioners. This also helps you and practice to easily claim back medical costs.


    But this only serves a singular function and is laborious to run. What is being proposed in this blog post is something to resolve this in a more secure and decentralized manner.

    Application and security

    Cloud security has become a huge requirement and will be a necessity for all businesses and services in the very near future. Europe, for instance, is implementing compliance laws for storage of data under its new GDPR regulation.


    Countries like Sweden also have similar compliance laws to handle financial (with a lot of banking going mobile) and medical data stored in the cloud.


    So, security would become less of a concern for businesses when it comes to data storage and automated CRM systems in the future.

    Shopping and housing convenience

    smart-home-3096219_640

    The burden of shopping can also be alleviated with initiatives such as cashless processes. We first saw this introduced in Asia (China) and now adopted in the West through Amazon’s new cashless´ and cashier-less grocery stores.


    While shoplifters might not see the innovation in this ‘new method’ of shopping; it saves you time spent queueing to pay and will invariably help resolve the scourge of shoplifting.


    It will, however, require more reliance on technology for surveillance, to monitor and track the scanning of the goods and keep a database of records on a server.


    This helps you with the inventory management and other back-office processes and is managed by an automated ERP solution (and not a person).
    We are still waiting for massive roll-outs of the so-called smart houses equipped with smart chips that help regulate temperature, turn off energy-consuming devices when not in use.


    Some are even equipped with fridges that remind you when food is expiring or simply needs to be replaced.


    Designing such systems would naturally require careful observation into the various steps needed to reach the desired result. Details in every step from how you go from point A (selecting a product); to point Z.


    Point Z being you walking out of the shop with a fully paid item. All without using cash or the need for a cashier.

    Tweaking the solution

    The system analyst’s job would be to engage or even simulate the processes using different test subjects and not just the best practice.
    There is the possibility that you might forget to pay for the milk after checking out of a security area. That could result in an embarrassing scenario for all.


    These are just two examples of countless scenarios that can help us benefit from the use of automation and AI.
    There are many other subtle examples such as in the motor industry. This includes the use of computers to diagnose a ‘sick car’.


    There can be a solution for every bottlenecking problem. Addressing this is now has become a new field of study. Computerization and the use of robotics to handle manual labour and repetitive blue-collar jobs will be new highly lucrative career paths.

    Many new start-ups already exist purely to develop system automation.

    Welcome to the future!

     

  • Peer-to-peer service

    Peer-to-peer service

    History has taught us that a fully centrally controlled government system fails completely – well, in the long run.

    The idea of a communistic system has its merits and could still work in some sectors of our economies. It, however, omits the very thing that was provided to us as human beings – choice.


    Knowledge is empowering – but the power to do the things you would like to do effortlessly without fear of error.


    This shared knowledge emanates from scientific, biological, or financially proven theories and tests.


    They can help you make the right investments. Such as saving money on the best deals, obtaining rights to social benefits, travel to great destinations. Or simply just helping other people achieve their personal and spiritual goals.

    Monopolistic behaviour

    Those that cling onto knowledge though, serve their interests alone and should not be revered but rather shunned for power-hogging.


    Sadly, some governments monopolize access to information, basic services, resources, and even education to create an artificial demand for ´their services’.


    This forms the basis of a centrally controlled or outright communistic state.
    In business, this is a common practice of a monopoly to control the price of their good or service as they are the only ones providing it.


    The quality of that good or service, however, can and will be determined by them and them alone!


    Can you imagine then, based on the previous sentence, a situation that only governments have this power to dictate a basic service such as healthcare or education for you?


    Scary thought and if you look at most developing countries, the evidence of this is overwhelmingly sad.


    But we are not here to talk about the governments as there would be several cases to point out and this is not a political platform.
    Case in point, the concept of a centrally controlled system nevertheless is less efficient and prone to failure to disseminate the very items it sets out to provide.


    Deploying software by a global firm like IBM, via a centrally stored-located server would be absurd because the infrastructure of the recipient regions or end-users might not be well equipped to handle it.
    So one begs to question, why would you do it for social services for instance?

    Decentralized systems

    Decentralizing a system can improve efficiency because it gives options to get the best quality possible. It also removes power from one or a few providers and shares it equally amongst other stakeholders.


    This way all will stand to mutually benefit from a working system indirectly rather than just the state collecting monetary compensation or tax and deciding what to do with it alone.

    Centralized systems can learn from the blockchain to efficiently provide services.

    eMule


    Let’s take the now “illegal” peer-to-peer file-sharing and downloading software such as eDonkey/eMule (developed by Microsoft).
    Or take BitTorrent for example
    you could with them, build together any file by downloading “bits” of the file by many connected servers or PCs  (peers).


    This system leads to faster downloads and allows one to source from the best quality of the available digital bits to get the data to form the e-book, music track, or movie that you were after.


    Leaving your download running would enable others to get the files you have already amassed (you reciprocally upload the files). The cycle continues until everyone acquires the same great quality file from the best ‘seeds’.


    Downloading from a sole server for the same product, on the contrary, could crash the server.


    Let’s not forget the delays due to operational differences in time-zones, or complete failure to download if the file source is corrupted or the file quality is bad.

    Application of decentralized systems

    Naturally, the entertainment industry put a stop to this because it meant that people could attain their copyrighted material.

    Many fines and warnings were dished out to individuals as well as companies hosting the sharing servers.


    You can, however, still access them via carefully planned entry gateways to hide your IP address using VPNs. Those of you who are IT experts can use (old-school) backend protocols like FTP.

    BitTorrent -> Bitcoin…Torrent -> Tor ..anyone seeing a pattern here?

    There is now even a new digital currency designed to help artists curb piracy and reward the artists for their work.
    Such protective software is already in the pipeline thanks to blockchain technology.


    Decentralizing services such as money transfers in the advent of Cryptomania removes power from regulated financial institutions. They tend to charge high fees for sometimes slow and error-prone services because they can.

    Conclusion

    So, swiftness and security are a prime reason for the adoption the Blockchain technology. Everything else such as the price of digital alternative coins or ‘altcoins’ boils down to basic supply and demand for it.

    Governments and other institutional service providers can take a leaf out of the blockchain technology tree and its true intention.

    The aim is to decentralize the provision of a service to give everyone access to it. This will reduce associated costs of using it and improve efficiency!
Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.