Tag: Infomation Technology

  • Technology contained

    Technology contained

    Over the past decade container technology has become a popular method for packaging applications in an effective way. Some developers believe is better than that offered by virtual machines and other technologies.

    Container technology has been embraced by the big cloud computing providers including Microsoft Azure, Amazon Web Services, and Google’s Cloud platform.


    Examples of the actual container software include the Apache Mesos, Docker, rkt (pronounced rocket), and Kubernetes.

    But what is container technology?

    Logically, it gets its name from shipping. Shipping containers standardize how goods are moved around. Goods get placed in steel shipping containers which can be picked up by cranes and fit into ships. They tend to have standard sizes.

    By standardizing the process and keeping the items together, your container can be moved as a unit and it costs less to do it this way.


    In computer terms, container technology is referred to as just a container: a method to package your applications so they can be run, with their dependencies, isolated from other processes.

    Container technology decreases the potential for problems when developers move programs from server to server before the program is in a state where it is saleable.

    When you use container technology to create an application, you can code everything using just one operating system and database. This makes the application quite easy to replicate as resources including memory and the central processing unit (CPU) are shared. This also makes your technology great for scaling and for working within the cloud.

    Out with the old…

    If you don’t use container technology, you can have a situation where a program runs well on one machine but has problems on your server. This common problem occurs when you move a program from a data server to a cloud server.

    Many issues can happen because of variations in machine environments. These include differences between your operating system, secure sockets layer libraries, storage, and network topology.

    So, computer container technology picks up all of your software and related parts which include dependencies, being libraries, binaries, and configuration files. They all get migrated as a unit, avoiding the differences between machines including operating system differences. This will also include underlying hardware that leads to incompatibilities and crashes.

    web scanner

    And, importantly, containers also facilitate the deployment of your software to your server. Advocates of using container technology say it is a much better tech to use than that which preceded it – virtual machines.

    In this case, one physical server would be used for multiple applications through visualization technology. Each virtual machine contains the entire operating system, as well as the application to run.

    The physical server then runs several virtual machines, each with its own operating system, with a single hypervisor emulation layer on top. By running several operating systems simultaneously, you incur a lot of overheads on your server as resources get used.

    …and in with the new

    Container technology allows your server to run a single operating system because each container can share that system.

    The parts of your operating system that are shared are read-only to not interfere with the other containers. Therefore, compared with virtual machines, containers require fewer resources of the server, and are much more efficient.

    You can pack many more containers onto a single server. Each virtual machine may require you to have gigabytes of storage. But each container running a similar program may only need megabytes.

    How do the containers operate?

    Containers are set up in an architecture known as a container cluster. Then, in a container cluster, there is a single cluster master, with the other related containers set as nodes, that are your multiple worker machines. The cluster master schedules the workloads for your nodes, and also to manage their lifecycle, and their upgrades.

    Containers allow programs to be broken down into smaller pieces, which are known as microservices.

    A major advantage of having a program as component microservices is that different teams can work on each of the containers separately as long as the interactions between the different containers are maintained. This facilitates faster software development.

    Containers are also flexible and can be orchestrated. Since the operating system would be already running your server, a container can be started and stopped in just a few seconds.

    Some containers within architecture can be turned on during peak demand, and turned down when not needed.
    The software can control this type of orchestration, and distribute the tasks among the container cluster.

    The way forward with the tech

    But is container technology overrated? Some people are concerned about the security around it.

    Because multiple containers share the same operating system, there are growing concerns that container technology is less secure than virtual machines. If there is a security flaw in your host kernel it will affect your multiple containers.

    Other software is being used to have more secure container technology. The use of isolated containers is, therefore, being constantly improved.

  • Already GDPR-ed Out?

    Already GDPR-ed Out?

    Well, it didn’t take long. Less than a full week in fact, for the first GDPR-related court cases to surface against social tech giants Facebook and Google.

    It was as if lawyers were just waiting to pounce on them for their apparent failure to protect our rights as online users. This pertains specifically to issues relating to data privacy and the sharing of private details mainly with third-party marketers.


    How Facebook stores and shares your data has been clarified by several intense inquiries in the US and recently in Europe. This is where the law is set to benefit users of the social media platform in that geospatial area of the world.


    The said lawsuit, however, focuses on the opt-out clause that forces you to make a choice to comply or leave. The claimant is a privacy campaigner. He has made the Billion-Euro complaint on behalf of several users; seemingly a challenge to Facebook.


    Additionally, he has launched a separate suit against Google, accusing them of “pressurizing” users into accepting their data collection policies.
    This ‘comply and accept or get thrown out’ clause could leave you without your routine dose of social media consumption. Such a clause is thus deemed unfair.


    It could cost Facebook a lot if they get their way based on the terms stipulated in the new law. The social media giant could be fined up to a few billion or a sizeable fraction of their earnings in punitive damages.

    The aim of the new law

    The passing of the new regulation on May 25th, 2018, better known as the General Data Protection Regulation {GDPR} has been a long time coming.


    Despite the warnings of the “kick-in” of the regulation, many are unprepared for it. Some of the reactions to the law include confusion, anxiety by both large and small firms alike, and plain comical hysteria!


    Non-compliance now carries heavy fines and penalties, up to 20 million euros for anyone operating within the EU borders.

    So, what then, is the big fuss about GDPR?


    Well, it boils down to a right that has since the launch of the Internet to the mainstream, been waivered and overlooked. Gaining CONSENT to use your data for anything other than the reason you went public on the Internet is very crucial.


    This has become a contentious issue as many companies have over the years, unscrupulously benefited from data acquired (mined) – without your consent. Facebook only brought this into the spotlight recently.

    You can read more about data mining here

    Ad: Web, Network & App Scanner

    Who needs compliance?

    If you hold a folder, database of clients whether online or on your internal server, you would have to comply with the rules which stipulate full disclosure. This includes who you share your details with, and how the information is tracked, shared, and kept secure.


    Furthermore, research in March this year showed that only 39% of the Fortune 500 companies in the UK and 47% had GDPR compliance taskforces.


    Another UK firm commissioned study found that our buying behaviours are heavily influenced by we perceive our data is being handled by companies.

    The consent given to use your basic information cannot be taken for granted – even in the medical environment.

    German doctors’ practices, in the wake of GDPR, are manually making you sign consent forms. Doctors are now required to fully disclose who they share your contact information with.

    How to be compliant

    There are simple ways you can stay GDPR compliant. One method is to adopt an attitude of embracing it rather than just complying with it. You can be transparent with your customers by doing the following:

    Add a cookie bar to your website. You can also add a clause/paragraph to that effect (website disclaimer) in your ‘About Us’ section.


    Similarly, you must state clearly on any opt-in forms. Newsletters and any forms where their data is collected, used, and passed onto other third-parties must be announced. State clearly who they are and which data they have access to.


    You then need to give your customer the option to select what they want to share. Even if such data may not be necessary for them to receive services from you.


    Constantly review your relationships with third-party affiliates and partners to ensure that they are also complying with the law.
    They could be jeopardizing your data compliance efforts – as Cambridge Analytica did with Facebook.

    The last and most challenging step requires the action of what is promised above. This means an upgrade of your internal software to include security/encryption.

    GDPR compliant software

    You can obtain full compliance by using a GDPR-compliant package like Office 365 Enterprise E3. This package has email software specially designed for those of you dealing with sensitive client’s data that need to be kept for long periods.  Litigation hold, heavy archiving features; as well as basic email encryption are all included.


    You can add supplementary encryption software such as Azure Information Protection as an extra layer of security. This helps you to safeguard emails and stored data from being lost, compromised, or accidentally shared.


    All said and done it is likely that if you are a bigger firm, you would either need to create the position of a data security officer internally. If your lawyers are not up to date with digital laws, however, you can simply outsource the service.

    This should help make you become fully compliant thereby having to avoid issues with the data compliance authority altogether.
  • Rise of the machines

    Rise of the machines

    As a young man born in and living in Pretoria South Africa, multi-billionaire Elon Musk – better known for pioneering the Tesla battery-operated motor concept – was shunned by the Industrial Development Corporation several times.

    His innovative ideas were denied financial backing so he moved to the USA for better support. The rest as we all know is history.


    The futuristic thinker, however, took a rather skeptical and worrisome handbrake-turn when it came to the topic of artificial intelligence (AI) and its benefits to society.


    When a man like that with so much insight into technology warns of its potentially harming effects, it warrants notice. Musk warned that its use could foster ‘the coming of third world war’. We have to for such reasons,  delve a little deeper into the topic.


    We have rapidly progressed from longer periods of stone, iron, industrial, to that of space, technological/information ages. The world is now apparently fused between the latter three.


    Despite skipping a few ‘crucial’ stages, we have now surged into the age of digital automation. This is while sadly still dealing with the ravages of poverty, disease, and irreversible damage to our environment.

    Automation & AI usage

    Automation is helping business through software like ERPs that take over traditional back-office finance and operations.


    In the IT industry, the Internet of things (IoT), cloud services, and general Software as a Service (SaaS) have simplified things for IT managers. You can now just monitor and attend to more pertinent issues and tasks (hopefully not just stream movies and play games on duty).


    While seated comfortably, you will be able to now perform tasks such as deploying new software, installing/removing updates on multiple machines/devices simultaneously. All with a push of a few buttons.

    Trading bots

    In the high-risk investment scene, automation has given traders more room for better research and analysis Thus relieving you from the known stresses and mundane tasks associated with trading.


    For many trading houses and brokers, AI has even completely taken over the mundane task of making and executing trades.

    iqoption
    Advert


    If you haven’t already, read this great book entitled: The Fear Index (thriller by Robert Harris). Though fiction, it illustrates the use of a machine learning tool using algorithms to help a hedge fund company generate billions for its investors.


    The use of AI is not without fault. It can also lead to costly system-generated errors like the trading error a few years at Goldman Sachs cost the firm $100 million and other cases.

    Other use cases

    It can still, on a ‘micro’ level, help free human capital (individuals) from PC-related issues. So things like having stress, headaches, backaches, and lack of time spent with family and friends can be a thing of the past.


    In the industrial and manufacturing sectors, the advent of AI creates even more of a fear and a concern. The number (staffing) of redundancies, may increase when it is introduced.


    This would require careful planning to ensure the blue-collars that are ‘replaced’, are compensated. More so, they would need to be incorporated into different areas of businesses.

    Limits of robotics

    Obviously, not every task need to be automated or performed by robots. We (as humans) are still required to check-up, inspect, and perform quality checks for instance.
    We can, as a result, deal with inter-personal jobs that require more empathy like in customer and social service.


    Human resources or getting into corporate social responsibility (CSI) projects that reach out to communities.

    Embracing it

    More importantly, policies by governments will need to focus ever so more on job-creation. Governments must now adopt innovative means of creating jobs or foster and supporting entrepreneurship. Projects like those of Mr. Tesla/Mr. PayPal/Mr. SpaceX has created thousands of new jobs.


    As for the use of AI in weaponry and military defense systems, the less said the better. When it comes to privacy and security concerns we can only hope that rogue politicians don’t get unregulated access to such technology. In such a case we would only be able to protest and hope not to feature in a real-life James Cameron sequel to Judgment Day.

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.