Mind Map – Blockchain, MicroServices, Smart Contracts, AI

BlockChainMicroServicesAI

https://coggle.it/diagram/W0Dr06fTAos9bKGD/t/microservices/2fc6b33ad0a70c61184d025cbe5afb7d4deb3317427957569b3d2f07401bda1c

 

Advertisements

Mind Map – Machine Learning – TensorFlow.js

I’m messing around with this at the moment: TensorFlow.js

A JavaScript library for training and deploying Machine Learning models in the browser and on Node.js

TensorFlow.js is an open source WebGL-accelerated JavaScript library for machine intelligence. It brings highly performant machine learning building blocks to your fingertips, allowing you to train neural networks in a browser or run pre-trained models in inference mode.

I am working through proof of concepts for practical use cases of this technology.

Read this: https://js.tensorflow.org/

Check out the Mind Map that I created. It maps out the connectivity of TensorFlow.js leveraging GPU with technologies that leverage CPU.

Tensorflow_-_Machine_Learning_Google_OpenSource_2015

https://coggle.it/diagram/Wy1x9BN_zyeG2eSx/t/tensorflow-machine-learning-google-opensource2015/b86de82be088a6b276a1717e5c9d5e185e6bf30dfb5b49907559ec6b8fb3ba3f

The Blockchain

Blockchain has made it to the mainstream. It’s at the forefront of everyday discussion, and at the grassroots level, cryptokids are furiously creating tech ripples to impact technology and transform society.

There is quite a bit of hype around Blockchain and its potential to innovate, disrupt and transform traditional industries and business models, however the waters are murky. The struggle to innovate while navigating the uncertainty of Blockchain and how the technology fits, pivots and transforms an organization is not an easy task. The pressure to innovate and increase profitability, build an engaging and engaged workforce and to create a hospitable customer experience is at an all time high and is top of mind for thought leaders.

Regardless of the technology, philosophy or process, it’s imperative for organizations to empower their thought leaders to be persistent and pragmatic when setting direction with emphasis on their current and future needs.

Easy to say, hard to do.

It is more important than ever for thought leaders to structure a cohesive strategic plan of action delivering strategy through a clearly articulated tactical approach. How do organizations assess and decide on Blockchain, Machine Learning, AI, a new business philosophy for them to adopt? Question Quality. Ask better questions to get better answers.

Idea incubation requires thought leaders and organizations to employ a creative mindset. Perform iterative, frequent, intense and time sensitive creative deep thinking, honest discussion and embracing perspectives to generate valuable use cases.
Start with the following as guiding principles.

  1. Do what makes sense for you and your organization. You’ll be tempted follow the crowd. Be wary as this may take you over the cliff. What works for one may not work for another.
  2. Think Micro not Macro.
    1. Micro Services
    2. Micro Targets
  3. Think Golden Mean when formulating your questions. The “AND” not the “OR.
    1. How can I do X while also doing Y. In order to achieve this, practice your cerebral flexibility.

Understand what Blockchain provides us – 3TDACMS

  • Transparency
  • Trust
  • Traceability
  • Decentralized
  • ** Autonomous – When coupled with Smart Contracts
  • ** Contracts – When coupled with Smart Contracts
  • ** Micro Services – Blockchain doesn’t necessarily dictate this philosophy.

Take the Blockchain fit assessment.

  1. Is there a need to remove intermediaries?
  2. Are you working with digital assets?
  3. Can a permanent record be created for your digital asset(s)?
    1. The answer must be yes. There must be a single source of trust.
  4. Is a permanent record desirable?
    1. If no then Decentralized Ledger Technology (DLT) is not a viable option.
  5. Are large amounts of non-transactional data required to be stored?
    1. For DLT, large amounts of non-transactional data must not be stored.
  6. Does the solution require trust of a 3rd party?
    1. If yes then DLT is not a viable option.
  7. Does the solution need to manage a contractual relationship or value exchange?
    1. If yes then DLT fits the solution.

Apply the above data points creatively through various lenses. Transformative, Value Exchange (A pivot from the traditional transactional business interaction), Content Behavior (Flexible content to enrich human experience) to create ripples for your organization and society.

In future posts, I plan to write about the Foundation, Framework, Adoption Principle. This is my take on how organizations can further assess technology in order to determine tech to business fit and investment strategy.

CloudSec2018 – Toronto

I attended the fantastic CloudSec2018 event in Toronto today held at the St.James Cathedral Center.

The focus of the event centered around the following:

  • Machine learning and AI in cybersecurity – implementations or strategies incorporated in cybersecurity solutions or technologies

  • IoT/IIoT research – research on smart cities, vulnerabilities in infrastructure, and ICS/SCADA threats

  • Blockchains, cryptocurrencies, cryptominers – how these three are related, and how they impact cybersecurity

  • Vertical-specific threats – Threats or vulnerabilities that concern the healthcare and banking industries

  • Fake news and cyberpropaganda – the fake news underground economy, and how cyberpropaganda is beyond fake news and can impact organizations

All in all an interesting day with superb speakers and panelist hosted by Trend Micro. Name dropping:

  • Jim Love – CIO @ ITWC
  • Doug Cahill – Senior Analyst ESG
  • Mark Nunnikhoven – VEEP Cloud Research, Trend Micro
  • Gladstone Grant – Director Solution Sales, Microsoft
  • Adam Osherhold, Cloud Specialist SE, VMware
  • Matt Hoerig, President, Cloud Security Panel
  • James Peek – Security Expert and Consultant, Sourced Group
  • Brett Gillett, Founder, Curious Orbit Cloud Consulting Enterprise Intelligence
  • Dawood Khan, Co-founder, Capital Blockchain
  • A slew of others were on the docket as well

Word cloud for the day:

  • Innovation moves at the speed of security
  • Attack vectors
  • Hybrid Cloud – Burst into the cloud during peak periods.
  • Shared responsibility model
  • Division of labour to secure stack
  • Customer is responsible for Workload, data security, identity access management.
  • Traps – Desire‎ to run all through regular controls
  • Notion that cloud security is immutable.
  • Cloud is cutover as opposed to patch production.
  • Virtual patching to monitor for exploits. Looking for behaviour that has potential for an exploit
  • DevOps traps – Security checks need to happen. Continuous integration with security can be done better.
  • Run time controls in Production.
  • Static vs Dynamic Analysis – static to review code for vulnerabilities.
  • DevSecOps- umbrella term for security integration into modern deployment in an autonomous fashion.
  • Use the correct security ‎structure at every stage.
  • Trust but Verify
  • Micro segmentation to minimize blast radius if compromised.
  • Shared Responsibility Panel
    • Divide general resp‎ into areas of the cloud
    • Sequence of events to go from enterprise deployment to cloud. Milestones to get there.
    • Understand cloud readiness posture/state is for your solution.
    • Metered usage model – cloud.
    • How does the contract look. Flexibility is required.
    • Look at security, audits, control sets, SLA.
    • Delineation between responsibility of consumer, provider.
    • Issue- try to drag all process to the cloud.
    • Look at improving security, instance level security to the cloud.
    • Mutual trust with cloud provider. Certify that provider is compliant.
    • Cloud Pillars:
    • Privacy, Transparency, Compliance, Security
    • Hybrid model approach: App, workloads that can be outsourced to the cloud. Integration of Systems – read only between sockets
    • Incorporate security in the build process
    • Horizontal compliance vs Vertical compliance
    • Dynamic/Transient Compute – instances may live for 4 minutes. How to secure an architecture like this?
    • Re-evaluate toolset
    • Routing in public clouds something to think about and underscore the importance of API security
    • Patch Management & Federated Identities
    • Define IAM policies – principle of least priviledge
    • MFA for humans!

What a fantastic day!! I encourage all of you to make it out to events such as this to listen, learn and network.

More information here: https://www.itworldcanada.com/client/cloud-sec-2018.html

Alvin

Weekly Update: April 2 – April 7 2018 The Intersection of Society and Technology

Muskrat Watershed Rehabilitation Project

Machine Learning The Key To Network Latency?

Google Cloud Machine Learning Documentation

Is BlockChain The Future of the Internet?

Cyber Attack on Natural Gas Pipelines

Have a fantastic week!

Alvin