Tag Archives: Big Data

IBM, Facebook and others unlock Threat data for the sake of humanity..

Check this out…


IBM and Facebook as well as others are starting to contribute to a massive big data based repository of threat related information.

I had an internal startup for some time that was targeting security as well as general operational data to point to trends that need attention such as disk series that are reaching failure points, apps that suddenly morph and such.

Another topic was cleansing the data from any personal or internal information by tokenizing it.

I stopped this startup since I got to meet someone who was doing the same and pointed to the fact that there’s already enough data on one hand (and now per this post we have got much more of that) and on the other hand companies would agree to share cleansed data but would not be able to do it due to regulations that take time to defuse.

In any case you have now lots of data too sip through if you are a hungry Data scientist…

Cloud Computing and SAAS Secrets revealed – 7 Consumption Economics Rules

This is important to get, for any enterprise software producer – here is a summary of more than an hour of video nuggets going through the must-read “Consumption Economics: The New Rules of Tech” Book, by J.B. Wood, Todd Hewlin and Thomas Lah.

Your customers are approaching a consumption gap: due to shrinking revenue and resources they can’t deploy your complex product fast enough to create the business value that justified paying for your costly products in the past, No matter how many powerful new features you offer. This makes the market ripe for price wars and disruption.

Customers cannot afford the long traditional time, required to deploy enterprise IT products.
Employees simply go directly to the SAAS based providers, ignoring any uneasy traditional solution.

There is lots of money to be made in SAAS – 200 million USD a year, but some will be extracted from existing solutions…

How should you, the solution provider move to the new paradigm without hurting your margins too fast?

The 7 new rules for Enterprise IT Software providers:

1. Risk is shifting from the customer to the service provider and from few lot of CAPEX to many small OPEX transactions. In the past the customer paid for IT solutions up front and owned the deployment risk, now it is the other way around.

2. Simplicity is KING. People prefer simpler partial good enough solutions, over full range complex solutions, the latter are expensive in both price and effort to deploy. The result is price war downhill in which non SAAS suppliers can’t win.

3. Users can finally drive tech decisions, because those services exist without mass dependency on corporate IT, and users will prefer SAAS.

4. Customer aggregators shrink direct market. Rack Space, Amazon and others will aim to aggregate users who need your SAAS solutions…so you as the solution creator have less direct sales opportunities to customers…and the aggregators will force you to bring your price down, to match their pricing…this means you could be commoditized…

5. Channel value reset. Global system integration services such as IBM and Infosys could get a lot of value by aggregating customers, providing complete line of business solutions, assisting in blurring the lines across private and public cloud. Smaller VARs and OEMs are in danger and will need to reshape their workforce and services to live with smaller chunks of income and bring value by launching consumption based services, enabling business process change and shifting from resell to fee for service.

6. Tech pricing under pressure. You need a freemium / try for free model. You need to be able and sell at a very low price ($5 per user…) and the have upgrade option up to the highest level ($250 per user) instead of getting paid a huge total amount up-front.
Customers will want to move from the rigid CAPEX fixed price model, via OPEX subscription model, which does not reflect actual use of the service, yet is cheaper than CAPEX, and finally land onto the consumption based subscription, where users only pay for what they use or maybe for the outcome they get, over short periods of time. The latter will require both vendors and customers to adjust their monetary systems.

7. Behavioral data drives consumption: where you the supplier use data gathered on what your customers want as they use your service, to adjust and give more, leading to further revenue. Most SAAS providers focus only on acquiring customers and monetizing them, while neglecting engagement (where the service automatically offers the user with new ways of using the service) and viral expansion of the use of the service as well as the customer base.

You want to move from being a master of complexity to master of consumption, and widen your market reach.

We can see 3 main points here:

1. Customers will pay per use.
2. You have to focus on the end users, since those who are more successful as a result of using your services, will consume more, and hence pay you more.
3. The risk for value generation by using our services moves from your users to you, the provider.

The old definition of ‘deployment done‘ meant the sale was made and initial setup of our software has been completed, setting our customer to pay us maintenance fee.
The SAAS definition of ‘deployment done’ should mean that the customer is massively using our service, benefiting of the complete suite of options.
This means you have to become your customer’s companion, guide and assistant in a successful journey of their business, using our SAAS offering.

Everything in the software industry needs to morph to support consumption, that’s based use of the software.
Marketing for example should allow automatic, real time, amazon like offering of additional services, that match what the user or other users like him seem to need.

Services though, will probably have the most fundamental affect. If we use statistics that assume the software business is worth 200 billion dollars, then the services business is 4 times bigger!
The services business addresses implementation, integration and maintenance. For many software vendors this sums up to 50% of their income! Moving to SAAS actually takes care of the management of complexity that software vendors have within their products. That’s exactly what Cloud Computing and SAAS inherently resolves, because there is no effort over installation and integration, while software updates are expected to be delivered as part of the subscription model. The right way to defend the services golden egg is by transiting from complexity management to creation of real business value. So instead of advising on how to get our software going, you need to advise and assist our customers to get business value through the use of our products. We need to look into what our most successful customers are doing every day, with our software and assist others does that as well.
So we should get out of the mental focus on margins, cost centers and such, and become masters in value creation for our customers. This requires us to break down the inter-services barriers and silos (consulting, support, education and others).
During this process will need to change our own organizational structure and allow sharing of resources, information and knowledge. The most valuable skillets will revolve around consulting for business value creation, through the use of our products, from technical wizardry to business processes mastery. We could then package this together into managed services offerings.
We’ll need expertise in areas such as vertical industry, business, design, product, technical, consumption.
The real driver for consumption and sales will be the services organization rather than sales or marketing, as they will be the ones providing consultancy, aimed to increase customer’s business value through increased consumption of their SAAS offering, which is gained by providing customers with education, support, professional services, etc.

Cloud computing affects will not revolve around hosting, on premise or off premise; it will rather be mandated by the consumption of services.

You don’t want to import the current structure of your legacy software into the new model. You have to transform every aspect of your business, including people, processes, and technology as well as belief systems.

Like Apple, you need to do both innovation in the relevant areas, and also to serve your customers so they are successful.

To facilitate this transition you can’t force it into people’s mind, but you need to keep asking the right questions…

GENESIS - Big Data Super Nova - Part One (Eve)

Big Data Super Nova Book on Kindle for FREE (next 23 hours)

I just published my first Novella on Amazon and would like to share it with you.

If you go to this link: http://amzn.to/17mLBi4 you can get it for free on your Kindle (in the next 24 hours or so)

*** I’d really appreciate if You Could Rate it and Write a Comment ***

It is called “GENESIS – Big Data Super Nova” (40 min read) – insights and ideas on the future of Big Data, wrapped in a Sci-Fi tech Novella:

*The Death of passwords
*Data dissolving agents
*The new security paradigm and the merge of humans and computers
*Inter Body Nano Bots, Brain Dumps, Light Speed Travel
*And more…

GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part Three (Apple)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

This is chapter 3, here is where you can find The first chapter of this Big Data Sci-Fi Novella (Eve)

Chapter 3: Apple

GENESIS - Big Data Super Nova - A Sci-fi Tech Novella, Chapter 3: Apple

Listen to this postListen or Download audio of this chapter here: 

It was the 1st of April 2013.

One year before, there were rumors that the world is going to end, that is, if you believed the ancient Mayan literature.

It turned up to be a bit later and more digital than physical.

Back then, social networks such as “Facebook” and “Twitter” allowed people to share their thoughts and feelings through external personal outer-body devices.
People called those cumbersome ugly devices “iPhone” and “Android”.

Everyone was hooked to those networks. Companies started letting people get access to services, based on their always-on authentication, to the social networks.
But people were using “Pass-words” to get connected to the social networks. They chose easy pass-words and did not care replacing them occasionally.

So if you found out one’s social network password (let’s say on Twitter), you also got access to any other service they had authorized (O-AUTH) to get logged on to, based on authentication token stored in their Twitter account.

Basically if you had someone’s twitter password, you could buy stuff and have them pay for it, look at the medical records, and review their personal assets. You actually became them.

When the big Digital Tsunami happened, it started by a huge surge of credit card and bank transactions fraud. Then as money pore into the attackers bank accounts (there were many used, so you could not track a single source), it started spreading away as a massive purchase wave.

Amazon, eBay and similar services were hammered with endless waves of purchases, and then rebounded into cancellations. Everyone tried to cancel the fraud purchase attempts.
There were similar attacks on health, government, manufacturing and other essential services, all directed to make them useless.

Later on this kind of attack was labeled “Application Based Denial of Service” – where instead of driving lots of requests to a service, you would overload the remediation system of a service with transactions that require huge effort to remediate (such as reversing a fraud transaction).

There was lots of confusion and slow response, addressing the global, world-wide break-in, because of the miss-leading reports, that it was all a 1st April joke.

In less than one hour all the financial institutions, digital merchant and many other critical systems were completely ruined.

It took 4 months to get most of the damages fixed. But by then many lives were lost.
You could die, because you could not get food or medical treatment, or you could get attacked, by desperate people who tried to forcefully take what you had.

No Anti Malware system could find out the secret key-loggers which had everyone’s passwords, because they were part of many operating systems.

The attackers worked many years, getting to the right people in every operating-system manufacturer’s staff. Then the secret key-logger code was added to the operating system’s codebase. Every developer the attackers acquired, had to add or change just a small piece of code, entirely blind to the demonic intension driving all those small changes (Time Shifted Attack).

The attackers had even penetrated the NSA (National Security Agency) staff, and implanted their own code on top of the home-land security hooks. Those hooks were originally designed to allow law-agencies get access to people’s cloud stored data as well as communications, in case those people were suspects. Now those law enforcement hooks had a parasite code, wire-tapping everything, ready to spray all this information to the malicious crackers.

It all sat there, silent, waiting, collecting and using Big Data to analyze and further, and reveal additional access details. Gone were the days of brute force password cracking – you guess passwords much faster, using Big Data analysis.

And then it was time for the software octopus to wake.

It started ignition on March 13, and up it woke on April 1.

Adam recalled that there was one more important event which took place on the 1st of April 2013.
The “Naturalists Group” was born.

The attack was carried on through Windows, Linux, Oracle, Java infrastructure suppliers and Cloud Providers.
Cloud services failed one by one and the true lack of the Cloud concept was revealed: We did not have “The Cloud”. What we had was many disparate cloud services, each one with its own weakness and finalized amount of resources.

Each Cloud provider had a final central set of “engines” operating all its services, which could easily hacked and brought down, essentially making it useless.
You really had nowhere to fail over to.

The lack of Data Integration was apparent across Big Data archives, so you couldn’t really see what was going on. We had no “Big Eye in the Sky”, no “Digital Defense Satellite”, watching our data and computers.

That was the day when true “Universal Computing” and the “Neuro-Fibre Net”, were born.

Lots of server systems halted that day, and many personal devices got their share of blackout as well.

But most of the victims had the mobile device of choice of that time.

It was produced by Apple.

Get additional chapters by reading the book by Clicking Right Here

GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part Two (Adam)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

Previous Chapter is here (Eve)

Chapter Two: Adam

GENESIS – Big Data Super Nova – Part Two (Adam)

Listen to this postListen or Download audio of this chapter here: 

He didn’t like to Wake-on-LAN people, although Eden Industries code of conduct allowed it, in case of emergencies.

As a Naturalist, long term member of the “Real Thing”, the last thing he wanted is any relation to using inter-body Nano bots or other artificial enhancements.

Adam was 27 years old, and preferred to die young, rather than have his body parts replaced by bot parts.

After 200 hundred years or so, no bot can keep your body alive, and you have to mind-beam yourself into the mind cloud, that is, if you discount the choice of artificial body part replacements.

The other option is to use a whole body replacement.

“That’s when you fully stop being a human, turning yourself into a dumb robot”, he thought. You look like a Frankenstein, no matter how precise your human body imitation is.

Of course, your mind is still there, if you don’t mind an emotional glitch here and there, since data loss can happen when your brains is scanned.

“Nothing is perfect, including 3-D brain scanners.”

Thinking about the Nano Mind- Scan bots crawling through his brain, as they turn mind into data, turned Adam’s brown eyes even darker.

“I don’t mind being a bit over-weight and baldy, or even called ‘Slow Thinker’. I won’t let any of those crap bots get under my skin”.

Eve looked always in great shape. But she never had to actually make an effort to look good. Her Muscle Trainer bots did all the work.

Eve was 20 years older than him, and still looked like she was in her early twenties.

“But she was not real. Not a real human being. And still I like her a lot.”

Then he felt ashamed for waking Eve by communicating the alert message, through her Inter Body Bots.

But he didn’t have a choice.

There was no time to wait, as more reports came in, it turned up to be a huge disaster.
He recalled the last time a global alert was broadcast on planet earth.

This time it was worse, enormously worse.

Get additional chapters by reading the book by Clicking Right Here

GENESIS - Big Data Super Nova - Part One (Eve)

GENESIS – Big Data Super Nova – Part One (Eve)

Hey and welcome!

The “Genesis – Big Data Super Nova and the Journey Back to Privacy and Security” broadcast is about to begin.

This time I decided to share with you my insights and ideas through a story.
So tighten your seatbelt as we jump into hyperspace through time.
It’s now exactly 37 years forward – the morning of March 13, 2050, 11 AM: Earth Standard Galaxy time.

Listen to this postListen or Download audio of this chapter here: 

Chapter 1: Eve

Eve woke up.

But as she puffed her dark long hair off her face, she felt strange, a sense of fuzziness.
The inter-body adrenaline injection Nano system did its job and she opened her eyes.

GENESIS - Big Data Super Nova - Part One (Eve)

“No need for Alarms clocks any more”, she thought.

Then she felt as if she lost it.

It was as if her thoughts got encrypted through an SSH5 Gateway so she could not really understand what she was thinking.

Lights came up, as the under-skin environment communication Nano chip sent the message about her awakening to her room’s climate control unit.

But she was still lost.

Her body was still awakening, eyes turned purple, muscles twitching, heart beating faster.
But none of this was in her control. The Nano bots were doing it all.
No one needed to use contact lenses to get their choice of eye color, or go to the sea to get their body’s skin tanned.

Well except the Naturalists of course. They were objecting just any kind of body enhancements.

Then suddenly, as if someone hit the lights on, Eve was really awaken.
Her first thought was “It is too early”.

Then the Red Blinking message appeared right in front of her eyes, blinking, mesmerizing.

“From: Adam@eden-industries.com
Subject: Big trouble Boss
Better get here right away, while you still can.

That’s why she lost it for a moment.
There was no time for the usual gradual wake up.

Adam had probably activated the Emergency wake up process, communicating the secret “Wake-on -LAN” message right into the Nano chips in her body.

“I hate it”, she thought. “And I don’t have time to get to the office.”

“I have to mind-beam”.

Get additional chapters by reading the book by Clicking Right Here