benchmarkingblog

Elisabeth Stahl on Benchmarking and IT Optimization

One Pixel

leave a comment »

So we have the multi-million dollar security breaches. And the worry about losing our personal information. But the cherry on top in this era of artificial intelligence has to do with one more thing. A pixel.

You can sometimes tell when photos are changed. Get that red eye out, crop that hair that is out of place. But with an image, a bad actor can make infinitesimal changes that the naked eye can not detect.

One pixel, in fact.
Glacier
You don’t need to care if a pixel is off in your vacation photos.

But what happens if a pixel is hacked in an image that is used in an AI vision classification workload. And suddenly your pet dog is classified as a pet cat.

Now it may not be a big deal if your chihuahua is classified as a tabby.

But what if a medical image ends up being classified as a different type of cancer from what it is? What if the self-driving vehicle sees a clear road when there’s really a truck there? What if a dangerous weather pattern appears as nothing to worry about?

Yes, we need to worry about $ and PI. And now there’s life and death.

And the threat may not be from halfway around the world. It could come from your own backyard. Or even from inside.

That is why we need to be so vigilant on ensuring that data is encryptedat rest and in flight, end-to-end. And focused on creating tools that do things like generating low-cost adversarial attacks against neural networks — for evaluating robustness against these very attacks.

Come innovate with us at our IBM Systems Co-Creation Lab. You and IBM experts work side-by-side to create first-of-a-kind strategies and solutions for your organization in AI, security, and other technologies. Contact us at design@us.ibm.com.

___________________________________________________________________________________________________________________________________________________________________________

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,,,,,

Advertisements

Written by benchmarkingblog

June 19, 2019 at 11:55 am

Posted in AI, Security

Cash or credit or . . .

leave a comment »

Can you even remember the last time you used cash ? I think I used it to buy a cup of coffee 3 weeks ago in Philadelphia. And don’t even ask me when I used it before that.

Multiple forms of currency exist and it’s fit for purpose; basically, we use what is best for a particular situation.

Coin

Cash is now approximately 30-40% of how we transact business. And not surprisingly it’s declining. We don’t write many checks anymore. Credit and debit cards are of course a popular payment option. But the real future is in electronic and digital currencies.

We’ve heard about and read about and maybe even own cryptocurrencies. But don’t just think Bitcoin – most of us know that one because it was the first to use the underlying technology of blockchain. Organizations and industry groups are now beginning to create private cryptocurrencies for their customers. We are starting to see some central banks around the world use digital currencies. And company-branded specific cryptocurrencies such as one for photographers may achieve widespread adoption in addition to traditional cryptocurrencies.

But “with great power comes great responsibility.” Along with this growth may be more cybercrime and the need for stepped-up cybersecurity. Governance is important here and regulation is key. We are beginning to see some governments regulating. This can not happen fast enough.

So we can clearly see the future and the future is backed by blockchain — whether it’s currencies or healthcare data or mandarin oranges in the supply chain. Traceability saving time and money and lives — on premise, in the cloud, and even interfacing with artificial intelligence.

For many of us who rarely open our wallet the 30-40% statistic for cash initially seems rather high. Until we remember the gas pump that didn’t take credit cards, paying back your friend who doesn’t use venmo, and the purchase of the Thin Mints from the door-to-door Girl Scout. We’re getting there, but we’ve still got a ways to go.

_______________________________________________________________________

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,,,,,

Written by benchmarkingblog

February 7, 2019 at 2:23 pm

Posted in Blockchain, Uncategorized

Tagged with

Blockland Rocks!

leave a comment »

Blockland1ro
Cleveland is building a blockchain technology ecosystem. Yes, you heard that right — Cleveland. The Cleveland Blockland initiative exists to educate and promote real-world blockchain applications, while establishing and leading a blockchain ecosystem with support from private, public and philanthropic individuals and organizations.

I had the opportunity to work at the inaugural Blockland Solutions Conference this past week. IBM provided keynotes, speakers, labs and an awesome booth.  Blockland5r

The focus was on key emerging technologies — blockchain of course, but also AI/ML, 5G and a huge industry focus. Recommendations on what you need to know:
1) emerging tech literacy first 2) then how things flow and how everything fits together (oh, sounds like an architect!) and 3) finally, deep technical expertise. Final words on emerging tech: Don’t opt out.

I learned about new use cases for blockchain: A ticket validation organization was highlighted – they chose IBM blockchain for its scale, integrity of assets to reduce risk, and the enterprise cloud. A potential blockchain app to authenticate printer ink to avoid counterfeiting was proposed. Other organizations discussed their work using IBM blockchain for shipping and their use of a center of excellence (which I always recommend)

Also discussed was how choosing applications for emerging tech comes down to ROI (which I always work on, way before the technology). Blockland2r

I talked with numerous blockchain enthusiasts — from high school and college students just starting out to CEOs of blockchain startups to longtime technologists who were looking at or had started first projects.

We have a blockchain ecosystem in Silicon Valley. We have a blockchain ecosystem in Silicon Alley. Maybe it’s time for something in between.
************************************************

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,

Written by benchmarkingblog

December 11, 2018 at 9:52 am

#NeedForSpeedHackathon, an awesome hack

leave a comment »

This past weekend I had the wonderful opportunity to be part of the CMG NeedForSpeed Hackathon in our fair city of Cambridge, Massachusetts.

Computer Measurement Group (CMG) is a not-for-profit, worldwide organization of IT professionals committed to sharing information and best practices focused on ensuring the efficiency and scalability of IT service delivery to the enterprise through measurement, quantitative analysis and forecasting.

There were several amazing challenges in this hackathon and a big focus on healthcare and improving patient health. Pfizer, DataCore, and MathWorks were just some of the many awesome partners. I was a mentor, coach, and judge and also presented an innovation session on blockchain.

One team I advised used IBM Blockchain for medical records and one team used IBM Watson that I recommended for sentiment analysis for a meeting notes app. There were pitches for helping physicians, nurses, hospitals — and most of all, patients.

One of my favorite parts of the hackathon was “office hours.” I lounged on a fake leather couch in the corner of the venue while teams came to me to get ideas, discuss solutions and review their pitches. It’s so great to see what was created in so little time !

The youngest participants were 5 amazing freshmen from Northeastern. But there were also Machine Learning/Deep Learning experts of all ages to contend with. You can go to @CMGNEWS to see all the winners and their pitches !

Overheard in the hack room:
“Best hackathon ever” —> Of course, because CMG always runs a really good show.
“Best prizes ever” —> Love those drones !
“Best food I’ve ever had at a hackathon” —> Yes, Mary, they really really really liked the BBQ !

 

************************************************

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,,,,,

Written by benchmarkingblog

April 9, 2018 at 7:31 pm

Posted in CMG

Blockchain and Beyond: Wave or Storm? . . . And So Much More For High Growth Enterprises

leave a comment »

MAVA Sunrise

Last week I had the honor of being part of an industry panel entitled “Blockchain and Beyond: Wave or Storm?” This panel was part of the CEO/C-Suite Summit: Engineered for Growth that was hosted by MAVA, a 30 year old association that focuses on investing in high growth enterprises.

Think of a powerhouse for startups.

Many times when I discuss the benefits and use cases for blockchain I am talking with the system architects, the programmers, the implementers. For this panel I was actually highlighting blockchain in front of many who could invest, and invest big, in this emerging technology.

Many of the tranformational topics I addressed focused on ones I have discussed in the past. How blockchain can reduce costs, eliminate intermediaries, reduce time, and increase trust. How there are many differences between an enterpise permissioned blockchain and a permissionless cryptocurrency. How large organizations are using blockchain technology — such as Maersk tracking shipping containers, Walmart tracing pork products, and Northern Trust managing private equity.

But for this panel there was also an investment perspective: Where is blockchain on the hype and adoption curves ? What did we think of the latest bitcoin value ? Is it the Wild West or time to invest ?

MAVA Photo

After my panel I attended an amazing CTO roundtable with a group of diverse technologists: a data analytics startup CTO, a Fintech advertising technologist, an academic research chief scientist, a VP of technology of an education startup, and a cybersecurity defense consultant (who could not tell us very much about what he does!). It was awesome to collaborate and realize that we all had similar challenges — everything from data accuracy to security encryption to hiring for our teams. Fun fact: 3 of the 6 CTOs in the room had an advanced degree in Physics and were now working in Machine Learning.

The final session in the event was “Perspectives on the Acquisition from Both Sides,” fascinating lessons learned from founders of companies who then went on to acquire other companies or be acquired. Once thing I learned is that it can sometimes take many many years for an acquisition. That you need to be able to walk away. That you need to realize that a great mark of success for a startup is to take part in either acquiring or being acquired. And that CEOs of startups wear jeans and cool socks !

The luncheon speaker was NY Times best-selling author Liza Mundy who wrote “Code Girls: The Untold Story of the American Women Code Breakers of World War II.” We heard a compelling historical perspective on the foundation upon which the technology community today has been built. Super inspiring.

Note that this Summit was not 3 days, not 2 days, or even 1 day. It was a few hours. I have been seeing this trend with the workshops and meetups that I do. Everyone is looking to get more in less time. This event really showed me how well this can work. In a similar vein, I also had a discussion with a CEO of a technology startup who told me that he is done with reading 5 page papers (I did not let on that I actually used to write 50 page papers !) He told me he gets the most value from an infographic or very short article where a couple of key insights are highlighted.

MAVA’s goal with these events is to deliver compelling insight, ideas and perspectives to fuel significant competitive advantage for companies being built. They definitely hit a home run with this one.

************************************************

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,

Written by benchmarkingblog

December 5, 2017 at 3:15 pm

Posted in Blockchain

Tagged with

The Old College Try

leave a comment »

Today is a very big day for many high school seniors. At midnight tonight, early deadline college applications are due. And yesterday, the web portal used by more than a million students a year to submit these applications started having performance and availability issues and then shut down.

Needless to say, for many of these students Halloween was super scary in a real world sort of way. There’s already so much stress involved in applying to college and something like this impacts students, parents, high school professionals, colleges, and numerous others worldwide. And in my opinion, this didn’t have to happen.

I talk with many organizations about something called Best Execution Venue or Fit for Purpose. The concept is basically that you should choose the best technology for your workload based on local factors like non-functional requirements (such as performance and availability), architecture, skills, security and even politics. The best technology might be a mainframe. It might be an OpenPOWER system. It might be a public cloud. Or some architecture involving all of the above.

In this case, the college application site said that the portal ran into trouble because of “unusually large and intermittent spikes in system activity.” What a surprise. The use of this college application tool has been growing fast over the years and it is surely obvious that there would be a peak at this time. We have peaks in retail before the holidays. We have peaks in sporting events as they go live. And we have peaks in college applications right before the deadline.

It turns out that this site uses a public cloud (AWS). For the purpose of handling these peaks. Maybe this isn’t the best venue for performance and availability at this critical time.

One frustrated student tweeted “Does AMAZON Shut Down Hours Before Christmas? Does it Crash?” Ironically, he probably didn’t realize that he really was talking about Amazon.

************************************************

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,

Written by benchmarkingblog

November 1, 2017 at 11:02 am

Posted in Amazon

Encrypting Everything Really Really Fast, 12 Billion Transactions per Day, at Less Cost !

leave a comment »

Many of us don’t think of it every day but the IBM Mainframe actually supports:

  • 87 percent of all credit card transactions and nearly $8 trillion payments a year.
  • 29 billion ATM transactions each year, worth nearly $5 billion per day.
  • Four billion passenger flights each year.
  • More than 30 billion transactions per day – more than the number of Google searches every day.
  • 68 percent of the world’s production workloads at only six percent of the total IT cost.

And now it’s here. The new IBM Z !!!

With the new z14, IBM takes TRUST to a new level by adding the ability to pervasively encrypt data on the platform. IBM Z pervasive encryption is a data-centric approach to information security — a transparent and consumable approach to enable extensive encryption of data in-flight and at-rest to substantially simplify and reduce the costs of protecting data and achieving compliance mandates.

With the z14 and pervasive encryption, organizations can:

· Encrypt all of the data associated with an application or database on IBM Z, whether at-rest or in-flight.
· Reduce the cost and complexity associated with implementing and maintaining encryption since no changes to the applications themselves are required.
· Protect data without impacting transactional throughput or SLAs.
· Transition from un-encrypted to encrypted databases without disrupting business operations (DB2 and IMS high availability databases).
· Drastically simplify compliance by quickly demonstrating to auditors that all data is protected.

This awesome new system can support > 12 billion encrypted transactions per day on a single system ! It can also encrypt data 18x faster at 5% of the cost of x86-based solutions [1].

IBM Z has been a leader in security with hardened capabilities architected into the hardware, OS and middleware for more than five decades.

Contact the IBM Systems Client Centers for more information or assistance.

************************************************

(1) Source: “Pervasive Encryption: A New Paradigm for Protection,” K. R. E. Lind, Chief Systems Engineer, Solitaire Interglobal Ltd., June 30, 2017.

The postings on this site solely reflect the personal views of the author and do not necessarily represent the views, positions, strategies or opinions of IBM or IBM management.

technorati tags: , , ,,,,,,,,,,,,,

Written by benchmarkingblog

July 17, 2017 at 11:43 am

Posted in Uncategorized, Z, z14

Tagged with

%d bloggers like this: