The KIT ─ Knowledge & Information Technology
No. 220 - 16 July 2018
Was this forwarded to you?
In This Issue
CSCC Becomes CWG
Cognitive Computing in Utilities
Hacking Passwords
The High Cost of Lax Security
Seen Recently
Claude Baudoin

Consulting Services
  • IT Strategy
  • Enterprise Architecture Roadmap
  • Business Process Modeling & Analysis
  • Enterprise Software Selection
  • IT Innovation Briefings
  • IT Due Diligence
  • Executive IT Seminars
  • Cloud Computing
  • Security Maturity
  • Software Process
  • Knowledge Strategy
  • Technical Communities
  • Knowledge Capture
  • Taxonomy development
  • Enterprise Social Media
Contact Us:
cébé IT and Knowledge Management
www.cebe-itkm.com
[email protected]
+1 415 870 ITKM
Twitter: @cbaudoin
Archive:
Previous KIT Issues
Forward this issue to colleagues and friends: use the "forward email" link below at left, rather than "Forward" in your email software, to preserve your privacy, give the recipient more options (their own unsubscribe link, etc.) and to give us better click-through data. Thanks!
CSCC becomes CWG
The Cloud Standards Customer Council (CSCC) is becoming the Cloud Working Group (CWG) of the Object Management Group. This organizational change will have no effect on the 750+ member organization:
  • We will still work toward the same deliverables -- they will just be branded as "OMG Discussion Papers" in the future, including revisions of the 27 papers already published since the CSCC was formed in 2011.
  • The process is open to any willing participants, and current CSCC members will automatically be enrolled in the OMG CWG.
  • Membership remains free.
Some of the few things that will change are:
  • The CWG will no longer be governed by a Steering Committee, but by co-chairs who will be OMG members. Claude Baudoin will serve as the initial chair and is inviting other interested participants to be apply as co-chairs.
  • The deliverables will be submitted for approval to the OMG's Middleware and Related Services (MARS) Platform Task Force.
  • Consistent with the mission of the OMG, the CWG will address opportunities for standardization in its deliverables.
  • The CWG will occasionally hold face-to-face meetings or forums during the OMG quarterly technical meeting weeks, tentatively starting on Sep. 25 in Ottawa, Canada.
To learn more about this transition and the opportunities to participate in this new phase of our work, attend our webinar on July 19 at 12 noon EDT (9am PDT, 16:00 UTC, 17:00 UK, 18:00 CEST).
Cognitive Computing in Energy and Utilities
You can now watch a free replay of a June 26 Brighttalk webinar, given by Jeffrey Katz of IBM, in which he "explores the application of cognitive computing techniques within the energy sector: increasing the accuracy of outage predictions, optimizing uptime, and enabling customers to monitor and control their monthly energy consumption."

Jeff is Head of Grid Technology Energy, Environment and Utilities Industry at IBM, and co-chairs the Energy Task Group of the Industrial Internet Consortium. The webinar recording lasts 64 minutes.
Yet Another Way to Hack Passwords
The recent indictment by the US Department of Justice of 12 Russian officials has caused the phrase "spearfishing attack" to appear in mainstream media. But this is far from the only way to obtain passwords.

Some years ago, researchers determined that the keys on a keyboard tend to have a slightly different sound signature; one may therefore reconstruct a password from a sound recording of a user logging in. Now, a study from UC Irvine shows that a thermal image of a keyboard, taken up to a minute after a user ended up typing, reveals what keys were pressed the most recently.
The High Cost of Lax Security
The famous data breach at credit rating company Equifax, which occurred in mid-2017 and exposed sensitive personal information of 143 million U.S. consumers, is still reverberating through the industry, and its cost to Equifax is still mounting. A New York Times article dated June 27 provides a list of legal, financial ($243M), organizational and regulatory consequences that company has suffered. That should be enough to make IT departments double-check that their systems are current with the latest patches. And yet, who is willing to bet that this will not happen again?

(Inspired by a mention in Vince Polley's Miscellaneous IT-Related Legal News, or MIRLN)
Seen Recently...
"A number of iPhone X users say the phone's Face ID doesn't recognize them when they first wake up in the morning."
-- Alison DeNisco Rayome, in a July 13 TechRepublic article (click to know why)