Uncategorized

Apple WatchOS

Apple WatchOS

Apple WatchApple WatchOS is the company’s operating system developed to power Apple Watch smartwatch devices. WatchOS is based on Apple’s iOS mobile operating system that powers iPhoneiPad and iPod Touchdevices.

The WatchOS made its debut on April 24, 2015, when the Apple Watch was officially released to the public. An API called WatchKit was also released for developers to create WatchOS apps for the Apple Watch.

Apple Releases the WatchOS 2 Update

Apple introduced a major update to the WatchOS in September 2015 in the form of WatchOS 2. Apple WatchOS 2 delivers new features and functionality for Apple Watch devices, including more native apps with access to the smartwatch’s sensors and controls like the Taptic Engine, Digital Crown and more.

Additional new features include a “Time Travel” feature that displays your upcoming events up to 72 hours in the future (or prior for past events), tetherless Wi-Fi for connecting to Wi-Fi networks without needing to first connect to a paired iPhone, new watch faces, improved support for Siri and a nightstand mode.

WatchOS 3 Arrived in 2016

Apple announced the WatchOS 3 mobile operating system in the fall of 2016 in conjunction with the debut of the Apple Watch Series 2. The WatchOS 3 update offered improved performance over earlier release, as well as a new Dock for easier navigation, the ability to launch favorite apps quickly, and new and improved fitness and health capabilities for the Apple Watch.

WatchOS 4

Apple unveiled the watchOS 4 mobile operating system in September 2017 along with the new Apple Watch Series 3. Apple watchOS 4 offered improved health and fitness features (including a Quickstart interface for faster starts to workouts and a High Intensity Interval Training workout option), plus personalized Activity coaching, enhanced measurements in the Heart Rate app, a new Siri watch face and improvements to the Music experience.

WatchOS 5 Debuts with Apple Watch 4 in 2018

Apple announced the watchOS 5 mobile operating system in the fall of 2018 in conjunction with the debut of the Apple Watch Series 4. With watchOS 5, Apple has added an array of new health features to go along with support for Walkie-Talkie mode, Notifications enhancements, Podcasts, an updated Siri watch face, and a redesigned Heart App.

Health and fitness improvements and new features in watchOS 5 include a new ECG app on the Apple Watch 4 that allows the wearer to take an electrocardiogram (ECG), Activity competitions, automatic workout detection capabilities, and Yoga and Hiking workout options. A 5.2 update for watchOS 5 expanded the ECG support beyond the U.S. and also added support for the 2nd generation of Air Pods.

Uncategorized

ARM Servers

ARM Servers

 

An ARM server, or advanced RISC machine server, is a computer server system comprised of a large array of ARM processors as opposed to the x86-class processors traditionally used in servers. ARM servers are touted for being able to provide similar or greater processing power than x86 server counterparts while consuming less energy and producing less heat.

As a result, ARM servers have become more and more popular in recent years and are now frequently deployed in enterprise data centers and cloud deployments. However, despite projections of massive growth for ARM servers, the road to mainstream adoption and gaining market share on Intel and its x86-based servers has not gone smoothly for ARM servers and ARM server processor manufacturers.

The Current State of the ARM Server Market

A number of ARM server chip manufacturers have attempted to push the ARM server industry forward, only to see their efforts come up short. Applied Micro Devices (AMD), Broadcom (with its Vulcan ARM server chips), Qualcomm (with its Amberwing processor designs), Calxeda, Cavium and others have put massive amounts of money into the ARM server market only to later cease operations or find themselves acquired by other companies.

In their place, companies like HP with its Moonshot server systems, AWS with its Graviton ARM server chip, and Huawei Technlogies, with its HiSilicon subsidiary, have been pushing the ARM server market forward.

Their efforts are helping ARM servers gain footholds in hyperscalecloud and enterprise data center computing environments, but Intel and its x86 servers still outpace ARM server deployments by a huge margin.

Uncategorized

disruptive innovation (disruptive technology)

disruptive innovation (disruptive technology)

 

Disruptive innovation is a term used to describe a product or service that starts out small or simple and moves quickly through the lower tiers of a market segment, often displacing established businesses and technologies in lower margin sectors.

Generally, a disruptive innovation focuses on lower profit markets and customers, allowing a new startup or emerging business to be profitable by targeting customers who are underserved in the existing market. In time, the new product or service moves upwards in the market and can eliminate established companies who are slow to react or respond to the innovations.

Examples and Origins of the Phrase

Netflix is an example of a successful disruptive innovator business. When Netflix started, there was no direct competition in the established market (i.e. Blockbuster) but the innovative on-demand streaming model disrupted Blockbuster by focusing on a segment of underserved customers to gain industry presence.

Another classic example of disruptive innovation is the PC market. Personal computers were an innovation that improved over time and eliminated the mainframe industry. Blockchain is another example of a disruptive technology in financial markets.

The phrase disruptive innovation was coined by Harvard Business School professor, Clayton M. Christensen in his research on the disk-drive industry and later popularized by his book The Innovator’s Dilemma, published in 1997.

Today, the phrase disruptive technology is a preferred synonym of disruptive innovation.

Uncategorized

Multi-Factor Authentication (MFA)

Multi-Factor Authentication (MFA)

Multi-Factor Authentication, or MFA, is a form of authenticating users that utilizes more than one method of identification when connecting to a secure site or service. This provides an additional layer of security over traditional forms of single sign-on authentication, which require only one type of identification such as a password.

Also known as two-factor authentication, or 2FA, multi-factor authentication can take several forms, but most typically utilizes either a smartphone or a smart card in conjunction with a password or PIN. More advanced forms of MFA will sometimes rely on biometrics such as fingerprint recognition or retina scanning for the second form of authentication.

How Multi-Factor Authentication Normally Works

A user logging into a site secured with MFA will typically enter a password and then will have a code sent to the smartphone number (or email address) associated with the account. Only after the correct password and the authentication code have been successfully entered will the user be able to access the site or service.

While not completely foolproof, MFA does make it harder for hackers to log in to a user’s account, as they would need to have both the user’s password and access to their smartphone or similar device in order to correctly provide both forms of authentication.

As a result, MFA is typically deployed for protecting access to more sensitive or mission-critical information within an enterprise. MFA is also increasingly becoming a requirement in government mandates for regulation and compliance.

Uncategorized

full stack

full stack

 

Full stack in technology development refers to an entire computer system or application from front end (customer or user-facing) to the back end (the “behind-the-scenes” technology such as databases and internal architecture) and the software code that connects the two.

In computer software and application development, full stack engineers are those with the skills and expertise to manage employees and projects and develop the code that will create or optimize integration between front end and back end systems.

Front-end development involves the creation or optimization of visible parts of websites or applications (the “client” end) that users view and interact with in their web browsers or on their mobile devices. These front-facing apps and websites are typically created using tools like HTMLCSS, and JavaScript.

Back-end development, on the other hand, involves creating and refining software code that integrates and communicates with an enterprise’s existing databases, software and other infrastructure (the “server” end) so that the front-end websites and/or apps can deliver the information visitors or customer need.

What Skills and Programming Languages Do You Need to Be a Full Stack Developer?

Those interested in pursuing a career as a full-stack developer or full-stack engineer will need to be well-versed in a variety of computer programming languages. Full-stack developers need to be proficient in languages used for front-end development like HTML, CSS, JavaScript, and third-party libraries and extensions for Web development such as JQuery, LESS, SASS, and REACT.

For full stack developers, mastery of these front-end programming languages will need to be combined with knowledge of UI design as well as customer experience design for creating optimal front-facing websites and applications.

Full-stack developers and engineers also need to know how to code in back-end languages like JAVAPHPRubyPerlPython, and C in order to ensure their front-end web sites and applications are able to integrate with back-end business applications and infrastructure. Knowledge of databases and languages to interact with databases like MySQLOracle and Microsoft SQL Server is essential for full-stack developers as well.

Full Stack Developer: Jack of All Trades / Master of None?

It’s important to note that full-stack developers and engineers are not expected to be masters in all of these programming languages; rather, those in a full-stack development role should have a solid proficiency in one or more of these languages while also understanding how front-end and back-end technology need to integrate and work together efficiently.

Hands-on experience is the best way to become a competent full-stack developer, but for those new to full-stack development or programming and technology in general, coding bootcamps and online programming courses from sites like General Assembly, Coursera, Thinkful, and Lynda can be helpful for getting started and learning some of the essential skills needed to advance a career in full-stack development.

Full Stack vs. Technology Stacks

The term full stack is sometimes confused with a closely related term, technology stack. Technology stacks refer to a collection of specific software tools and technologies that can be used in conjunction to develop webites, apps and other software programs.

Web tech stacks such as the common LAMP (Linux, Apache, MySQL and PHP) are frequently used in full stack development, but the terms full stack and tech stack are not completely interchangeable.

Technology stacks are combinations of specific software tools and technologies that help with software development, whereas full stack is a term that applies to the overall development of projects that combine front-end and back-end systems, and entails the entire development process from conception and planning all the way through coding, testing, sending system into production, and optimizing existing systems.

Uncategorized

Project Libra (Facebook Currency)

Project Libra (Facebook Currency)

Project Libra is the codename for Facebook’s plans to release its own cryptocurrency for shopping and sending currency within the Facebook social network and the company’s various apps like Instagram and Messenger. Facebook announced the new form of digital money in June 2019 but did not disclose exactly when Facebook Libra will become available.

Facebook also announced that it has created a new digital wallet called Calibra that serves as a way for users to store and spend their Libra currency. Calibra will function in a fashion similar to the popular existing Venmo app.

Libra will be managed by a Swiss-based consortium known as the Libra Foundation, with founding members including Facebook, Visa, MasterCard, PayPal, Coinbase and more than 20 other companies.

Expectations are for the Libra digital currency to be available to the public through Facebook apps and services like the Facebook social network, Messenger, Instagram and WhatsApp in mid-2020. At that time, users will be able to download the Calibra wallet app and purchase Libra currency by connecting one or more of their bank accounts to Calibra.

Privacy Concerns Around Facebook Extend to Libra

While Facebook is touting Libra as a convenient tool to help users purchase products and services and send money to other users, many are questioning how Facebook will protect users’ privacy when it comes to Libra.

Critics contend Libra will give Facebook and its partners additional ways to track users online and enable the company to further personalize ads and information based on their users’ shopping behaviors.

Users will be presented with an option to keep their Calibra wallet information separate from their other Facebook profile details and history, but the company’s recent troubles with keeping user data private have many concerned that Libra will create a higher risk when it comes to ensuring the security of sensitive user data.

Uncategorized

Endpoint Detection and Response (EDR)

Endpoint Detection and Response (EDR)

Endpoint Detection and Response, or EDR, is a form of technology that provides continuous monitoring and response to advanced cybersecurity threats. EDR is a subset of endpoint security, which handles holistically protecting corporate networks and data when employees access the network remotely via laptopssmartphones, and other mobile devices.

With endpoint security in place, each endpoint on the network is secured and protected from vulnerabilitieshacking and other cybersecurity threats. Endpoint security is responsible for ensuring the overall security of endpoint devices and the corporate network, while Endpoint Detection and Response focuses specifically on helping security personnel identify, investigate, and resolve very advanced threats and extensive cyber attacks that are likely to compromise multiple endpoints.

Key Capabilities to Look for in EDR Solutions

As a result, EDR tools and processes are designed to track endpoint diagnostics and provide detailed information that will help security personnel or third-party security services proactively and continually identify, investigate, and effectively diagnose and resolve advanced security threats and broad-scope attacks that can compromise multiple endpoints.

According to this article from eSecurityPlanet, some of the key features to look for in an EDR solution include:

Leading Endpoint Detection and Response Products

Popular Endpoint Detection and Response solutions on the market today include Symantec Endpoint Protection, Cisco Advanced Malware Protection for Endpoints, Carbon Black Cb Response, FireEye Endpoint Security, Guidance Software EnCase Endpoint Security, CrowdStrike Falcon Insight, RSA NetWitness Endpoint, and Cybereason Total Enterprise Protection.

Uncategorized

Cosmic Cuttlefish

Cosmic Cuttlefish

 

Cosmic Cuttlefish is the Ubuntu codename for version 18.10 of the Ubuntu Linux-based operating system. Officially released on October 18, 2018, Cosmic Cuttlefish follows the Bionic Beaver (v18.04) release.

Unlike Bionic Beaver, which was a Long-Term Support (LTS) release designed to be supported for five years, Cosmic Cuttlefish will only be supported for nine months. As a result, the Ubuntu 18.10 Cosmic Cuttlefish release will be supported through July 2019, while Bionic Beaver will continue to be supported until April 2023.

What’s New in Ubuntu 18.10 Cosmic Cuttlefish?

Ubuntu 18.10 Cosmic Cuttlefish offers mostly minor improvements and additions for the Linux server OS compared to earlier releases. Updates in Cosmic Cuttlefish include GNOME 3.30 with support for VeraCrypt encryption and the new Yaru theme that delivers a more modern and “flatter” look, Linux Kernel 4.18, GNU Compiler Collection (GCC) 8.2, Python 3.6.7, GLIBC 2.28, LibreOffice 6.1.2 and Firefox 63.0.

Ubuntu Cosmic Cuttlefish
What Exactly Is a Cosmic Cuttlefish?

Cosmic is a term that refers to the universe or cosmos, particularly as something distinct from the planet Earth. The second part of Cosmic Cuttlefish is a squid-like swimming marine mollusk that has eight arms and two long tentacles that the cuttlefish uses for capturing prey.

As of April 2019, the Cosmic Cuttlefish release of Ubuntu Linux has been superseded by the Ubuntu 19.04 Disco Dingo release.

Uncategorized

Customer Experience (CX)

Customer Experience (CX)

 

Customer Experience, or CX, refers to how a customer feels about a brand or company based on their experiences with it. CX managers and departments responsible for creating an optimal Customer Experience Strategy are tasked with ensuring customers have positive experiences with the company, whether through purchasing a product or service, receiving support for their purchase, or being engaged by marketing or advertising initiatives.

Each of these touchpoints, or ways by which consumers can interact with a company, can create negative or positive impressions, and CX strategies involve both differentiating a brand from the competition and maximizing the positive experiences consumers have with the brand, with the overall goal of reducing customer churn and improving overall customer lifetime value (LTV).

Customer Experience: Optimizing Each Point on the Customer Journey

Specifically, customer experience managers and departments analyze each point on the customer journey or customer lifecycle from the perspective of the customer and work to ensure the company is delivering an optimal experience for consumers along the various steps of the process.

The customer journey typically includes most or all of the following steps: discovering the brand via marketing or advertising, researching the brand and comparing it with alternatives through research and reviews, purchasing products or services from the brand, receiving support from customer service, and ideally, purchasing from the company again or remaining on subscription-based revenue models offered by the company.

By successfully optimizing each stage of the customer journey, customer experience departments create a higher likelihood of brand loyalty and positive advocacy for the company and its products or services while also increasing overall revenues and customer LTV.

Specific Strategies and Tactics for Improving Customer Experience

Effective Customer Experience departments will first create a detailed, clear customer-centric vision for the company to follow and then assist various other departments within the company to better align their goals with this vision.

In terms of specific tactics for improving customer experience, many companies have recently focused their attention on improving customer support interaction and more actively engaging customers through various forums to provide better support while also encouraging word-of-mouth or “viral” marketing from satisfied customers.

Other common customer experience tactics include creating opportunities for positive emotional connections with customers both pre- and post-purchase, emphasizing the emotional benefits of the brand and its products, developing and analyzing real-time customer feedback to improve products and support, and creating and fostering social media communities for customers to interact with the brand and other loyal customers.

Uncategorized

helium hard disk drive (HDD)

helium hard disk drive (HDD)

A helium drive is a high capacity hard disk drive (HDD) that is helium-filled. This hard drive technology replaces the air inside the HDD with helium and is hermetically sealed during manufacturing. Helium drive technology is compatible with most industry-standard magnetic recording technologies including perpendicular magnetic recording (PMR), two-dimensional magnetic recording (TDMR), shingled magnetic recording (SMR), microwave-assisted magnetic recording (MAMR), heat-assisted magnetic recording (HAMR) and bit-patterned media (BPM).

Helium Hard Drive

Image Description: Western Digital Ultrastar DC HC530 14-TB

Helium Improves Efficiency

Compared to air, helium is one-seventh the density. In traditional drives, the air inside typically creates an amount of drag on the platters, requiring more energy to spin. Replacing the air with helium reduces the amount of energy needed to spin the platters. By some estimates, helium HDDs may be up to 20 percent more efficient than air-filled drives. Additionally, helium drives offer higher sequential data transfer rates as a result of the overall increased areal density.

Helium Storage in the Data Center

Newer helium hard disk drives have provided an advantage in the data center, specifically, cloud and exascale data centers, where 14-TB plus capacity drives can maximize data storage capacity per rack while lowering power consumption to meet TCO objectives. Helium drives have lower cooling requirements which reduce overall energy costs.

As helium-filled drive technology advances, so does the storage capacity of the drives. In fact, Western Digital has announced (Sep 2019) a 20-TB helium-filled drive, using nine platters, each with a capacity of about 2.22TB and a 2.5M hour mean time before failure (MTBF) rating and feature SATA or SAS interface.

Helium Drives at Home

Currently, helium-filled drives that focus on the consumer market are limited. Standard drives are 3.5″ drives that use perpendicular magnetic recording (PMR) platters in a helium-filled enclosure, in capacities starting at 10-TB. The drives are compatible with specific lines of desktops and entry-level direct-attached storage enclosures.

Helium Drive History

The first helium-filled hard drive (6-TB capacity) drive was made commercially available by HGST, a Western Digital subsidiary, in November, 2013. Today, several hard drive manufacturers, Including Western Digital, Seagate and Toshiba offer helium hard disk drives.