The blockchain world gets more interesting by the day

 

 

 

I was at a conference last week where everyone was doing some interesting things with blockchain technology. This is the not-so-secret sauce behind Bitcoin: a transaction log that is verifiable and can be synchronized across distributed servers and still handle multiple trust relationships, where chargebacks can’t happen and where the crypto is strong enough to have banks and other financial institutions spending millions of dollars supporting dozens of startups.

I have written before about blockchain tech for IBM’s SecurityIntelligence blog here, but what got me interested about the conference was how practical blockchain implementations have been and will be. This is especially true in changes to the world of supply chains, where goods move across the globe under a variety of incomplete and error-prone tracking circumstances.

Indeed, at the conference I saw lots of blockchain apps that related to supply chains and had almost nothing to do with cryptocurrencies. This is an industry that is ripe for change. As one analyst has written, many supply chains have data quality issues and automation has failed to deliver significant productivity gains. That could change with these new apps.

For example, there is a company called Everledger.io. The idea is to attach a unique digital signature to each and every diamond that is traded on the various international exchanges. This signature can be immediately verified with the actual item itself – like the way a checksum can be used to verify if a digital file has been altered – to ensure that the diamond hasn’t been tampered with or substituted. So far they have been able to track close to a million diamonds in this fashion. According to insurers, about seven percent of the world’s diamonds are fraudulent in one way or another. Last fall, data from the Gemological Institute of America, the main diamond industry certification body was altered by hackers.

We are still in early days, but you can see there are lots of other applications to help detect when counterfeit goods enter a supply chain that are ripe for blockchain applications. Sending prescription drugs around the world is another high-value application that several teams are working on blockchain apps.

One FedEx manager was on a panel where they spoke about how they need new technology for managing their supply chain. “The immutability of the transaction is important for us: are you who you say you are, and are you shipping what you say you are shipping?” They spend a lot on insurance and it would be nice if they could leverage blockchain tech to prove that a package actually did make it to the final destination, with something other than an illegible signature.

While they can track a package from when it leaves your door through their shipment network, that only works if they have control over the shipment from end-to-end. That isn’t always the case, and especially internationally where it can be more cost-effective if they can hand off a package to another shipper. The panel also brought up an interesting question, as to what constitutes a delivery address, with one of them holding up his phone, saying how he wants to be able to deliver something right to where he is at the moment. That has a lot of appeal to me, as I recall how many hours I have spent trying to find a package delivery person when I stepped out of my office for a moment.

Also speaking was a representative of Chattanooga-based Dynamo, a new accelerator for supply chain ventures. They are funding several blockchain-related startups. “It isn’t just about saving money with these kinds of businesses, but about finding opportunities to expand commerce.”

The conference started off with a speech from Brian Behlendorf, who is now in charge of the hyperledger project that is part of the Linux Foundation. He has been around the tech industry for a long time, putting up Wired magazine’s early website and developing numerous open source projects. The idea behind hyperledger is to have an open source project that can be used in a number of blockchain circumstances. Think of what the Apache programmers did for web servers back decades ago: the same thing will be attempted with having a set of protocols and standard infrastructure to build blockchain apps on top of with hyperledger.

Before the conference took place, a pre-conference hackathon was held and more than a dozen teams and 50 people participated to win the top prize of $20k. The winners included college students, which should give you an idea of how quickly blockchain is evolving. Unlike many hackathons where the winners get to pose with an oversize check, in this case the winning teams’ prize money was preloaded in bitcoin on a special cryptokey, which was quite fitting. The first place finishers wrote an app to eliminate ID fraud, using blockchain to encrypt and validate who you actually are.

Blockchain isn’t just all about the supply chain: the banks are getting involved too. A private effort from R3 has more than 40 financial services supporters to try to create standards for distributed ledgers. Barclays has more than 45 Bitcoin-related projects. Deloitte has a group based in Toronto doing cryptocurrency and blockchain consulting. A Berlin neighborhood has dozens of retailers who accept bitcoins. Finally, there are other currencies that are gaining traction, including Ethereum and Dash.org, that attempt to improve upon the original bitcoin specifications and further fueling blockchain interest.

It looks like there will lots of blockchain-related news in the coming months.

Fast Track blog: Lessons Learned From IT Asset Management

As a citizen developer, trying to manage your IT assets can be tough. Keeping track of such things as programs, servers, policies and procedures requires discipline, organization, and best practices that those of us who were raised in the IT school of hard knocks had to learn along the way. Here are a few tips from the IT pros to help you out.

You can read more on the QuickBase Fast Track blog here.

For Immediate Release: a podcast for B2B Marketers

I return to doing a regular series of podcasts with my long-time former partner Paul Gillin, called For Immediate Release: B2B. Paul and I co-hosted almost 100 episodes of MediaBlather back several years ago, and many of those shows have held up well talking about how technical PR and marketing communications professionals can leverage new media and other strategies.

In this week’s show, we talk about the upcoming merger between Microsoft and LinkedIn (Paul and I are split on whether it is a good thing), and interview Radius.com CEO Darian Shirazi about predictive analytics and its utility for marketing and customer retention.

Wanted: more women in software

The tech business for years has had an awful record of employing and retaining female engineers, and this record is getting worse. Women represent less than a third of the typical firm’s engineering staff, and in some cases such as Twitter only 10% are engineers. Top tech management ranks are almost exclusively male.

Over the years, I have accepted this sad fact of our industry, but this week I was at a conference that was almost all populated with women and girls. It was an eye opener for me. Like many of you, I have gotten used to being in a mostly male audience when I attend or speak at tech conferences. This event was called “She’s Pivotal” and the title was purposely multiple meanings. It was organized by the software vendor to showcase the brainy and accomplished women that it employed, along with some stalwarts from St. Louis. It was inspiring and a bit uncomfortable, which is what I imagine many of the female nerds feel when they sit in a typical meeting. One woman in her 50s spoke about when she first started her career; she was the sole member of her gender in most of her meetings. “Now things have progressed to where there are two or even sometimes three of us in a room.” I guess that is progress.

Then there is this: engineering schools graduate many more women that either never end up actually doing any engineering, or who leave the field after a few years. This research from last year found that nearly 40 percent of women who earn engineering degrees quit the profession or never enter the field at all. There could be a variety of reasons for this: after all, many male engineering grads also don’t end up doing engineering too.

One of the ways for tech firms to get more sensitive about women engineers was an effort last year that started to count their actual makeup. Software developer Tracy Chou’s began a voluntary collection effort on GitHub to keep track of these numCkhbciiWgAAc_ypbers, and numerous firms have entered their workforce gender info on her project. Most firms have less than 20% women, but there are a couple of standouts. For example, Thoughtworks has 29% with 655 women engineers, and Wells Fargo has 24% with 1300 engineers. While not listed, I do know that Mastercard has lots of women in their workforce, and they had several of them (as shown above) attending the event.

Another way is to start recognizing how women can make an engineering staff better, just by their presence. The women managers on the panel spoke about how it wasn’t their coding prowess but their ability to collaborate with others and form strong teams to get projects done. They came from companies such as Express Scripts, EMC and Monsanto. All held management titles and some of them have been around for 15 or 20 years in various engineering positions.

One speaker gave three suggestions for women to succeed in tech. “Try everything to see what you like, when in school take at least one business and engineering class, and just remember that it’s never too late to get more technical education or experience.” All are great ideas.

Ironically, Pivotal themselves isn’t the best example. While Cornelia Davis, their CTO, gave an excellent talk at their event, if you go to their management page online you can see a page of all male faces there. But at least they recognize that it is time for a change, and allowed Davis and other staff members to participate in this event. Certainly, Pivotal isn’t alone: most tech companies, indeed most companies, have all male executive suites. Sadly, the glass ceiling is still firmly in place.

me at 63 worlds fairThen there is the movement called #ILookLikeAnEngineer on Twitter. Last year women engineers started posting their pictures with this hashtag. It is a great idea, because the more we all can see them and can realize that there is no singular “look” the better we all will be. Of course, I posted this picture from my childhood that fits the popular stereotype. (Once a nerd, always a nerd.) Those of you that are engineers, I encourage you to post your own selfie.

One of the goals for the event was to get young girls interested in engineering fields while they were still in high school, or even younger. The event was co-sponsored by CoderGirl, a local effort that holds weekly coding meetups to help teach women and girls programming concepts. I spoke to several of the girls at the event who were considering going in this direction, and they all felt encouraged by what they heard from the professional presenters. One girl asked whether she could actually cut it in engineering, given that she wasn’t very good in math. The answer was most definitely yes: Tammy Hawkins, who went on at Mastercard to invent the “Selfie Pay” authentication app, told us that she too wasn’t a math whiz, and managed to just barely pass her last college math course. “But that was fine, because there are always people who can help you who know more,” she said.

That is actually an important point. Many of us – men and women alike – don’t often apply for a job because we don’t think we have the self-confidence or skills required. Programming is a very collaborative culture, and these days teams of programmers work together on solving problems and producing code. You aren’t always going to be the smartest person in the room.

It is time that all companies adapt to a more diverse workforce if they want to succeed. And we need to be on the leading edge in tech. It is time to fix this.

The Fast Track blog: How Can a Non-Programmer Learn to Build Business Applications?

Last month’s Wired magazine featured a cover story entitled, “The End of Code.” Its thesis is that machine learning and neural networks will eventually obviate the need for programmers to write code. While it is an interesting thought, we are far from that situation actually happening anytime soon. Rather than seeing the end of coding, I think we are just at the beginning of a new era where coding and business-led app building is becoming more plentiful and exploding. This is the era of the citizen developer who has to carry the water for the rest of the world.

The issue isn’t whether any of us will or won’t code, but how we can do a better job with the coding tools and low-code platforms that we have at our disposal. My Fast Track blog post today talks more about these issues.

Network World 9-vendor multifactor authentication roundup

Due to numerous exploits that have defeated two-factor authentication, many IT departments now want more than a second factor to protect their most sensitive logins and assets. The market has evolved toward what is now being called multi-factor authentication or MFA, featuring new types of tokens and authentication methods.

For this review in Network World, we looked at nine products, five that were included in our 2013 review, and four newcomers. Our returning vendors are RSA’s Authentication manager, SafeNet’s Authentication Service (which has been acquired by Gemalto), Symantec VIP, Vasco Identikey Authorization Server, and TextPower’s SnapID app. Our first-timers are NokNok Labs S3 Authentication Suite (pictured above), PistolStar PortalGuard, Yubico’s Yubikey and Voice Biometrics Group Verification Services Platform.

All of these products are worthy of inclusion in this review as representative of where the MFA market is heading. In addition, if you want to stay on top of MFA developments, we recommend you follow our Twitter list here.

My review also features a collection of screencaps here, and an overall trends rundown as well here.

 

Quickbase blog: How citizen developers can manage their own apps better

In the Quickbase blog The Fast Track, many others have written extensively about the rise of the citizen developer movement, whereby everyone can become a developer because of the widespread availability of rapid app development tools. IT professionals have been trained how to manage their app portfolios, and there is no secret to doing this. In this post, I suggest some ways to start thinking about how you can manage and build more capable apps on your own. Building the app is just the beginning of a lengthy process. More on this idea here.

Fast and furious under the sea

 

When the Internet was first getting used by ordinary commercial businesses back in the early 1990s, those businesses didn’t own any of the underlying infrastructure besides their own connection to the nearest peering point. My how times have changed. This week, Microsoft and Facebook announced they are building the next transatlantic cable to exclusively carry their own Internet traffic between their American and European data centers.

When you think about this, it isn’t that surprising. After all, it represents the next step in the evolution of how private companies have built their computing systems on top of the public Internet. It isn’t the first such private cable: Google has been partnering with telcos for years to share their bandwidth, and a new connection from the US to Japan went online earlier this year. Facebook (and others) are even building their own servers, routers and racks out of specialized spare parts, since they need so many of them to run their online businesses.

Another result of this is how many businesses are running without any data centers at all, using private clouds and co-locating their servers at peering points. What used to be all about the connection to the Internet is now about owning the entire stack, down under the sea if you are big enough to afford it.

Certainly, the cost of Internet bandwidth has plummeted in the 25 or so years that a business could buy it. In the early 1990s, if your business was big enough, you purchased a T-1 digital line that topped out at the then amazing speed of 1.5 Mb/s. If you had a lot of demand, you could get a T-3 line that was 30 times as fast.

Of course, when you tell folks today about these early speeds, they look at you strangely and start thinking you date back to the days when there were payphones with actual dials. Given that today the worst DSL speed you can get from your local phone company still gives you a better connection than that old T-1 line it is pretty amazing how fast and far we have come. Today a cable Internet connection can deliver at least 10 Gb/s rates (at least in the download direction). Google and other fiber providers are talking about 100 and 1000 GB/s speeds in both directions, and there are cities (such as Chattanooga) where you can get a gigabit connection at every address. These places have realized that supplying a ultra-fast Internet is an essential part of their municipal services, just like supplying water and staffing the fire and police departments.

And that Microsoft/Facebook undersea cable? It will start out carrying 160 Tb/s, which is at least twice as fast as older cables. I can’t even think at those speeds.

iBoss blog: When geolocation goes south

 

What do a Kansas farm and a seaside McMansion have in common? Both have been discovered as the result of various geolocation-programming errors over the past several years.

Certainly the use of global positioning system (GPS) chips now built-in to tablets and smartphones is mostly a benefit when it comes to navigating to a meeting spot or finding a nearby gas station or restaurant. But the ubiquity of GPS tech also has its downsides too.

Take the case of that Kansas pasture. For more than a decade, the owners of a small family farm outside of Wichita started getting regular visitors and calls thinking their farmhouse were the center of criminal activity or digital abuse. The reason had to do with a deliberate rounding error of their latitude and longitude for the center of the continental US. And thanks to software that matches up IP addresses with a location, their farm was showing up on thousands of records, including the default location for scammers and other questionable situations.

“The harassment continued to the point where the local sheriff had to intervene. He placed a sign at the end of their driveway warning people to stay away from the house and to call him with questions,” according to the post. Sadly, that didn’t help. One irate visitor even dumped a defective toilet on their driveway in frustration.

Others around the country have suffered a similar fate, such as a man in Ashburn Virginia whose home has been attached to millions of IP addresses from the Internet service providers who are located in nearby data centers. Think of them as “living in an IP flood zone” as the above article calls these geolocation disasters.

However, there certainly are other unintended consequences.One report ties the tracking bracelet that was worn by noted cartel boss El Chapo as the way his confederates helped locate the escape tunnel they dug to come out precisely inside his cell. And an ISIS fighter found out too late that his Tweets were being geo-tagged, broadcasting his whereabouts. In another case, a divorce lawyer monitored the social media of his client’s Gen Y children to geolocate properties that weren’t mentioned in the original filings. “We were able to go to the court with a list of assets that we conservatively estimated at $60 million, which the court then seized.”

Even if you don’t geotag your social media posts, there are still ways to figure out where you live, according to this academic research paper published last year. The scientists examined their friends’ geolocations and were able to estimate the target within a few miles.

So what can you do to prevent this? First, understand the accuracy limitations of any enterprise-level geolocation technology that you use. Actual mileage, as the saying goes, can vary. Although geolocation technology has been around for more than a decade, it isn’t as precise a location down to a particular household or street address. Facebook’s “safety check” warnings that its users might be inside a disaster zone turned out initially to not be very accurate, after people around the world were warned they might be near a bombing in Pakistan. Hopefully, the alert location algorithms have been improved since then.

Second, examine the developer tools that are available to employ geolocation and understand what apps you are trying to build. Look at what Google and Facebook are doing in this field and how you can tie into existing mapping efforts from these giant software vendors.

Finally, examine the settings for any corporate-owned phones and tablets and make sure you turn the geolocation features off if this is a concern.

The Science of Growth is an essential startup guidebook

Oh no, not another startup business strategy book! But Sean Ammirati’s debut, The Science of Growth, is a meaty and useful manual for any entrepreneur that is looking to grow their business and learn from the mistakes and triumphs of the past. Ammirati and I worked together several years ago at ReadWrite.com, and now he is a Pittsburgh-based VC and business professor at Carnegie Mellon University. He offers plenty of wisdom here.

Many business books don’t have much to say after you have read their first chapter. The Science of Growth has a lot of useful takeaways, including exploding the myths of the first mover and always having a big launch event. He also explains why the best technology or getting the most VC funding doesn’t always make a company successful.

The book takes pairs of companies and looks at why Facebook, Google and McDonalds succeeded while Friendster, Yahoo and White Castle didn’t. Ammirati delves into four key prerequisites for growing your business: the founders should share a core vision, the basic idea should be scalable, it should solve a real problem and provide a solid first interaction. He then compares a set of ten paired companies to show how they differ.

For example, Facebook was later to the market and took longer to grow its first million customers than Friendster but had a more focused approach and created a better initial experience for its customers. McDonald borrowed money to finance its growth while White Castle didn’t. Google had a clean home page while Yahoo’s was cluttered with categories. WordPress was easier to install than Movable Type to get started with blogging. And so forth.

The book catalogs some major movements that were critical to companies’ growth. Twitter is largely credited with launching at the 2007 SXSW show, but it used clever marketing to bring attention to its then seven-month old product by paying for video monitors that it placed in the hallways to attract conference goers. Airbnb got a boost when Denver residents listed their spare rooms for Democrats who wanted to come there to hear Obama’s 2008 convention speech. WordPress took advantage of the moment in 2004 when Movable Type started charging for its blogging software.

For those who want to learn from the mistakes of the past so their businesses can find future growth, this is essential reading.