Archive for January 25th, 2017

Leadership – Problem Solving improved by asking right questions

John Maxwell reflects on the need to focus on problems by asking the right questions, which focus on the root cause analysis process

When problem-solving, it’s so easy to fall into the rut of uncreative thinking. We can focus so much on answers and solutions that we lose sight of the question. And if we’re asking the wrong questions, we’ll often end up with the wrong answers.

How creative is your thinking? When faced with a problem, do you immediately turn to the tried-and-true solutions that you’ve always used? Or do you open your mind to new ideas?

A good way to do that is to start asking some right questions, like these:

*   Why must it be done this way?
*   What is the root problem?
*   What are the underlying issues?
*   What does this remind me of?
*   What is the opposite?
*   What metaphor or symbol helps to explain it?
*   Why is it important?
*   What’s the hardest or most expensive way to do it?
*   Who has a different perspective on this?
*   What happens if we don’t do it at all?

Google – Blocked 1.7 billion fake ads in 2016

Google employed automation and human effort in removing over 1.7 billion ‘bad ads’ in 2016 and banned 200 publishers.  This was over twice the volume of 2015 and illustrates the need for users to constantly keep safety in mind, as they use web resources.

Google purged itself of 1.7 billion bad ads last year – more than double the number it axed in 2015 – a fact which belies a problem set to swell unless more advertisers refuse to turn a blind eye to inflated numbers caused by ad fraud. The online behemoth’s latest update on its own efforts to curb ad fraud highlights the scale of a problem; for all Google’s efforts last year, is blocking a greater volume of ads just a consequence of there being more bad ads in the first place?

Expanded policies, better detection and sharper internal expertise investments in 2016 suggest it’s a conundrum not lost on the advertising business as the industry starts to understand its own involvement in ad fraud.  “While we took down more bad ads in 2016 than ever before, the battle doesn’t end here,” continued Spencer. “As we invest in better detection, the scammers invest in more elaborate attempts to trick our systems. Continuing to find and fight them is essential for creating a sustainable, open web from which we all enjoy.”

To stress the point, Google pointed out that over 1,300 accounts were suspended last year for attempting to game its system by pretending to be news, a trick known as “tabloid cloaking”.  Any quality ad tech platform will have multiple layers of defence in place in the form of both human and technology review systems that work to eliminate bad ads.

PC Operating Systems – History of 64 bit computing

This interesting article by PC Magazine discusses the history and evolution of computing from 32 bit to 64 bit addressability.

Keep going exponentially and you eventually get 32-bit (2 to the 32nd power) worth 4,294,967,296; 64-bit (or 2 to the 64th power) is worth 18,446,744,073,709,551,616 values.  That’s a lot of bits, and the numbers show just how much more powerful a chip that supports higher bit computing can be. It’s a lot more than double. That’s because every few years, the chips inside the computers (even smartphones) and the software running on those chips make leaps forward in supporting a new number. For example:

*  The Intel 8080 chip in the 1970s supported 8-bit computing.
*  Windows 3.1 back in 1992 was the first 16-bit desktop version of Windows.
*  AMD shipped the first 64-bit desktop chip in 2003.
*  Apple made Mac OS X Snow Leopard entirely 64-bit in 2009.
*  The first smartphone with a 64-bit chip (Apple A7) was the iPhone 5s in 2014.

It’s pretty obvious: 64-bit, sometimes styled as x64, is capable of doing more than 32-bit (which is actually called x86, a term that stuck from when Windows Vista starting sticking 32-bit apps in a folder called “Program Files (x86),” x86 originally referring to any OS with the instruction set to work on Intel chips like 8086 through 80486).

These days, you are most likely already running 64-bit chips with 64-bit operating systems, which in turn run 64-bit apps (for mobile) or programs (on the desktop, to settle on some nomenclature). But not always. Windows 7, 8, 8.1, and 10 all came in 32-bit or 64-bit versions, for example. If you are running Windows on a computer less than 10 years old, your chip is almost guaranteed to be 64-bit, but you may have installed a 32-bit version of the OS. It’s easy enough to check.

Twitter – Star Wars BOTNET of 350,000 fake users

Security researchers have discovered an automated BOTNET of 350,000 fake users using a “Star Wars” theme as documented below.

UK analysts accidentally uncovered more than 350,000 bogus accounts used to fabricate follower numbers, send spam, and boost interest in trending topics.  Most people sign onto the social networking site to share thoughts, photos, and where to find the best hot dogs in New York City. But legions of automated accounts, or bots, can serve as political propaganda or facilitate trades on the black market.

In this case, 350,000 bots exclusively post random quotes from Star Wars novels—often with incomplete sentences or broken words at the beginning or end. This ensures messages appear as if they are written by real humans.

Despite Twitter’s regular efforts to remove suspicious users, these clever bots have flown under the radar since 2013 by acting differently from obviously automated accounts. Research suggests they tweet only a few times per day, don’t include URLs, never mention or reply to other users, and only follow a few “friends.”

“The Star Wars botnet provides a valuable source of ground truth data for research on Twitter bots.”  Researchers set out with the intention of better understanding how people use Twitter. But their observations led them to the dark side of social media.  “We were really lucky to discover the Star Wars bots by accident,” the research paper said.

Malware – Malicious Scalable Vector Graphics SVG image files

The ISC warns of malicious Scalable Vector Graphics (SVG) “image files” that are circulating in the wild.  While SVG files are rarely used, they can execute scripts and trick users into disclosing sensitive information or infected them malware. The SVG file extention is a good one to add to the email blocking list and to avoid if encountered when visiting websites

In November 2016, the Facebook messenger application was used to deliver malicious SVG files to people. SVG files (or “Scalable Vector Graphics”) are vector images that can be displayed in most modern browsers (natively or via a specific plugin). More precisely, Internet Explorer 9 supports the basic SVG feature sets and IE10 extended the support by adding SVG 1.1 support. In the Microsoft Windows operating system, SVG files are handled by Internet Explorer by default.

From a file format point of view, SVG files are XML-based and can be edited/viewed via your regular text editor. Amongst all the specifications of the SVG format, we can read this one in the W3C recommendations.  All aspects of an SVG document can be accessed and manipulated using scripts in a similar way to HTML. The default scripting language is ECMAScript (closely related to JavaScript) and there are defined Document Object Model (DOM) objects for every SVG element and attribute.

Windows 10 – Advanced Desktop Customization techniques

This Guiding Tech guide offers advanced desktop customization techniques for Windows 10

Windows 10 undeniably looks very cool. The minimalistic approach for the design has contributed to its success. The recent anniversary update has brought in some good customizations. But, you still don’t get enough options to customize it at the desktop level. Yes, you can get those fancy windows 7 gadgets and cool themes to revamp its look. But, they don’t fit well with Windows 10’s minimal design. So, here I’m going to show you how I customized my Windows 10 desktop that not only looks cool but also complements the minimal design of Windows 10.

What is Rainmeter?  — Rainmeter is a desktop customization tool through which you can create and apply various customizable skins to your desktop. Skins for hardware monitors, clock, weather forecast, RSS Feeds and more. If you don’t like picking specific skins and customizing them for your desktop or you don’t have enough time, go for the Rainmeter suites.  The Rainmeter suites are fully packed and customized skins based on a specific theme. This Star Wars-themed suite will give you a good overview.

How I Customized My Desktop — So, I wanted it to look minimal but informative at the same time. Hardware monitors, a date/time widget, to-do list and few customized desktop icons were all I wanted. I thought of an RSS feed reader but then it would take up more space, depleting the beauty of the background wallpaper. So decided to not have that.  Circle Launcher is what I used for Program Launchers. You can use the Polygon shaped buttons called Honeycomb if you want. Well, just installing them won’t make them work. You’ll have to set the target location of the program manually by editing the skin.

Background Wallpaper — The background wallpaper automatically changes based on the submissions on the Spaceporn subreddit. Space wallpapers mostly have darker backgrounds and they look cool at the same time. I achieved this by using a simple tool called Reddit Wallpaper Changer specifically developed for this task.