Door Dash

DoorDash reveals details of its new tipping model

DoorDash announced last month that it would be changing its controversial tipping model. Today it’s revealing the basics of how the new system will work. Under the past model, Dashers (DoorDash drivers and other delivery people) were guaranteed a minimum payment per delivery, with DoorDash
/
AWS

AWS IoT Core Adds the Ability to Configure Quality of Service (QoS) for Republish Action

Starting today, AWS IoT Core customers can configure the quality of service (QoS) when publishing messages via the republish action of a topic rule. AWS IoT Core supports QoS levels 0 and 1 for MQTT messages, where QoS 0 means a message is delivered zero
/

Skills for faster innovation in financial services

Banks and insurance companies are going through a lot of changes. Read on to see my thinking on how to facilitate that change if you are working in financial services.

Pathways to innovation

There are two major pathways to innovation in financial services, and they are not exclusive.

One is by employing cloud infrastructure (either public or private), so that the speed of software development can increase. The other is by using, incorporating, integrating, or even buying FinTech companies. More often than not, these FinTech companies have all the characteristics of SaaS providers.

Both pathways involve external IT providers. And as the financial services sector is heavily regulated, proper risk management is not an option but mandatory. This impacts both of these innovation pathways. Governance and risk assessment is therefore on the critical path of innovation. By the way, banks cannot avoid taking risks.

Research tells us that the average company has hundreds, if not thousands, of cloud applications. Let’s have a look at how that impacts the risk assessment volume.

Suppose, just for the sake of argument, that there are 730 cloud applications in the company. Imagine that you have to review each of these every 2 years. That means that you have to review one cloud application every single calendar day of the year. And what is more, you want a lot of people to review each of them: legal, procurement, IT, audit, compliance, and so on. That is significant work.

How are you going to do that? And do all cloud contracts need the same level of scrutiny? And who is going to decide on that?

You need to develop a process

You need an effective and efficient process to review cloud usage. But there is no single process that works for all projects across all companies. One project works on sensitive data. Another project does not. One project understands security very well. Another less so. One organisation has a culture of central policies, another hasn’t. It all impacts how the adoption process is best done.

I believe that any process improvement needs to be driven by the people who are running that process. They probably need some assistance, and they definitely need an understanding of what is changing.

Team skills

When it comes to cloud adoption, I find that there are a number of specific skills that are required of almost every person in the cloud adoption and evaluation process. These include: figuring out what exactly is the (cloud)service, how it depends on other services, who is responsible for which part of which service, articulating cloud business cases, and a few more things.

When a team has these skills, they will be in a much better position to understand what the contribution of each team member is. And that will lead to swifter and more efficient secure cloud adoption. In the end, that drives innovation.

By Peter HJ van Eijk

Peter HJ van Eijk

Peter HJ van Eijk develops and delivers cloud computing training programs. He has delivered these programs dozens of times in the US, Europe, Middle-East and Asia to a wide variety of participants.

He has worked for Deloitte Consulting, IT supplier EDS, internet providers, and at the University of Twente, where he received his PhD in 1988. He is a board member of the Dutch Cloud Security Alliance Chapter.

Peter is a certified trainer for CSA Certificate of Cloud Security Knowledge (CCSK), CompTIA Cloud Essentials, Virtualization Essentials and Cloud Technology Associate. He wrote these courses or contributed to them.

Edge computing allows businesses to take advantage of the growing computing power of edge devices such as mobile gadgets, IoT devices and industrial robots.

Edge Computing Replaces Public Clouds in Multiple Use Case Scenarios

Edge Computing Market The edge computing market in the United States is forecast to have revenues of over $1 billion by 2025, with manufacturing being ...
Security infographic

Survey: 87% of Businesses Are Confident About Cybersecurity

Businesses Confident About Cybersecurity In a year that has seen multiple massive data breaches and troubling cyberattacks, a new survey reveals 87 percent of businesses ...
10 Prototyping Tools To Help Build Your Startup

10 Prototyping Tools To Help Build Your Startup

Prototyping Tools We are continuing this week by focusing on startup tools, tips and tweaks that will help you build, design, manage and market your ...
Rise Ransomware

The Rise of Ransomware

Ransomware IT security company KnowBe4 has issued a warning regarding a new strain of ransomware called VirRansom, which “utilizes both ransomware and parasitic virus features," ...
AWS

AWS IoT Core Adds the Ability to Configure Quality of Service (QoS) for Republish Action

/
Starting today, AWS IoT Core customers can configure the quality of service (QoS) when publishing messages via the republish action of a topic rule. AWS IoT Core supports QoS levels ...
ARS

How malformed packets caused CenturyLink’s 37-hour, nationwide outage

/
CenturyLink's nationwide, 37-hour outage in December 2018 disrupted 911 service for millions of Americans and prevented completion of at least 886 calls to 911, a new Federal Communications Commission report ...
Reuters news

China cries foul over Facebook, Twitter block of fake accounts

/
BEIJING (Reuters) - China said on Tuesday it had a right to put out its own views after Twitter and Facebook said they had dismantled a state-backed social media campaign ...