AI is the Next Big Disruption


A major part of the “digital revolution” revolves around the consumerization and digitization of our lives. This includes a variety of industries like healthcare, education, government, and corporate. Now, there are numbers and trends that clearly indicate growth around cloud, virtualization, user mobility, and much more.

However, at the core of our digital world is the heart of this discussion: data. Driven by the Internet of Things, the total amount of data created (and not necessarily stored) by any device will reach 600 ZB per year by 2020, up from 145 ZB per year in 2015, according to the Cisco Cloud Index. Data created is two orders of magnitude higher than data stored.

This data that’s being created isn’t benign. It carries vary valuable pieces of information around users, products, services, and even the business. The big question becomes – how do you actually mine this data and get value out of it?

Before we dive further into the topic, it’s very critical to understand that many organizations and partners are already looking at ways to bring artificial intelligence (AI) further into the market.

“Intelligent applications based on cognitive computing, artificial intelligence, and deep learning are the next wave of technology transforming how consumers and enterprises work, learn, and play,” said David Schubmehl, research director, Cognitive Systems and Content Analytics at IDC. “These applications are being developed and implemented on cognitive/AI software platforms that offer the tools and capabilities to provide predictions, recommendations, and intelligent assistance through the use of cognitive systems, machine learning, and artificial intelligence. Cognitive/AI systems are quickly becoming a key part of IT infrastructure and all enterprises need to understand and plan for the adoption and use of these technologies in their organizations.”

IDC said that widespread adoption of cognitive systems and artificial intelligence (AI) across a broad range of industries will drive worldwide revenues from nearly $8.0 billion in 2016 to more than $47 billion in 2020.

Here’s the big point to understand – deploying and implementing intelligent systems that learn, adapt and potentially act autonomously will become the primary battleground for technology vendors and services partners through at least 2020. These technologies will aim to specifically replace legacy IT and business processes where functions were simply executed as predefined instructions. These machines will contextually adapt and help make powerful business as well as IT decisions

To that extent – here are some big AI disruptions to be aware of:

  • Applied Artificial Intelligence and Machine Learning. Think of these technologies as AI platforms which process data and help make decisions way beyond simple, rule-based, data processing algorithms. Rather, they can learn, adapt, predict, and – in some cases – operate without any human interaction at al. Applied AI revolves around everything from self-driving cars to consumer electronics. For example, an AI company called IPSoft has an engine called “Amelia” who can basically be considered your very own digital employee. IPSoft acts as a learning engine which learns your business leverages key data points and can understand processes. From there, you can deploy Amelia as a cognitive agent capable of taking on the role of a service desk assistant, customer service associate, and even patient entry assistant.
  • Smart Apps Interacting with Data. What if your apps could help prioritize specific functions for you based on conditions of the market, the customer, and even your business? What if, based on a conversation, your app could go back and find the important tasks which need to be accomplished based on that conversation? Smarter applications will leverage data to help transform the way we conduct day-to-day business. Moving forward, almost every application dealing with data will have a machine learning aspect to it.
  • Intelligence and User Augmentation. AI and smart systems will allow users to “double” up on what they’re trying to accomplish. Most of all, we’ll be able to integrate with wearable technologies, various business functions, and even create and orchestrated the flow of information based on very specific use-cases. Leveraging AI and machine learning will allow users to function at a much higher level, bringing, even more, value to their business. This is NOT user replacement… rather it’s augmenting their capabilities and improving all of the processes surrounding their digital work (and home) life.
  • AI-Driven Security. This part is really cool. AI-driven security architectures will mesh together IoT, virtual technologies, user behavior, cloud analytics, and so much more. There will be a major need for smarter security systems as we merge into a much more complex, and interconnected, the world. These types of systems will be able to monitor contextual points around users, devices, the flow of information, and much more to create intelligent security architectures.

Data-driven solutions will continue to bring value to users, the services they consume, and how business perform various functions. It’s important to remember that these systems aren’t here to “replace” us. Rather, if you embrace AI technology right it will help you bring so much more value to your job and even your organization.

Machine learning and AI systems will help augment functions, help us make better, well-informed decisions, and allow us to focus on growing the business and creating better services. Working with data will absolutely be in our future. Take the time to understand where your data plays a role with your business, users, and the solutions you bring to market. AI may very well be in your future to help you break out of a legacy shell and transform into a digital entity.

Securing your Windows systems from WannaCry Ransomware


It was on May 12th, 2017 that the World saw the biggest ever cyber attack, the WannaCry, in the history of Internet.


What is Ransomware?

A cyber attack that involves hackers gaining control of a computer system, tablet or smartphone and then demands a ransom to unlock it.

To gain access to the system, the cyber criminal needs to download a type of malicious software onto a device within the network, which is often done by getting a victim to click on a link or download it by mistake. Once the software evades the computer, it encrypts the files and shows a pop up with a countdown and instructions on how to pay the ransom to decrypt and get back the original files.

Payment is only accepted in Bitcoin. The hacker demands a payment of around $300 in Bitcoin within three days or $600 within seven days. If not paid, the hacker threatens the user of the system to wipe off all his data forever.

The Classes

Encryptors, making use of advanced encryption algorithms, block system files and demand payment for the decryption key for decrypting the blocked content, namely Crypto Locker, Locky, CrytpoWall.

Lockers, in turn locks the operating environment of the victim thus making it impossible to access the desktop and any apps or files, The files are actually not encrypted in this case but the invaders demand ransoms for unblocking of the compromised system, namely Winlocker.

How do ransomware infections happen?

Though the infection phases differs on each ransomware attack, the important stages are of the following:

The victim may receive an email containing a malicious URL. It is also possible for the infection to originate from a defamatory website. When the victims click/download the link and open the attachment, a downloader gets placed on the system. This employs a list of domains or C&C servers, administered by cyber criminals to download the ransomware bug on to the machine. This malware encrypts the entire hard drive contents, personal documents as well as any sensitive information that includes data stored in Cloud accounts synced on your system. It also encrypts data on other machines within the local network.

A warning then pops up with the necessary information on how to decrypt the files.


The Wannacry Attack

On Friday, May 12, 2017, a Ransomware attack was initiated spreading WannaCry around the world. It took the advantage of a vulnerability in Microsoft’s Windows that allowed it to infect system’s without the victims taking any action. It was estimated that until May 24, 2017, the infection has affected over 200,000 systems in over 150 countries and it keeps on going.

The program which was deployed naming “WannaCry”, which asks for a minimum price about $300 but the more late you are to pay, the more the price increases. This took advantage of a loophole in Windows, which was unearthed by the U.S. National Security Agency(NSA) & later exposed to the world by hackers.

Who’s most vulnerable?

WannaCry ransomware targets Microsoft’s widely used Windows operating systems. PC’s with Windows OS that are not running updated software are the most at risk. All versions of Windows before Windows 10 are vulnerable to this attack if not patched for MS-17-010.

Ransomware gets into your computer, either by clicking or downloading malicious files. The malware then spreads quickly through file-sharing systems. It is also able to spread itself in a network by making use of a vulnerability in the Windows Server Message Block(SMB).

How does WannaCry work?

Wannacry makes use of ETERNALBLUE exploit, that takes advantage of the loophole in Microsoft’s Server Message Block protocol, it will spread onto any connected systems that has not been updated to guard against ETERNALBLUE. Once it gets infected, it encrypts image, database, office, email files and movies, and demands a ransom. It also installs DoublePulsar, a backdoor implant tool.

How to be safe?

The first and foremost thing is to make your Windows system up-to-date. For that, go to Start menu > type “Windows update” into the text prompt > select Windows Update from the results. Then, follow the instructions provided on the screen to get the system updated.

For disinfection, Microsoft has already released patches for Windows XP and Windows 8 operating systems. You just need to choose the correct link for your version of Windows XP or Windows 8. If you are unsure about this, go to Start menu >> Control Panel >> System. Then page will appear showing the details of your machine and its Operating System.

Preventive Steps

Steps to get secured from upcoming Ransomware attacks:

Locally, on the PC:

1. Do not store important data only on your PC.

2. Having 2 backups of data: one on an external hard drive and one in the Cloud.

3. Do not turn on applications like OneDrive, Dropbox, Google Drive etc on your system by default. Open them only once a day for data syncing and close as soon as this is done.

4. Update the operating system and the software, including the latest security updates.

5. Do not use the administrator account on the computer, instead use a guest account with limited privileges.

6. SMB will be enabled by default on Windows systems. Disable this service on the system from Settings >> uncheck the settings >> Click OK

7. Install a good anti-ransomware software on your machine for better security.

The Wannacry attack was put to cease by an information-security professional while analyzing the web address in the code. It was unearthed that the address used to send the message was unregistered which upon registering suddenly stopped infecting machines.

Online behavior

– Ignore open spam emails or emails from unknown senders.

– Do not download attachments from spam or suspicious emails.

– Do not click on the links in spam emails.

Anti-ransomware security tools

  • Making use of a reliable, antivirus program that features an automatic update module and a real-time scanner.
  • Understand the importance of having a traffic-filtering solution that provides proactive anti-ransomware protection.

Now we know that there is a handful of easy to do things that we can do to avoid Wannacry ransomware.


Cyber criminals have a strong impact over your data and security as you give them. So stay safe and don’t forget, the best preventive measure is always a backup!!

EasyApache 3 to EasyApache 4 Migration Process


EasyApache 3 to EasyApache 4 Migration Process


Easy Apache version 4 introduced by cPanel version 11.52. EasyApache web-based Graphical User Interface helps to configure all the back-end activities. Easy Apache Graphic tool allows you to enable multiple PHP extensions and multi-processing modules. The new user interface allows you to change Apache handlers for the installed PHP versions. We can install a default version of PHP in the server and per host basis.

Continue reading…

How AI and Cognitive Systems Will Impact Your Business and Your Cloud


It’s time to take a quick look into the not-so-distant future. New technologies around cognitive systems and artificial intelligence (AI) are already impacting organizations in a variety of industries. According to IDC, widespread adoption of cognitive systems and AI across a broad range of industries will drive worldwide revenues from nearly $8.0 billion in 2016 to more than $47 billion in 2020.

“Software developers and end user organizations have already begun the process of embedding and deploying cognitive/artificial intelligence into almost every kind of enterprise application or process,” David Schubmehl, research director, Cognitive Systems and Content Analytics at IDC said in a statement. “Recent announcements by several large technology vendors and the booming venture capital market for AI startups illustrate the need for organizations to be planning and undertaking strategies that incorporate these wide-ranging technologies. Identifying, understanding, and acting on the use cases, technologies, and growth opportunities for cognitive/AI systems will be a differentiating factor for most enterprises and the digital disruption caused by these technologies will be significant.” Continue reading…