Visa to Deploy Blockchain Research Team in Bangalore, India
Considered the innovation hub of India, Bangalore, which was selected in November to host Visa’s technology center in that country, offers Visa the ability to attract world-class talent in a thriving community with world-class innovation centers and technology facilities. Other Indian technology companies, such as Tata Consultancy Services and Infosys, have invested in blockchain technology. In fact, almost a third of the work done by Indian IT firms is for global banks, and many global banks are trying to jump on the blockchain bandwagon before it’s too late. Visa itself, which outsources part of its technology development to Infosys and other Indian firms, said it is open to working with some of them on blockchain-related developments.Andrew Duguay, Prevedere on Economic Intelligence from Integrating Public Datasets
The sheer volume of analysis would have taken a detrimentally long time to do with traditional tools such as Excel or legacy statistical packages, making this a new and unique way of harnessing and finding analytical value in Big Data. Our patent pending software uniquely provides any company a competitive advantage. ... Prevedere is a gathering place for publicly available data that is structured, time series, and could possibly relate to businesses. Businesses are using Prevedere to see how their internal metrics are relating to common economic indicators such as Gross Domestic Product, Housing Starts, Consumer Sentiment, Disposable Personal Income and the Purchasing Managers Index.How Big Data is Driving the Consumerization of Health Care
In conjunction with mobility, big data is changing the way patients engage with their doctors and experience their treatment. Research has found that three out of five patients would choose telehealth visits over in-person appointments for minor check-ups and follow-ups. In PwC's survey, more than 50 percent of respondents would feel comfortable sending a digital photo of a rash or skin problem to a dermatologist for an opinion. Not only is the technology for "virtual treatment" available, but 64 percent of surveyed patients expressed their willingness to adopt new, non-traditional ways of seeking medical attention. In a world where services are available in an instant, doctors must start treating their patients as a customer to continue to meet their needs.3 Business Alignment Opportunities for CIOs
Most CIOs agree that they need to focus most intently on aligning with the line of business. “While CEOs can have a strategic plan, they do not operationalize it into strategic objectives. It filters down and becomes operationalized by the line of business.” However, CEOs and CIOs need to connect what IT is doing better to their business strategy. This is exciting because it is a new window of opportunity for the CIO to get IT’s priorities right and thereby, secure a better relationship with their CEO. This matters because the CIOs that I am talking to see a strong CEO relationship as being critical to having IT viewed as a strategic business unit.Bruce McConnell Interviewed by The Open Group
There’s also a reflection of the lack of trust between the major cyber powers these days. How do you build trust? You build trust by working together on easy projects first, and then working your way up to more difficult topics. EWI has been promoting conversations between governments about how to respond if there’s a server in one country that’s been captured by a bot and is attacking machines in another country. You have to say, ‘Could you take a look at that?’ But what are the procedures for reducing the impact of an incident in one country caused by malware coming from a server in of another country? This assumes, of course, that the country itself is not doing it deliberately. In a lot of these attacks people are spoofing servers so it looks like they’re coming from one place but it’s actually originating someplace else.Secure or not, IoT is everywhere. Get used to it.
One of the ways we can avoid IoT security paranoia -- in addition to standardizing on better authentication mechanisms is to move to the IPv6 stack for all IoT devices and to have IPSec be a requirement for device to device and device to cloud communication. And to use much stronger and longer encryption keys. This is really a necessity because we've effectively run out of IPv4 address space and device proliferation is going to make IPv6 a virtual requirement. But that means broadband and wireless service providers as well as consumer and carrier network equipment manufacturers and the IoT vendors need to get on board with this quickly. And yes, longer/stronger encryption keys for Wi-Fi networks as well as standardizing devices on the current WPA2+AES+CCMP implementation and using end-to end,Clearing Pathways for Entrepreneurial Innovation - Introduction
Disruptive, transformative innovation is by definition unchartered. Entrepreneurs who propagate revolutionary ideas have the power to reshape markets. This can unseat incumbents and have a short-term, negative impact on jobs. It is no surprise that policy-makers and regulators in many cases have an uneasy relationship with this kind of innovation. ... This report is part of a larger effort by the World Economic Forum to understand entrepreneurship and how policy-makers can best support it. The report focuses on disruptive entrepreneurs, due to their outsized impact on industry transformation and the current scarcity of an effective policy discourse regarding disruptive innovation.Biometric security: Authentication for a more secure IoT
Consumers are becoming more familiar with, and comfortable with, on-device biometrics. The latest Apple and Samsung mobile phones, as well as many new desktop and laptop computers, contain embedded biometric sensors. These devices also include a Trusted Platform Module, or Trusted Execution Environment, that handles the validation of biometric information separately from the device’s core operating system. This is an important distinction, as those core operating systems are susceptible to malware. When it comes to verifying identity, the IoT has another important distinction. When authenticating to a smart lock, or even a smart car it is important that authentication take place on the smart device rather than on the user’s end.Seven sins – 4: The Meaning Mistake
Once again, though, don’t laugh at other people’s mistakes, because the enterprise-architecture field is barely any better. If you ask for a standard definition of obviously-important terms such as process or service or capability – let alone enterprise or architecture – you’ll discover very quickly why the collective-noun for people in our trade is ‘an argument of architects’. It’s possible, with some care, to build definition-sets that are consistent within themselves for some aspects of architecture: but there’s still no consistency across the overall space at all – and, by the nature of what we’re dealing with, probably never will be, either.5 things only disruptors know about the future
There is no “common thread because disruption can come from different directions”, believes Bill Gurley, investor in Uber, Zillow and OpenTable. “Industries get disrupted for different reasons. Technology can disrupt an industry” but so can other things, as explained by Clay Christensen’s Innovator’s Dilemma. To identify opportunities for disruption Gurley proposes to ask, “Where does technology have the opportunity to materially change the user proposition or the user experience? There is so much venture capital available today that you’ll see “Uber for this, Uber for that” but I’m not a believer that every industry needs disruption. ...”Quote for the day:
"The quality of the company?s board has now become an important evaluation factor for institutional investors." -- Russel Reynolds
No comments:
Post a Comment