September 10, 2016

How GIS is Helping Electric Cars on the Road

The use of GIS is becoming of paramount importance in creating infrastructure for electric cars to become more feasible for more people traveling on road. For one, unlike normal vehicles, simply mapping the shortest or fastest route to a destination might not be feasible for an electric car, as it may need to recharge along the way. Powering stations often need to be incorporated into the calculation, including those that are available and can charge relatively quickly. This make the use of real time data about given powering points, traffic patterns, and road conditions critical. ArcGIS provides some free data on charging stations that help navigate areas. The University of California Davis created an application called EV Explorer that allows you to map your journey using information about charging points and costs of charging in planning a journey.

What would a blockchain world look like?

One reason the blockchain reaction is racing toward critical mass faster than previous disruptive technologies is that it is arriving in the midst of the digital transformation already sweeping through most sectors of the global economy. Consequently, despite the obstacles still to be overcome, businesspeople and governments are preconditioned to recognize blockchain’s potential and tech companies have already established much of the digital infrastructure required to realize blockchain business visions. Early pilots are already underway in many industries. They tend to focus on blockchain uses that drive cost out of business processes by making transactions more efficient.

SWIFT report examines Bitcoin as a currency

“This would create a new dynamic in the global monetary order, one in which central banks would struggle to implement monetary policy,” Wilkins said, “And, central banks couldn’t act as lenders of last resort as they do for their own currencies.” The Bank of Canada has since researched digital currencies extensively. ... Author Warren E. Weber states “it is unlikely that the Bitcoin standard will come into existence, because governments and central banks will take actions to prevent it.” A similar sentiment was expressed by JPMorgan Chase CEO, Jamie Dimon, in November 2015. “Virtual currency, where it’s called a bitcoin versus a U.S. dollar, that’s going to be stopped,” Dimon predicted. “No government will ever support a virtual currency that goes around borders and doesn’t have the same controls. It’s not going to happen.”

Winning the cyber war with AI and cognitive computing

There are some exciting developments in cognitive computing from both start-ups and industry leaders such as IBM with its IBM Watson solution. I believe we are already seeing some of these trends showing positive results with new security products hitting the market that find anomalies in unstructured data. However, I don’t see these results as a cyber silver bullet. One problem that we are going to have to overcome is that the bad guys may already (or will) have access to some of the same (or different) tool sets that use AI and cognitive computing. I have told several young audiences to remember that Darth Vader was well trained. In other words, the same technology can be used for good and for evil. Putting controls on use of this technology may be effective for a time, but they can also lead to other problems.

The Evolution of Digital Marketing In The Enterprise

Today’s digital marketing executive brings much needed focus, rigor, and strategic optimization of existing content across all channels, producing stronger outcomes and the ability to scale resources while amplifying organizational marketing efforts. It is key to increase the entire marketing team’s focus, intelligence, and internal influence while successfully advocating for digital resources to build and enhance highly skilled teams. With a strong digital marketing executive leading the digital efforts, digital marketing is positioned as an ideation hub within the business unit, driving execution of digital tactics and marketing solutions against the backdrop of corporate strategy proficiency. Supported properly, the digital team can and should deliver tactical execution of email marketing, website updates and builds, social media, SEM/SEO, video, design, and user experience

8 Vital Steps to Data-driven Operations in Your Business

While many businesses start by using data to inform their decision making, data can also go a step further and integrate into your daily business operations and help you run the business more smoothly. This aspect of big data is less about people making better decisions and more about using systems and algorithms that automate and improve processes. Whether you want to improve your manufacturing process by automatically identifying faults, optimizing delivery routes, targeting the right customers, or detecting fraud, data can help. Here I set out an eight-step process for changing the way you run your business using big data.

Ecosystem of Cloud Services for Enterprise App Development

Applications have not historically been designed to leverage third party cloud services. With the rise of cloud platforms like AWS, Azure, Bluemix, and others, has come new ways of managing and deploying applications in the cloud. The floodgates are open, and best of breed services are emerging to complement or supplement the capabilities of these cloud platforms. The Box Content API is one of many such emerging cloud services, and with this article we’ll deep dive into some of the other strategic cloud services you should be thinking of for your modern IT stack. This ecosystem diagram is not meant to be exhaustive or exclusive, it is a point in time view of the world from our vantage point with our Box customer base. We are often asked by CIOs and CTOs at our customers what we see as the landscape that Box fits into, and this is an attempt to answer those questions:

Cloud plus artificial intelligence = future

Technology around us will provide an “augmented intelligence” that will help humans to make smarter decisions, improve business models and solve problems that were previously intractable. “The ways in which we are able to interact with computers is going to make people a lot more efficient and more effective, and build digital models.” This, says Richard Paris, senior data scientist at KPMG New Zealand, is the future of digital. We are increasingly seeing the digital world interact in our everyday lives, says Paris, who spoke at the inaugural KPMG Technology Series in Auckland. People interact with smartphones and these devices are becoming our intelligent assistants. “We are moving into the Internet of Things (IoT),” he adds. “We are surrounded by devices getting data from us, so we interact with them.”

Vietnam’s Cyber Security Law Threatens Privacy Rights and Encryption

The third chapter of the law deals with ‘civil cryptography’ (the storing, sending and receiving of encrypted messages). From a rights perspective, this chapter and the subsequent July 2016Decree on Civil Cryptography is greatly concerning. Encryption tools and services are now divided into two overarching categories – those that require a license and those that can be freely distributed without a license. Widely used free chat services like WhatsApp, which employ end-to-end encryption, should not require a license: “Operating systems, Internet browsers and software with integrated cryptographic components (though cryptographic protection of information is not the primary function), which are used on a grand scale and developed to be installed by users without providers’ help” are exempted.

Fraudsters, hackers & thieves!

Financial information such as credit card numbers are still coveted information, although their per-card value is going down and their shelf life is short since credit card companies and credit card owners are using technology to shut down fraudulent transactions quickly. Instead, the new sought-after information is information from insurance, government and healthcare organisations that is being targeted.  The more details someone has about an individual, the easier it is to commit identity fraud, and targeting these groups provides more complete profiles of individuals to criminals. Real names are still the most common (78%) type of information exposed, according to the ISTR, followed by home addresses, birth dates, Government IDs (such as social security numbers), medical records, and financial information.

Quote for the day:

"In order to succeed in anything you have to do even the hard things when you don’t want to." -- Elizabeth McCormick

No comments:

Post a Comment