Daily Tech Digest - January 12, 2023

Agritech forces gain ground across Africa

One of the crucial issues that agriculture in Africa is currently solving, according to Gaddas, is a lack of water. He says that in Senegal, Tunisia and many other countries, companies are working hard on intelligent irrigation, and on how to optimize water resources that are becoming increasingly scarce, especially in the context of climate change and unpredictable rainfall. “Managing water is becoming crucial,” he says. “We’ve met start-ups that use drones, which, through their precision devices, help to collect data that can be used by farmers, such as the levels of nitrogen from the fields, precise mapping of areas with fertiliser deficits,and others that solve plant disease problems by making diagnoses. There are also ERP systems for farm management and to know what is happening in real time—the management of inputs, fertilizers and more.” He also appreciated the digital aquaculture companies that allow for very rational management of aquaculture farms, while praising the impressive diversity of solutions. “The diversity of problems that farmers face in Africa is very wide but creativity is not the weak point of Africans,” he says. 


Ushering in an era of pervasive intelligence, powered by 6G

The impact that this new era will have cannot be understated. It will power economies, drive sector convergence, enable the distributed infrastructure behind Web 3.0 and scale and interconnect metaverses. Put simply, it will transform all aspects of life. But getting there isn’t straightforward, and we need to act now to lay the foundations that are necessary if we are to harness its power. This on its own is not the most straightforward undertaking, as is evidenced by the issues with the 5G+ rollout and adoption. The right infrastructure and business models were not in place, which led to delays and innovative potential left on the table. Let’s learn from past mistakes, course correct and ensure we’re ready for the future of pervasive intelligence. ... Transformation into the pervasive intelligence era will first require the establishment of a high performance, integrated ecosystem made up of a range of partners from different industries and sectors. This is critical as pervasive intelligence will only be reached in an environment where data and information can move freely and securely. This, however, cannot happen if companies operate in silos or in isolation.


DeFi Labs Revolutionises Decentralized Finance by Leveraging AI

According to the co-founder of DeFiLabs, “With our AI-powered yield farm, we’re introducing a new level of innovation to the DeFi space. We’re making it possible for users of all levels to earn high returns on their investments, while also minimizing risk. Our goal is to provide our users with the best investment opportunities available in the DeFi space, and our AI-powered yield farm is just the beginning. We’re excited to see how our users will benefit from this new offering.” This launch is also a significant step for the Binance Smart Chain ecosystem, as it showcases the capabilities and the potential for growth of Binance Smart Chain. This yield farm will encourage the usage of the Binance Smart Chain and drive the adoption of DeFi on this network. The yield farm is live and fully operational, and users can start staking their Binance Coin (BNB) or other supported tokens to earn high returns on their investments. The DeFiLabs team is constantly working to add new features, tokens, and investment options to the yield farm, making it even more valuable for users.


The importance of collaboration in maximising cybersecurity

The CISO has a vital role within companies, and one which is currently evolving. Beyond technical knowledge, one of the most important aspects of the CISO’s role in an enterprise is collaboration. Information, security and data protection controls permeates all levels and departments of a company, not just limited to tech. As such, it is important to relay technical information succinctly to all relevant directors and parties, ensuring all teams are adequately equipped to manage cyber risks. There is a wide range of cybersecurity services that can be adopted. This includes perimeter and cloud security, device security, network security, threat hunting, DevSecOps, and web and mobile application security. To make them all function, and operate as tightly as possible, you must work with a team of experts, to ensure that your company is at the forefront of new advances in cybersecurity. The removal of silos is therefore integral to ensuring companies are prepared and equipped to defend themselves against cyber-attacks.


IT supply issues have organizations shifting from just-in-time to just-in-case buying

One thing more enterprises should be looking for is greater visibility from their suppliers. "A lot of people are realizing that we're living in a more transparent world now," said Genpact's Waite. And integration between companies has increased, with some providers offering more information to their customers. ... With this approach, vendors are selected not just based on technical fit, form, and function but also based on where in the world they source their materials, or how big of a company they are. Supply chain visibility is particularly important for manufacturers. They need to know if the supplies they need are on track, or if alternate sources have to be found in order to avoid production delays. "Our supply chain is built entirely on transparency," says Carl Nothnagel, COO at specialty hardware manufacturer MBX Systems. "With every supplier, we push for that information. Sometimes we don’t get it, and we’re left with projecting, or guessing as best as we can. We have some manufacturers that are very transparent and we can see where it's going to hit every day, and some are a bit of black hole."


6 Data Governance Principles Corporate Leaders Should Apply in 2023

The success of your data governance plan depends on what your employees do with the data they handle. Therefore, once you’ve created a data governance plan, you should share it with your employees. Successful data governance requires a holistic, organization-wide approach that demands transparency across your organization. You can further demonstrate internal transparency by documenting all data governance decisions and actions. This documentation can help you learn from past mistakes and protect your corporation if you experience a data breach, lawsuit, investigation, or other regulatory action. ... Responsibility and accountability are integral parts of any corporation’s data governance processes. Traditionally, your information technology (IT) department would be responsible for managing your corporation’s data. But now that most—if not all—of your employees deal with data on a daily basis, employees throughout your organization must see themselves as the stewards of your data. So, who is responsible for what data? That is something you will need to decide. 


Study shows attackers can use ChatGPT to significantly enhance phishing and BEC scams

The more complex and long a phishing message is, the more likely it is that attackers will make grammatical errors or include weird phrasing that careful readers will pick up on and become suspicious. With messages generated by ChatGPT, this line of defense that relies on user observation is easily defeated at least as far as the correctness of the text is concerned. Detecting that a message was written by an AI model is not impossible and researchers are already working on such tools. While these might work with current models and be useful in some scenarios, such as schools detecting AI-generated essays submitted by students, it's hard to see how they can be applied for email filtering because people are already using such models to write business emails and simplify their work. "The problem is that people will probably use these large language models to write benign content as well," WithSecure Intelligence Researcher Andy Patel tells CSO. ... Attackers can take it much further than writing simple phishing lures. They can generate entire email chains between different people to add credibility to their scam.


Insights on Nordic artificial intelligence strategies

The Nordics are generally early adopters of technology – and AI is no exception. More than 25% of the Nordic companies are already investing at least 20% of their research and development budget in AI projects. Moreover, the Nordic countries are planning to get ahead – or at least keep up with other industrial nations. Each of the four countries have at least one top-ranking AI-related educational institution – and private investment in AI has more than doubled in the region since 2021. ... Finnish AI research runs primarily along three different dimensions. The first is to optimise the performance of AI algorithms to head off the problem where computational requirements get too far ahead of what hardware can deliver. As a small country, Finland is particularly sensitive to the increasing costs of computational power – even though they house what is currently Europe’s most powerful supercomputer, LUMI. The second dimension is trustworthy AI. Ethics and values are important to Finland, as they are in all other Nordic countries. Research in trustworthy AI aims to overcome the complex ethical challenges inherent to AI.


Structured Data Management for Discovery and Insight

Polanco says the chief data officer, chief compliance officer, and CISO should collaborate on finding an effective structured data management practice that provides a well-governed, fully-compliant data architecture that connects data sources for data consumers. “Data must be findable, accessible, interoperable, and re-usable for [data] consumers, while also ensuring compliance with data quality standards and data security and privacy measures,” he adds. Anyone in a managerial position who encounters data will likely have considered best practices for data management already. “While those managers may be responsible for implementing data management resources for their respective teams, the initial solution can come from technology companies that weld together the manual knowledge of what the data needs to look like and the efficiency of a more automated sorting process,” Polanco says. Macosky adds that while the chief data officer position is fairly new across industries, he expects to see the role become more important and vital as organizations prioritize and value data management.


How to Measure the Energy Consumption of Bugs

It is very important to always have the underlying architecture and communication to all the connected services in mind. Often it may seem that a bug does not affect energy consumption at first sight. This impression can quickly change when the broader context of the feature where it occurs is taken into account. A QA engineer needs to understand communication between the services, how it is implemented (in collaboration with the developers), when it takes place, where it initiated, and where the services and features run. In practice this means that QA engineers who want to measure the energetic impact of their product in more detail must not only understand the customers’ perspective (as usual), but in addition many implementation details from different perspectives. Where do particular services run? On which infrastructure? Which libraries are used? How can the implementation of the product be modified in order to measure energy consumption. Improvement of energy consumption is not something that can be activated by just pushing a button. 



Quote for the day:

"If you don't demonstrate leadership character, your skills and your results will be discounted, if not dismissed." -- Mark Miller

No comments:

Post a Comment