Addressing The Internet Of Things (IoT) And Challenges In Device Design Using A Comprehensive Approach

As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025.
A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring.
Why Engineers Should Be Using IoT Technology In Product Design
The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it.
Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security.
Continue reading: https://www.securityinformed.com/insights/addressing-internet-iot-challenges-device-design-co-2925-ga.1631540683.html

Attachments

  • p0004875.m04547.addressing_the_internet_of_things_iot_and_challenges_in_device_design_using_a_...jpg
    p0004875.m04547.addressing_the_internet_of_things_iot_and_challenges_in_device_design_using_a_...jpg
    35 KB · Views: 109

Forget perimeters; for security, look at device behavior

Not a week goes by without some sort of vulnerability or breach associated with the IoT taking place. More devices, varied devices, and the rise of far more sophisticated attackers have led to big IT firms investing in their own security capabilities while our government issues executive orders trying to compel companies to invest in better security.
Today’s version of better security requires layers. And after a conversation with Kate Scarcella, chief cybersecurity architect at Micro Focus, I’m convinced that monitoring device behavior will be one of those layers. Much like law enforcement officials trying to assess threats look for suspicious behavior exhibited by people, Scarcella believes devices can provide a set of “tells” after they’ve been compromised.
All we need is software that can spot the one weird device out of thousands.
Continue reading: https://staceyoniot.com/forget-perimeters-for-security-look-at-device-behavior/

Attachments

  • p0004874.m04546.bigstock_cyber_security_and_digital_dat_324827341.jpg
    p0004874.m04546.bigstock_cyber_security_and_digital_dat_324827341.jpg
    442.8 KB · Views: 75

IoT Security (Internet of Things Security)

Companies from various industries discovered the world of Internet of Things and incorporated it in their workflows to increase productivity, cut costs and deliver better services to clients. But there is one thing that is dangerous to overlook: IoT security. If the IoT devices are compromised, a threat of DDoS attack, identity theft, spoofing and data leakage appear. That’s why the correct approach to protection in Internet of Things software development is vital.
What is IoT Security?
IoT security means practices that companies implement to increase the level of protection in the devices that receive, keep and transfer sensitive data. Every industry uses the advantages of Internet-connected devices, yet companies have to pay more attention to the safety of their data.
Although the Internet of Things significantly increases the efficiency of business workflows and makes the work processes quicker, companies are now hugely dependent on these modern technologies. Recently, due to a number of data breaches, it is pivotal to establish well-worked IoT security requirements.
Continue reading: https://latesthackingnews.com/2021/09/20/iot-security-internet-of-things-security/

Attachments

  • p0004873.m04545.iot_3404892_340.jpg
    p0004873.m04545.iot_3404892_340.jpg
    61.5 KB · Views: 65

Will Internet of Things transform the wealth management customer experience?

In recent years, there has been a lot of talk about the potential of the Internet of Things (IoT) to revolutionize how we live. From microwaves that scan food packaging and follow cooking instructions, lights that switch on and off as we enter and leave rooms, to fridges that automatically order items as we run out, the vision is that connected devices will share information to make our lives easier.
Some of this potential has already become reality. Many of us wear a smartwatch or have a smart speaker and, as a result, have a clearer sense of how a network of interrelated devices might change how we interact with appliances and physical objects. While it may be more difficult to envisage IoT having a transformative impact on a service industry like wealth management, there is in fact immense potential. The ability to collect and transfer data between sensors, wearables, and other devices and applications offers wide-ranging opportunities to help wealth managers and advisers deliver a more personalized, suitable, and affordable service.
Crucially, IoT can help to optimize the service experience and outcomes for clients. Through geolocation, they can be referred to a local adviser, with calendars aligned and optimized to ensure the best use of time for all participants. Pulling data on all the client’s financial affairs by utilizing Open Finance will help the adviser ensure the client has enough money for day-to-day bills and expenses, accessible savings, separate savings for specific events, and long-term investments. The adviser can also automate switching between pots as cash flow changes to maximize returns and make the best use of tax allowances.
Continue reading: https://www.finextra.com/blogposting/20924/will-internet-of-things-transform-the-wealth-management-customer-experience

Attachments

  • p0004872.m04544.finextra.jpg
    p0004872.m04544.finextra.jpg
    2.9 KB · Views: 63

The Future Of Cellular IoT Is Now: Are You Ready?

To think we live in a wirelessly connected world is a bit of an understatement
Our lives revolve around technology! Here us out: many of us begin our days checking our smartphones. We often tell Alexa to switch on the radio while preparing a meal and use wearables to track our daily workouts. None of this was imaginable ten years ago!
Add the Internet of Things (IoT) to the mix in the public spaces, and we can suddenly operate systems and devices from afar — from automatically-controlled street lights to agri-apps to optimize fertilizer usage to remotely-monitored parking garages.
Long gone are the days of long wires and tin cans. Today, communication protocols such as cellular, Bluetooth, and WiFi rule the roost and provide us seamless connectivity anywhere we are, regardless of the device in use. Life without access to the internet is now unthinkable.
With 5G around the corner, cellular IoT is mainly well-positioned to benefit from higher bandwidth solutions that would usually be allocated to WiFi or wired Ethernet.
Continue reading: https://technative.io/future-of-cellular-iot-is-now/

Attachments

  • p0004871.m04543.tech_native.jpg
    p0004871.m04543.tech_native.jpg
    3.2 KB · Views: 80
  • Like
Reactions: Kathleen Martin

IoT And SCADA Systems, Forced To Coexist And Understand Each Other

Until the first half of the 20th century, industrial organizations relied primarily on the human factor to control and monitor their processes. However, with increasingly complex operations and ever-larger factories, in the 1970s, digital PLCs (programmable logic controllers) and computers became famous as an interface for data transmission to remote control centers. Soon later, the «telemetry» was born, from the Greek «metria» (measurement) and «tele» (remote), and with it, a control system the SCADA: Supervisory Control and Data Acquisition Systems. It is called the third industrial revolution, and today, there is no industrial company that does not have PLCs or SCADAs in its operation.
Internet of Things (IoT) and Artificial Intelligence (AI) allow today to witness another great technological leap that many dare to call the fourth industrial revolution.
The scope goes far beyond «data acquisition and monitoring.» It focuses on the advanced processing of large volumes of data that allows faster and more efficient decision-making processes and less risk and margin for error. However, we are still in the process of consolidating this new revolution, as the limits between the investment made in the third industrial revolution and the one needed for the fourth one are not yet clear.
In this article, we give three keys to the roadmap that must be followed by any company that doesn’t want to be left out of the fourth industrial revolution.
Continue reading: https://www.iotforall.com/iot-and-scada-systems-forced-to-coexist-and-understand-each-other

Attachments

  • p0004870.m04542.iotandscadasystems_1_1024x768.jpg
    p0004870.m04542.iotandscadasystems_1_1024x768.jpg
    123.8 KB · Views: 71

IoT Applied to Marketing

The Internet of Things (IoT) is one of the most important trends of the 21st century and is destined to change our business and markets.
IoT applications have been present for the longest time in the industrial field, leading to the emergence of the Industrial Internet of Things (IIoT).
IIoT is the area of IoT in the greatest rise and prominence, with advancements related to automation and robotics. This is thanks to the innovation that production systems are experiencing with the adoption of the Industry 4.0.
With this fourth industrial revolution, we have stopped separating companies to ones that only do services and others that only deal with products. Instead, there is now a union of the physical with the digital (named “Phygital”), that allows all those who have the courage, audacity, and skills to start using IoT technology to imagine a different world.
Continue reading: https://www.automationworld.com/process/iiot/article/21723170/iot-applied-to-marketing

Attachments

  • p0004869.m04541.iot_and_marketing.jpg
    p0004869.m04541.iot_and_marketing.jpg
    95.2 KB · Views: 75

How can blockchain technology be used?

The previous article provided a brief introduction of what blockchain technology is and how it differs from the conventional ledger technology we use today. This article will build on that to explain how a blockchain works and how it can be useful to different sectors.
Now, it is important to note that all of blockchain technology, whether it is cryptocurrencies or anything else, relies heavily on very advanced cryptography. As such, explaining how it works to the lay person can get quite technical. The following explanation is an attempt to convey the ideas behind blockchain without getting bogged down in the details.
Transactions in Blockchain
Before a transaction takes place and can be uploaded onto the blockchain, it needs to be verified. Let’s take an example. Person A wants to transfer money to Person B. The details of the transaction, along with other key information, is processed into a block. This block also contains a public key or password that every node has access to and a private key that only Person A has access to. contains the transaction information. The solving of this complicated problem simultaneously provides the details of the transaction and also authenticates it. Once the authentication is complete, everybody on the blockchain knows that Person A has transferred money to Person.
Continue reading: https://www.livemint.com/brand-stories/how-can-blockchain-technology-be-used-11632214222337.html

Attachments

  • p0004868.m04540.use_of_blockchain.jpg
    p0004868.m04540.use_of_blockchain.jpg
    45 KB · Views: 72

Protecting the Energy Grid Through Artificial Intelligence

Stony Brook University professor Peng Zhang, a SUNY Empire Innovation professor in the Department of Electrical and Computer Engineering, is leading a statewide team of collaborators in developing “AI-Grid,” an artificial intelligence-enabled, autonomous grid designed to keep power infrastructure resilient from cyberattacks, faults and disastrous accidents.
The work is part of the National Science Foundation’s (NSF) Convergence Accelerator Program, which supports and builds upon basic research and discovery that involves multidisciplinary work to accelerate solutions toward societal impact.
In September 2020, the program launched the 2020 cohort, which included AI-Grid as a phase 1 awardee and grant funding of a $1 million to further AI-Grid research from an idea to a low-fidelity prototype. The Convergence Accelerator recently selected teams for phase 2, to focus on expanding the solution prototype and to build a sustainability plan beyond the NSF funding. Under phase 2, a new $5 million NSF cooperative agreement will fund the AI-Grid project.
“This project led by Professor Zhang is a great example demonstrating the impact of this novel research on essential infrastructure that we rely on daily, and defines a pathway for enhancing the resiliency and security of our electrical grid systems,” said Stony Brook University Vice President for Research Richard J. Reeder.
Continue reading: https://news.stonybrook.edu/university/protecting-the-energy-grid-through-artificial-intelligence/

Attachments

  • p0004867.m04539.aigridprototype_740x372.png
    p0004867.m04539.aigridprototype_740x372.png
    410.1 KB · Views: 55

Top 6 Factors To Consider When Designing the IoT Infrastructure

IoT proves to be a valuable technology for many organizations and sectors. If organizations can develop and standardize certain aspects of the IoT architecture, they can tap into the full potential of their investments. In this article, Kamal Rupareliya, chief of customer product success, Intuz, discusses the key factors to consider before designing IoT infrastructure.
Unlike a few technology fads of the past (remember, AOL, Napster, AltaVista?), the Internet of Things or IoT has proven extremely valuable for a range of organizations and sectors.
The technology has the potential to revolutionize all industries, from agriculture and healthcare to transportation and education. As per reports by IDC, the IoT global market revenue is predicted to reach approximately $1.1 trillion by 2025.
IoT promises a future where we can control almost every aspect of life remotely. In contrast to traditional data applications, the technology has no limit in terms of the number of devices deployed.
While the IoT invariably generates immense amounts of data, there is a heightened focus on harnessing and transmitting the information collected.
Obviously, the Internet infrastructure is going to face challenges as more sectors adopt it. Thus, we need wider access to create a better system for exchanging and storing our data while at the same time making efficient use of available technology.
Eight Components of IoT Infrastructure
If businesses develop and standardize certain aspects of the IoT architecture, they can tap into the full potential of their investments. They can prepare their IoT deployments successfully by understanding each infrastructural component and how they all work together.
Continue reading: https://www.toolbox.com/tech/iot/guest-article/factors-to-consider-when-designing-the-iot-infrastructure/

Attachments

  • p0004866.m04538.shutterstock_1531394231.jpg
    p0004866.m04538.shutterstock_1531394231.jpg
    35.1 KB · Views: 67

Addressing The Internet Of Things (IoT) And Challenges In Device Design Using A Comprehensive Approach

As the number of connected devices increases worldwide, the ways that they are being used, designed, and tested have also expanded. The rise of connected devices is demanding engineers to harness the power of the internet of things, which is expected to hit 28 billion by 2025.
A comprehensive approach to device design is needed more than ever to address the challenges that this rapid growth will bring.
Why Engineers Should Be Using IoT Technology In Product Design
The demand for devices designed to use the Internet of Things (IoT) technology is increasing as more industries are finding expanded ways to put them into use. Industries such as healthcare, automobiles, and agriculture are becoming more dependent on cloud capabilities and are therefore in need of new devices able to connect to it.
Due to this rise in demand, an increasing amount of devices are delivering a multitude of benefits both to consumers and companies. However, this new wave of products has led to a growing list of challenges for engineers as they are forced to address IoT tech in regards to connectivity, regulations, longevity, and security.
Ways To Use IoT In The Development Process
Engineers are facing these new challenges along with the normal pressure of deadlines and test considerations. By approaching all of these issues from a comprehensive point-of-view, the solutions become clearer and new device capabilities can be born. Let’s look at the challenges individually as well as possible solutions for them.
Improving Connectivity
IoT enables data to be transferred between infrastructure, the cloud, and devices, making the process smooth 
Because IoT is based around connection, it’s no surprise that the primary challenge for engineers to overcome is the improvement of connectivity between devices. IoT enables data to be transferred between infrastructure, the cloud, and devices, so making this process as smooth as possible is crucial.
The main challenges involved with connectivity have to do with development and product testing while meeting industry standards and best practices. Additionally, many companies lack the necessary equipment and technology to develop new IoT devices, which makes it difficult to create scalable prototypes and test new products.
Suggested Solutions
To address the issue of not having the expertise and necessary tools for testing, we suggest outsourcing the prototyping and evaluation process instead of attempting to tackle this in-house. By doing this, you’re able to free up resources that would otherwise be needed for expensive equipment and qualified staff.
Helping Comply With Regulations
When working with devices that are connected across the world, there is a complex web of regulations and conformance standards that can lead to challenges for engineers. The necessity of complying with these regulations while also pushing to meet deadlines can be burdensome and lead to an increase in production time and expenses.
Failure to comply with global and regional laws, as well as system and carrier requirements, can lead to fines and costly setbacks. This type of failure can destroy a company’s reputation on top of causing financial losses, often leading to the loss of business.
Continue reading: https://www.securityinformed.com/insights/addressing-internet-iot-challenges-device-design-co-2925-ga.1631540683.html

Attachments

  • p0004865.m04537.addressing_the_internet_of_things_iot_and_challenges_in_device_design_using_a_...jpg
    p0004865.m04537.addressing_the_internet_of_things_iot_and_challenges_in_device_design_using_a_...jpg
    35 KB · Views: 72

Cyber Threats Haunting IoT Devices in 2021

With new technological advancements coming to light every day, the supply and demand for IoT devices has increased significantly. Humans have started relying on these devices for even the most basic everyday functions. In fact, as per a study conducted by IDC, 4 out of 5 people check their phones within 15 minutes of waking up! With IoT devices taking over our daily lives, cyber criminals are a little too ambitious to let the opportunity slide. 
As IoT devices store, transmit and process so much essential data every day, they serve as the perfect target for cyber criminals. According to an article published by Cyber Magazine, IoT devices suffer an average of 5,200 cyber attacks every month. While businesses are reaping huge benefits from the IoT ecosystem, the risk of cyber attacks has increased exponentially as well. 
Major IoT Cyber Threats in 2021
There are a number of cyber risks plaguing the world of IoT devices. Some of the major IoT cyber threats in the current times include:
#1 Absence of Updates and Unencrypted Updates
Another primary cyber risk associated with IoT devices is the lack of regular updates and weak update mechanisms. These devices may be secure initially, however, they become vulnerable with the discovery of new security bugs or issues. If these bugs and issues are not fixed through regular updates, the devices become exposed to attacks. 
Several old devices don’t even provide any security updates and most of the newer models do not ensure secure installation of security patches. The absence of proper encryption in a device’s security patch installation process significantly increases the risk of code modification by threat actors. 
The infamous Satori malware serves as a perfect example of such attacks. This malware delivers a worm to a vulnerable device so that the infection spreads from device to device without any human interaction. It spreads by targeting known vulnerabilities in specific ranges of IoT devices. 
In December 2018, Satori infected several D-Link home routers around the globe, making them a part of the potent IoT botnet used for attacking websites and mining cryptocurrency. The routers were infected by exploiting a 2-year-old remote code-execution vulnerability. 
Continue reading: https://securityboulevard.com/2021/09/cyber-threats-haunting-iot-devices-in-2021/

Attachments

  • p0004864.m04536.sbn_color_1.png
    p0004864.m04536.sbn_color_1.png
    5.1 KB · Views: 78

Edge computing has a bright future, even if nobody's sure quite what that looks like

Edge computing is easy to sell but hard to define. More a philosophy than any single architecture, edge and cloud are on a spectrum, with the current cloud service model often dependent on in-browser processing, and even the most edgy deployments reliant on central infrastructure.
The philosophy of edge, as most Reg readers know doubt know, is to push as much processing and compute as close as possible to the points of collection and utilisation.
If biology is any guide, edge computing is a good evolutionary strategy. The octopus has a central brain, but each tentacle has the ability to analyse its environment, make decisions and react to events. The human gut looks after itself, with roughly the same processing power as a deer, while both eyes and ears do local processing before passing data back. All these natural systems confer efficiency, robustness and flexibility: attributes that IT edge deployments should also expect.
But those natural analogies also illustrate another of edge's most important aspects – its diversity. 5G is often quoted as the quintessential edge case. It owes most of its potential to being designed around edge principles, moving the decision-making about setting up and managing connections into distributed control systems. The combination of high bandwidth, low latency, traffic management through prioritisation, all across moving targets, just can't work unless as much processing as possible takes place as close to the radios (and thus the users) as possible.
Move it
But another high-profile edge application, transport, needs a very different approach. An aircraft can generate a terabyte of performance and diagnostic data on a single flight, which outstrips the capabilities of in-flight datacomms.
Spread that across a fleet in constant global flux, and central control isn't an option. Autonomous processing onboard, prioritising of immediate safety information such as moment-to-moment engine parameters for available real-time links, and efficient retrieval of bulk data when possible, lead to design decisions far removed from 5G engineering.
Continue reading: https://www.theregister.com/2021/09/21/future_of_edge_computing/

Attachments

  • p0004863.m04535.the_register_logo.png
    p0004863.m04535.the_register_logo.png
    7.2 KB · Views: 68

How To Prepare For The Coming AI Explosion In Business

Artificial intelligence (AI) conjures a lot of unique imagery depending on your background and how much exposure to the topic you’ve had. For some people, AI looks and feels like something out of The Terminator or 2001: A Space Odyssey — an oppressive, human-like intelligence that poses an existential threat. To some, AI is simply a fancy name for digital assistants like Siri or Cortana. Of course, if you have a lot of development experience, you know the line between AI and any other kind of computer programming is blurry and that in some ways, a basic pocket calculator could be considered AI.
But no matter what your initial conceptions are, we can all agree on one thing for sure — AI has incredible potential to transform our world and to increase productivity, improve efficiency and solve problems that have henceforth been considered unsolvable. But is your business ready for the impending AI explosion?
The Exponential Potential Of AI
Technology rarely develops in a linear way. Instead, our technological progress tends to leap forward in major spurts and increase exponentially in some contexts (think of, for example, Moore’s Law, which is used to predict innovations for semiconductors). Over a period of years, the entire business landscape can be transformed, multiplying productivity, opening the door to new market opportunities and pushing the limits of human potential.
Continue reading: https://www.forbes.com/sites/forbesbusinesscouncil/2021/09/20/how-to-prepare-for-the-coming-ai-explosion-in-business/?sh=7f539cdf2113

Attachments

  • p0004862.m04534.ai_explosion.jpg
    p0004862.m04534.ai_explosion.jpg
    33.2 KB · Views: 54

Artificial intelligence (AI) at the edge: 3 key facts

As Artificial Intelligence becomes increasingly ubiquitous, it's developing a special relationship with edge computing. Consider these important factors as you develop your AI strategy
Artificial Intelligence (AI) is moving from the realm of science fiction to widespread enterprise scalability. Even ten years ago, AI workloads were almost exclusively utilized by a small number of very profitable companies that had the resources to experiment and hire an extensive team of data scientists. Today, AI is used in a number of everyday tools, from language recognition to health care prediction and nearly every industry in between.
AI is also now deployed at the edge, not just inside massive data processing facilities. That trend will continue in the coming years. Here are three things that executives in any field should know to capitalize on the change.
1. Open source is your friend
Open source is fueling the rise of AI as developers learn from the larger community to make software elements more accessible for a number of use cases. The open source community operates as a school of fish, pivoting quickly en masse in response to the environment. For example, TensorFlow became a hit within a month before the majority of developers converted to the library for deployment solutions. That fast a timeline was unheard of before.
Continue reading: https://enterprisersproject.com/article/2021/9/artificial-intelligence-ai-edge-3-key-facts

Attachments

  • p0004860.m04532.cio_ai_1.png
    p0004860.m04532.cio_ai_1.png
    119.5 KB · Views: 53

AU: Drone noise

RPA, commonly referred to as drones, are an emerging and innovative technology being used around the world. Drones have a diversity of applications including in the agricultural sector, emergency services, infrastructure inspections and surveys, surf lifesaving, delivery of medical supplies, aerial photography and commercial delivery just to name a few.
There are currently no internationally-mandated noise aviation standards for drones. Countries and regions across the world are considering what regulations and standards may be appropriate given the drone industry is rapidly evolving and any regulation needs to take account of advances in drone technology.
The Air Navigation (Aircraft Noise) Regulations 2018 (the Regulations) apply to drones, therefore a range of commercial and recreational drone operations within Australia require approvals under Section 17 of the Regulations. 
Drone Noise Regulations
Given increasing use of drones, the department conducted a review of current noise regulations to determine the appropriate scope and breadth of future noise regulations for drones. More information on the review can be found at Noise Regulation Review for RPA and Specialised Aircraft.
One of the recommendations from the Review of the Air Navigation (Aircraft Noise) Regulations 2018 – Remotely Piloted Aircraft & Specialised Aircraft report was the development of flexible, risk-based interim regulations for drone and electric Vertical Take-off and Landing (eVTOL) aircraft noise.
The Review’s recommendation would require amendments to the Air Navigation (Aircraft Noise) Regulations 2018 to appropriately regulate noise impacts from emerging aviation technologies, such as drones and eVTOL aircraft. The current Regulations are designed for traditional aircraft noise management.
To address this recommendation from the Review, a Regulation Impact Statement (RIS) has been prepared for public consultation which contains options for amendments to the regulations. A copy of the RIS can be found at National Emerging Aviation Technologies Consultation.
Continue reading: https://www.infrastructure.gov.au/infrastructure-transport-vehicles/aviation/aviation-safety/aircraft-noise/drone-noise

Attachments

  • p0004859.m04531.au_gov_logo.png
    p0004859.m04531.au_gov_logo.png
    63.9 KB · Views: 67

Abductive inference: The blind spot of artificial intelligence

Recent advances in deep learning have rekindled interest in the imminence of machines that can think and act like humans, or artificial general intelligence. By following the path of building bigger and better neural networks, the thinking goes, we will be able to get closer and closer to creating a digital version of the human brain.
But this is a myth, argues computer scientist Erik Larson, and all evidence suggests that human and machine intelligence are radically different. Larson’s new book, The Myth of Artificial Intelligence: Why Computers Can’t Think the Way We Do, discusses how widely publicized misconceptions about intelligence and inference have led AI research down narrow paths that are limiting innovation and scientific discoveries.
And unless scientists, researchers, and the organizations that support their work don’t change course, Larson warns, they will be doomed to “resignation to the creep of a machine-land, where genuine invention is sidelined in favor of futuristic talk advocating current approaches, often from entrenched interests.”
Continue reading: https://bdtechtalks.com/2021/09/20/myth-of-artificial-intelligence-erik-larson/

Attachments

  • p0004858.m04530.myth_of_artificial_intelligence.jpg
    p0004858.m04530.myth_of_artificial_intelligence.jpg
    139.1 KB · Views: 62

How Drones Can Revolutionize Farming

Drone technology could be a new frontier for farmers looking to keep a watchful eye on the health of their crops.
Connecticut Public Radio's Patrick Skahill recently trekked through Belltown Hill Orchards in South Glastonbury, Connecticut, to learn how the future of farming might be overhead.
Listen in: https://www.wbur.org/hereandnow/2021/09/20/drones-farmers-crops

Attachments

  • p0004857.m04529.wbur_tile.png
    p0004857.m04529.wbur_tile.png
    4.2 KB · Views: 68

Top 50 UK women in technology announced

Female co-founders and founders of dynamic, fast growth start-ups were amongst the winning 50 including Tessa Clarke, Co-Founder & CEO of food sharing app OLIO and Melinda Nicci, sports psychologist founder and CEO of Baby2Body, the health and wellbeing coaching app for pregnancy and motherhood.
The Inspiring Fifty awards exist to spotlight women excelling in technology careers across the UK and take place at London Tech Week, the largest and most influential tech event in Europe, from 20th – 24th September.
The Inspiring Fifty are important role models for encouraging more girls and women in technology, as well as inspiring future leaders and entrepreneurs to follow in their footsteps. 
Supporters of Inspiring Fifty, both men and women, champion women and minorities in tech and value the positive impact that increased diversity has on everything from business growth and innovation to culture and productivity.
Says Elka Goldstein, Interim co-CEO at accelerateHER:
Continue reading: https://www.techdigest.tv/2021/09/top-50-uk-women-in-technology-announced.html

Attachments

  • p0004856.m04528.karen_blackett_wpp.jpeg
    p0004856.m04528.karen_blackett_wpp.jpeg
    29 KB · Views: 95

Women Don’t Feel They Belong In The Workplace, New Survey Reveals

In terms of belongingness and the feeling of value, women feel less compared to their male counterparts, according to a new survey by The Achievers Workforce Institute 2021 Culture Report.
The recently published 2021 Culture Report shows that more than a quarter (26 percent) of global participants reported a strong sense of belonging in the workplace. However, this number increases to almost a third for men (31 percent) while only about one in five (22 percent) for women. There were more than 3,500 employed respondents globally. Additionally, the survey correlated a strong sense of belonging with higher engagement, job commitment, productivity, and a host of other factors.
Continue reading: https://www.techtimes.com/articles/265576/20210919/women-don-t-feel-belong-workplace-new-survey-reveals.htm

Attachments

  • p0004855.m04527.us_facebook_menlo_park.jpg
    p0004855.m04527.us_facebook_menlo_park.jpg
    47.8 KB · Views: 98

Despite more upskilling, women still punished by growing employment gender gap

One would think that in a world turned upside down by a global pandemic, upskilling oneself would lead to better labor force participation.
Well, this may be true — unless you’re a woman, apparently. 
More women than men upskilling during the pandemic
A report released by Coursera earlier this month highlighted some sobering — but arguably unsurprising — yet, promising insights into the Malaysian and global labor markets affected by the Covid-19 pandemic. 
The Coursera Women and Skills Report 2021 found that during the pandemic, women globally have been upskilling and reskilling themselves through online learning — at a higher rate than men. The following numbers are important because these were significant increases catalyzed by the pandemic. 
During the height of the pandemic in 2020, 54% of all new enrollments on Coursera were by women, whereas it was 45% in 2019. 
In 2019, 38% of all course enrollments were by women. In 2021, it rose seven percent to 45%. Enrollments from women in entry-level Professional Certificates increased from 25% in 2019 to 37% in 2021.
Continue reading: https://techwireasia.com/2021/09/despite-more-upskilling-women-still-punished-by-growing-employment-gender-gap/

Attachments

  • p0004854.m04526.women_upskilling.jpg
    p0004854.m04526.women_upskilling.jpg
    25.3 KB · Views: 93

Forget the ‘she-cession’ — women will redefine the labor market

Are we moving towards the feminization's of work? And could this lead to a more balanced workplace and economy? I believe the answer to both of these questions is yes.
The idea seems antithetical in the face of the “she-cession,” in which women dropped out of the workforce during the pandemic at higher rates than men in order to buffer a sudden loss of childcare and shoulder the burdens of home-schooling.
But I think this is a coronavirus-related blip that will correct as schools reopen and life returns to some semblance of normal. Most women have to work, economically. In the US, it’s nearly impossible to support a family on the median income of $67,521 if they don’t. Many, of course, simply want to.
The bigger trend is that over the coming years, women will also dominate and redefine much of the labor market.
Consider that female students now represent 59.5 per cent of all college attendees. That trend has been brewing for some time, but it received a big tailwind from Covid-19. While many mothers stayed at home with children, more men dropped out of college than women, in part to support families. In a few years, those college-educated women will have a leg up in the job market. 
Continue reading: https://www.ft.com/content/23031dc0-8225-49de-b78f-c1d331db5c54

Attachments

  • p0004853.m04525.https_d1e00ek4ebabms_cloudfront_net_production_21e6130b_49bc_45ba_bf09_3c6bbfe...jpg
    p0004853.m04525.https_d1e00ek4ebabms_cloudfront_net_production_21e6130b_49bc_45ba_bf09_3c6bbfe...jpg
    41.1 KB · Views: 87
  • Like
Reactions: Kathleen Martin

Internet of Things (IoT) Security Trends 2021

While work from home has generated a whole new level of security threats, the Internet of Things (IoT) promises to up the ante even further.
Think about the havoc caused by hundreds of millions of people suddenly working from home. This severely weakened and, in some cases, overwhelmed corporate security defenses. IoT could magnify such challenges. 
IoT may not be top of mind right now due to the scourge of ransomware. But it will no doubt rise again as the number of connected things grows exponentially.  
5 Trends In IoT Security
1. Another Major Expansion Of The Organizational Perimeter
The IoT magnifies the threat level by several orders of magnitude. We are talking here about tens of billions of connected devices.
IDC estimates that 41.6 billion connected IoT devices or things will be generating 79.4 ZB of data by 2025. Every one of them opens a door to the enterprise.  
Vendors have already come out with some IoT security-related tools. But the market remains largely in its infancy. Once the threat becomes more real, vendor offerings will multiply and grow in sophistication. For organizations, this all adds up to them having to secure an ever-widening net. 
Continue reading: https://www.datamation.com/security/iot-security-trends/

Attachments

  • p0004852.m04524.edge_computing_1_1024x672.jpeg
    p0004852.m04524.edge_computing_1_1024x672.jpeg
    78.7 KB · Views: 78

AI and drones to monitor power lines in NSW tech trial

Unleash Live has teamed up with Optus, Amazon Web Services and electricity provider Endeavour Energy in a technology trial it is hoped will convince aviation authorities to relax laws limiting the ways drones can be used to monitor critical infrastructure.

The Sydney-based start-up, which recently scored an $8 million investment from SafetyCulture, will use its AI-based video-recognition platform to identify damage to Endeavour Energy’s power lines in real time, using machine learning (ML) to analyze high-resolution videos shot by drones flying above and around the powerlines.
CASA rules require trained drone pilots stay within line of sight of any drones, preventing their automated use in patrolling infrastructure like power lines. 
Scott Ryan, chief assets & operating officer at Endeavour Energy, said Unleash Live’s ML system will be used to identify problems such as cracked insulators, loose tie wires or missing parts on the power poles: problems that could lead to outages or even bushfires if they are not found and fixed quickly.
Ultra High-Definition videos shot by the drones will be live-streamed over Optus’ 5G network, back to Unleash Live’s ML system, which is hosted on Amazon Web Services.
The year-long trial is backed by a $648,000 grant from the federal government, as part of the government’s “5G Innovation Initiative” that is designed to generate demand for 5G networks in industry sectors including agriculture, mining, construction and manufacturing.
Continue reading: https://www.afr.com/technology/will-drones-be-allowed-to-monitor-critical-infrastructure-20210919-p58t19

Attachments

  • p0004851.m04523.casa_drone_rule.jpg
    p0004851.m04523.casa_drone_rule.jpg
    91.4 KB · Views: 64

Managing traffic in the skies is becoming a lot harder

Planes used to be the only aircraft crisscrossing the sky. Now there are drones, more frequent rocket ships and — soon — flying taxis, elbowing their way into the National Airspace System.
Why it matters: Managing the congestion up above is becoming an urgent mission for America's traffic cops in the sky. While the Federal Aviation Administration has a stellar safety record when it comes to commercial aviation, its challenge is infinitely more complex today.
State of play: The FAA manages about 45,000 flights per day, including commercial airlines, cargo carriers and private planes.
  • At peak moments on any given day, it could be handling as many as 5,400 flights at once, an agency spokesman tells Axios.
  • It's fascinating to watch these flight patterns in real time on sites like flightaware.com or flightradar24.com.
  • But that's just the beginning.
By the numbers: There are roughly 870,000 registered drones in the U.S. — four times the number of commercial and private planes.
Continue reading: https://www.axios.com/air-traffic-drones-airplanes-skies-crowded-11208585-265c-461a-bb7b-e673b11160ca.html

Attachments

  • p0004850.m04522.1631909871861.jpg
    p0004850.m04522.1631909871861.jpg
    122.6 KB · Views: 62

Filter