• Welcome to the Online Discussion Groups, Guest.

    Please introduce yourself here. We'd love to hear from you!

    If you are a CompTIA member you can find your regional community here and get posting.

    This notification is dismissable and will disappear once you've made a couple of posts.
  • We will be shutting down for a brief period of time on 9/24 at around 8 AM CST to perform necessary software updates and maintenance; please plan accordingly!

How Smart Restrooms Help Buildings Adapt to Pandemic Disruptions

As the COVID-19 spike driven by the Omicron variant began to diminish in the hard winter of 2022, states across the U.S. started easing up on pandemic control policies. Governors from California to New Jersey announced the end of mask mandates and other restrictions. The public returned to public spaces. 
But as we re-enter shared facilities—from office buildings to restaurants to concert venues—we carry with us a newfound concern about health and hygiene. And no part of a public building sends a stronger message about hygiene than the restroom. 
Research by Kimberly-Clark Professional found that 75 percent of workers associate bathroom cleanliness with broader hygiene standards throughout the building. Unclean bathrooms suggest unhygienic buildings, which remind us of health risks; we have a higher expectation of cleanliness than we did in 2019. And it’s not just surveys that suggest this trend. It’s there in the behavioral data, too. Kimberly-Clark also notes that public-restroom visitors used twice as much soap and a quarter more hand towels in the first 12 weeks of the pandemic—habits that are hard to break.    
Meanwhile, labor shortages are making it tougher to keep cleaning departments fully staffed. Facility managers have to do more with less. So where can they turn to improve restroom cleanliness (both actual and perceived), helping to ease the broad transition back into public life? 
A more positive trend offers an answer: Over the past few years, the cost of sensors and connectivity technologies have come down dramatically. That makes the Internet of Things more widely available—and IoT is key to achieving the spotless restrooms a nervous public expects.     
Exploring IoT in Restroom Management
Smart building technologies are well-known for reducing energy usage; think of automated lighting controls and HVAC systems. And building automation and control systems (BACS) deliver powerful data on everything from space utilization to traffic patterns, enabling managers to make smart decisions. 
Continue reading: https://www.iotforall.com/how-smart-restrooms-help-buildings-adapt-to-pandemic-disruptions

Attachments

  • p0007059.m06711.kimberly_clark_professional_1_1024x768.jpg
    p0007059.m06711.kimberly_clark_professional_1_1024x768.jpg
    111.7 KB · Views: 39
  • Like
Reactions: Kathleen Martin

European Commission Proposes Legislation Facilitating Data Access and Sharing

On February 23, 2022, the European Commission ("Commission") published a proposal for a Data Act which aims at enhancing data access and use within the European Union ("EU").
The Data Act will be applicable to both personal and non-personal data, and will be relevant for all companies generating, holding, or transferring data in the EU, in particular in the Internet of Things ("IoT") context or for Artificial Intelligence applications. 
In a nutshell, the proposed Data Act seeks to:
  • Facilitate access to and use of data by businesses and consumers, while preserving incentives to invest: Business and consumers must have access to data generated by the product/services they own, rent, or lease (e.g., when using virtual assistants or IoT connected devices). Such access should be integrated by default in products/services, and the data must be provided directly or upon request, free of charge and in a timely manner (where applicable continuously and in real-time). There is also an obligation for data holders to port data to a third party authorized by the users, but for digital gatekeepers under the Digital Market Act. The Data Act also set up the access conditions and compensation principles in case of data porting obligations (under the Data Act or pursuant to specific sectorial data access regulations). 
  • Prevent unfair contract terms for data sharing imposed on SMEs, such as inappropriate liability restrictions, remedies limitations, unilateral contract interpretation and termination, restrictions to the data usages, etc. 
  • Ensure easy switching between cloud, edge, and other data processing services, through mandatory contractual terms (e.g., ensuring a transition period of maximum 30 days), the gradual withdrawal of switching charges, and technical equivalence. 
  • Provide for safeguards against unlawful data transfer/access by non-EEA governments, requiring justifications for transfers such as the existence of mutual legal assistance treaty, appropriate review by courts, and user notification. 
  • Review the Database Directive to exclude machine-generated data from its protection.
Continue reading: https://www.jdsupra.com/legalnews/european-commission-proposes-6841305/

Attachments

  • p0007058.m06710.jd_supra.png
    p0007058.m06710.jd_supra.png
    5.4 KB · Views: 39
  • Like
Reactions: Kathleen Martin

Crypto companies are tempting top talent away from Big Tech to build ‘Web3’

Executives at tech giants like GoogleFacebook and Amazon are quitting to take jobs in the buzzy world of crypto.
Blockchain platforms such as Polygon and Circle have hired top talent from Big Tech firms lately, enticing them with the pitch of working on the next “big thing” in tech — Web 3.0, or Web3.
Ryan Wyatt left YouTube earlier this month to lead a new gaming studio from Polygon. Wyatt had joined the Google-owned video site back in 2014 to head up a push into video games content and compete more aggressively with Amazon’s Twitch platform. 
“When I started at YouTube Gaming almost eight years ago, I was the first person there,” Wyatt told CNBC in an interview. “We didn’t have a team. People were really starting to show interest in gaming video.”
“I look at this opportunity very much the same way,” he added, describing the current stage of blockchain development as “early” and “exciting.”
The buzz surrounding Web3 has attracted some of the brightest minds in tech. The Web3 movement proposes overhauling the internet in a way that would move popular online services over to decentralized technologies like blockchain.
The list of Silicon Valley talent jumping ship for crypto also includes Sherice Torres, the former chief marketing officer of Facebook’s crypto and payments unit, Novi. She was hired by Circle in January. And Amazon cloud exec Pravjit Tiwana fled to join crypto exchange Gemini as its chief technology officer.
David Marcus, the former head of Novi, resigned late last year. While he’s yet to unveil his next move, Marcus has been singing the praises of Web3 on Twitter.
“I’ve never felt this connected to a community of builders like the crypto/web3 one,” Marcus tweeted last month.
Continue reading: https://www.cnbc.com/2022/02/23/crypto-companies-tempt-top-talent-away-from-big-tech-to-build-web3.html

Attachments

  • p0007056.m06708.107017994_1645436859773_gettyimages_1132911816_190326_ffea_pht004.jpeg
    p0007056.m06708.107017994_1645436859773_gettyimages_1132911816_190326_ffea_pht004.jpeg
    23.9 KB · Views: 37

Tech roles held by women reaches 27% in 2021 finds TTC

The Tech Talent Charter (TTC) has released its 2021 Diversity in Tech report, benchmarking the work towards diversity, equity and inclusion (DEI) by its signatory companies.
The 580 participating companies include the likes of Spotify, Deliveroo, General Dynamics, Very Group and Marie Curie, all these roughly 2% are made up of telcos, 3% from the tech space and 25% from the Information Technology and Services space.
As well as provide data on inclusion, equity and diversity work, for the first time, all signatories also shared data on ethnic diversity in their tech roles.
“We’ve been heartened to see diversity remaining a priority for so many companies through the pandemic, which is reflected by our significant growth, but 2022 will be a pivotal year as new working patterns become more normalised. Inclusion must be baked in now, or the tech sector risks cementing inequalities that have been exacerbated by the pandemic," said Debbie Forster - MBA, CEO and co-founder of the Tech Talent Charter.
"Sharing valuable insights on winning D&I strategies means that companies across the sector can learn best practices and more quickly bring about change for the greater good of the sector and the wider UK population.  We are grateful for the ongoing support of the DCMS and that of our Principal Partners who are truly going beyond thought leadership and driving real and long-lasting change across the industry.”
The report found that the top strategies for promoting DEI in tech are; investment in D&I data systems, setting up and measuring DEI targets, and gathering employee feedback. In doing so companies reported they are seeing tangible progress in their D&I strategies.
Other key findings from the report include the increase in the number of reported tech roles held by women, growing from 25% in 2020 to 27% in 2021. It also found that ethnic minority representation among participating organisations was 20%, higher than the 16% UK tech workforce average.
“With demand for tech talent at an al- time high, it is vital that our booming tech sector aims for a workforce powered by people from all walks of life," said Nadine Dorries, the UK's digital secretary.
"The charter shows the positive impact of tech companies collaborating to improve accessibility and we want more firms to come on board to make the industry truly reflect the diverse fabric of the UK."
Findings also highlight the important role small and mid-size enterprises (SMEs) play in driving the future tech talent pipeline as these companies can more easily implement new D&I practices than larger, more complex multinationals.
Continue reading: https://www.capacitymedia.com/articles/3830816/tech-roles-held-by-women-reaches-27-in-2021-finds-ttc

Attachments

  • p0007055.m06707.diversity_inclusion_new_169jpg_52389.jpg
    p0007055.m06707.diversity_inclusion_new_169jpg_52389.jpg
    17.5 KB · Views: 35
  • Like
Reactions: Kathleen Martin

When do we start legislating personal data captured by robots?

Recently we’ve seen a range of legislation, both passed and proposed, creating rules to protect personal data captured by connected devices. These revolve around ways for consumers to delete such data, what companies can or can’t do with the data, and protecting private health information. We’ve also seen a walk-back from the Internal Revenue Service requiring that U.S. citizens provide biometric data, in the form of facial recognition, to access their federal tax information.
That’s all well and good considering there are already dozens of devices gathering this data today. But what about five years from now when we start to see more robots in our daily lives?
There aren’t any data protections in place for that future, perhaps because we don’t really know how the future will unfold. After all, how many people interact with some type of connected robotic device today? Not many, although it’s likely more than you realize. And who can predict how many of those interactions we’ll experience in a few short years?
Still, we should have learned a lesson by waiting until the IoT was already fairly prevalent in smart speakers and cameras before actually tackling a pro-consumer framework for data privacy. It would be smarter to build off of that framework now and extend it to future devices, such as robots.
p0007053.m06705.astromove.jpg

 
Don’t misunderstand me, I don’t expect every home to have a robot in five years. I hope my home has one, but I’ve always been an early adopter. The real issue arises as more companies deploy robots in public places, such as airports, museums, and such.
Indeed, that’s exactly what caused me to think about this: An article about someone experiencing and watching robotic interactions at an airport in South Korea. That country is much like me in terms of early technology adoption.
Continue reading: https://staceyoniot.com/when-do-we-start-legislating-personal-data-captured-by-robots/

Attachments

  • p0007053.m06704.stacey_on_iot_logo_1.png
    p0007053.m06704.stacey_on_iot_logo_1.png
    147.7 KB · Views: 36
  • Like
Reactions: Kathleen Martin

Three Ways to Protect Unfixable Security Risks

How can a hospital protect an MRI machine with an unchangeable password and still connect it to the network? How can an industrial recycler safely secure its $400,000 hard drive recertification rack with control software that only runs on Windows XP?
These are not uncommon risks. The devices themselves can’t be secured, but that doesn’t mean we can’t use basic IT techniques to reduce our security risks. We will examine three options that can help protect the vulnerable devices: network segmentation, a hard-wired partner, and virtual machines. However, before we dig into the technologies, let’s first examine why we need them.
The Scope of the Unfixable Device Problem
Many organizations find themselves with very expensive, very vulnerable devices that cannot be replaced. Yet these devices also have critical vulnerabilities and need to connect to the network to exchange data or for remote control.
Industries with very expensive operational technology (OT) and Internet of Things (IoT) devices, such as healthcare or industrial manufacturing, can be especially vulnerable. Many of these critical devices require obsolete operating systems, have hard-coded passwords, or other equally dangerous security weaknesses.
As recently as 2020, 83% of medical imaging devices ran on operating systems that no longer receive updates. A report from this year estimates that 53% of connected medical devices have an identified critical risk. This includes 73% of IV pumps and most laboratory devices.
Although the number of hospitals applying solutions such as network segmentation continues to grow, researchers estimated less than half of the hospitals in the United States had begun the process. The world-wide numbers will be even worse.
Of course healthcare providers have plenty of company in their vulnerable state. Researchers estimate that:
  • 40% of industrial sites have at least one direct connection to the internet with at least one Industrial Control System (ICS) device exposed
  • 84% of sites have at least one remotely accessible device
  • 53% of industrial sites maintain obsolete Windows OS such as Windows XP
  • 57% of ICS sites do not run automatically updating antivirus protection
Also read: Top IoT Security Solutions for 2022
3 Ways to Defend Unprotected Devices
Millions of devices and thousands of organizations, big and small, have unprotected vulnerabilities waiting for a hacker to find them. Fortunately, we don’t have to just wait for the problem to explode, we can apply traditional IT technology to isolate and protect many of these devices that cannot be made secure on their own. Here are three ways to make unfixable devices more secure.
Network Segmentation
Network segmentation originates from separately wired network segments back when our physical offices had different equipment on every floor and our switches had more limited capacity. Today, our network segmentation can also be created using programming and no longer has to rely upon wires and switches.
Researchers estimate that 90% of healthcare IoT critical risks can be addressed by network segmentation. Network engineers use network segmentation rules to restrict sections of the network to specific users, security controls, or devices.
Continue reading: https://www.esecurityplanet.com/applications/three-ways-to-protect-unfixable-security-risks/

Attachments

  • p0007052.m06703.unfixable_security.png
    p0007052.m06703.unfixable_security.png
    336.3 KB · Views: 35
  • Like
Reactions: Kathleen Martin

Why Product Testing Is the First Step in Device Security

Internet of Things (IoT) devices have always been hard to secure because they incorporate components from multiple vendors. Manufacturers now struggle to deploy products amid a supply chain crunch that could last into 2024. Expediency has come at the expense of security as businesses focus on other high-priority issues.
In a survey we recently conducted with the Ponemon Institute, only half of respondents said their company assesses the security of its own products before they are shipped to customers. The security of an IoT device is very important to 76% of respondents, but only 41% say their organization makes it a priority.
The risks of a manufacturer sending, or a retailer or consumer accepting, devices without proven security are very real. Attackers might access sensitive data through unprotected devices or recruit compromised devices to form a botnet as part of a distributed denial-of-service (DDoS) attack. According to Spamhaus, the third quarter of 2021 saw a meteoric 82% rise in the number of new botnet command and controllers (C&Cs) over the second quarter.
IoT devices can also be an attractive target for a hacker looking to sabotage something bigger. We have already seen hackers compromise pacemakers and implantable defibrillatorsremotely drive a Jeep off the road, and accelerate the threat of ransomware for connected cars.
Meeting production deadlines doesn’t have to mean shipping devices that aren’t secure. Security testing represents an urgent need for device manufacturers, and in order to prioritize it, we need to make it faster and more automated.
Product security impacts sales
Product leaders no longer have to wait for urgent reasons to secure their products and supply chain: These issues are already impacting the bottom line. Nearly three in five—59%—of organizations report that they have lost sales due to product security concerns.
Continue reading: https://www.cpomagazine.com/cyber-security/why-product-testing-is-the-first-step-in-device-security/

Attachments

  • p0007051.m06702.cpo_magazine.jpg
    p0007051.m06702.cpo_magazine.jpg
    6.8 KB · Views: 38
  • Like
Reactions: Kathleen Martin

IoT Security Adoption will Reach a “Turning Point” in 2022, Research Finds

Cost and expertise remain key barriers to scaling security of the the Internet of Things, with calls for increased industry collaboration to boost the pace of adoption.
This year will mark a turning point in IoT security adoption, according to the latest 2022 Security Report.
Broadly speaking, the data found that the industry is committed to addressing the historic lag between the rate of digital transformation and the speed of securing the IoT ecosystem.
Researchers surveyed 1,038 tech decision makers across Europe, the US, and APAC, and found a positive turning point for security within organisations and shifting attitudes, with businesses making concerted efforts to make the IoT more secure.
Business leaders have begun placing security at the centre of IoT strategy and organisational culture, with almost all (90%) of respondents stating they have placed increased importance on security in the past 12 months.
Around nine in ten respondents deemed security as one of their top three business priorities, while 42% of those rank building a ‘security-first culture’ as their top priority within their business.
The study indicated that changes are being driven largely due to the increased consumer expectations and growing cyber risk over the last few years.
Continue reading: https://www.digit.fyi/iot-security-adoption-2022-research/

Attachments

  • p0007050.m06701.iot_security.jpg
    p0007050.m06701.iot_security.jpg
    66.9 KB · Views: 40

IoT security: How we are keeping consumers safe from cyber threats

The impact.
When you strap on your smart watch or speak to your smart home devices you engage with the Internet of Things (IoT), but by doing so might you also be welcoming hackers into your life?
A first-time multistakeholder collaboration convened by the World Economic Forum has recognized the risks, and formed a global consensus for baseline IoT security measures to protect consumers.
Through the Council on the Connected World a multistakeholder community worked together over 6 months to agree on five IoT security requirements for consumer-facing devices:
  • Must not have universal default passwords
  • Must keep software updated
  • Must have secure communication
  • Must ensure that personal data is secure
  • Must implement a vulnerability disclosure policy
The community has called on some of the world’s biggest manufacturers and vendors to take action for better IoT security. Their Statement of Support has been endorsed by more than 100 organizations from across stakeholder groups – including leading technology companies, industry organizations, civil society groups, and government cybersecurity agencies.
These include: ArçelikArmAstraZenecaBlocPowerBrainBox AICheck Point Software TechnologiesDeloitteFluxusGoogleGraymaticsHCL TechnologiesHumanFirstKudelskiMicrosoftNECNTTQualcommQuintessenceLabsSENSOROSignifyTrinity Mobility, Unitel, the UK Government’s Department of Digital, Culture, Media & Sports (DCMS), the Cyber Threat Alliance and many others.
“As we look to new technologies to help address pressing global challenges – from climate change to rapid urbanization – we must ensure this progress does not come at a cost to individual safety and privacy.” — Jeff Merritt, Head of Urban Transformation, World Economic Forum
What’s the challenge?
IoT applications such as connected thermal cameras, contact tracing devices and health-monitoring wearables are providing critical data needed to help fight COVID-19 while temperature sensors and parcel tracking will help ensure that sensitive vaccines are distributed safely. Yet the use of IoT in fighting the pandemic has also raised concerns about security, privacy, interoperability and equity.
The global consumer IoT market is forecasted to reach $154 Billion USD by 2028. As the use of connected devices increases, so does the potential for cyber threats – particularly as new products introduce vulnerabilities, potentially exposing people to hacking or leaks of personal data.
Continue reading: https://europeansting.com/2022/02/23/iot-security-how-we-are-keeping-consumers-safe-from-cyber-threats/

Attachments

  • p0007049.m06700.internet_of_things_1.jpg
    p0007049.m06700.internet_of_things_1.jpg
    131.9 KB · Views: 49
  • Like
Reactions: Kathleen Martin

The US must embrace cryptocurrency to remain an economic powerhouse

In the dark corners of the internet, faceless and nameless individuals whose identities are unknown by the government stare intently at their computer screens as they write thousands of lines of code. These anonymous individuals are like the cowboys of old, galloping across a deserted and mostly unregulated land — except, this isn’t land, it’s the internet, and these cowboys aren’t robbing banks, they’re creating money and selling it. This money is known as cryptocurrency.
You might have heard about cryptocurrency before, from Bitcoin’s near $1 trillion market valuation, or as the favored means of payment on the notorious drug and arms website, “Silk Road.” At its most basic level, cryptocurrency is a string of computer code that is stored in “blocks” on a decentralized and distributed ledger, the blockchain. There are many blockchains, each with its own set of rules that must be followed by computer code in order to be accepted. In essence, the blockchain may be compared to a classic paper-bound ledger that is shared among many individuals. Every transaction is recorded in that ledger, and each transaction preserves a record of the transaction that came before it. When a new transaction is validated by a majority of the ledger’s holders, it is instantly added to everyone’s ledger. Now, in reality, this ledger is not kept by “many” individuals; at the time of writing, it is believed that over one million people hold this ledger in just Bitcoin alone.
Giving just about anybody the ability to create a cryptocurrency can create a situation where bad actors can engage in fraudulent behavior. A “rug pull” is one of the most profitable and complex forms of fraud that takes place. Here’s how it works: To begin, an unscrupulous programmer will write code that follows the rules of a certain blockchain network. Because they control the supply, they then surreptitiously move a significant portion of the supply to their own cryptocurrency “wallets.” 
Continue reading: https://thehill.com/opinion/finance/594766-the-us-must-embrace-cryptocurrency-to-remain-an-economic-powerhouse

Attachments

  • p0007048.m06699.bitcoin_cryptocurrency_hongkong_111821_ap_kin_cheung.jpeg
    p0007048.m06699.bitcoin_cryptocurrency_hongkong_111821_ap_kin_cheung.jpeg
    40.8 KB · Views: 34
  • Like
Reactions: Brianna White

Explained | What is a blockchain ecosystem?

Blockchains have surged in popularity ever since bitcoin introduced the world to cryptocurrency. There has never been a new technology that has grown this fast. In a blockchain, data is stored in a way that its near impossible to change or hack it. Everyone wants a piece of this pie, from Silicon Valley to businesses and venture capitalists. But while blockchain has been around for a long time, people mostly associate it with cryptocurrency. Blockchain has now evolved into various decentralized projects that leverage its power.
This evolution owes its success to the creation of smart contracts, a self-executing piece of code that is stored in the blocks of a blockchain. The contracts allow for the automation of tasks that were previously performed by a central entity in software projects and applications.
This evolution has resulted in the growth of the blockchain ecosystem -- a network of participants in a blockchain that share business objectives and processes. There is still a long way to go for this nascent technology as more developers and businesses start utilizing it for a plethora of reasons. As time passes, the significance of a sound blockchain ecosystem will grow, but let us understand where the blockchain ecosystem stands as of now.
Continue reading: https://www.cnbctv18.com/cryptocurrency/explained--what-is-a-blockchain-ecosystem-12587582.htm

Attachments

  • p0007047.m06698.blockchain_ecosystem.jpg
    p0007047.m06698.blockchain_ecosystem.jpg
    31.3 KB · Views: 40
  • Like
Reactions: Brianna White

What's the next big blockchain craze?

Forget the property market, one of the biggest booms in the last 18 months has been in blockchain applications.
From trading cryptocurrencies to purchasing art in the form of non-fungible tokens (NFTs), blockchain assets have become household terms – and it’s not limited to just computer experts.
Everyday people, investors, collectors and even celebrities have bought into the viral crazes, based around blockchain’s ability to store information electronically in a way that is virtually impossible to hack, but also gives a public record of transactions.
Professor Salil Kanhere, from UNSW School of Computing Science and Engineering, says although the underlying technology of blockchain has been around for a while, it has only taken off in recent years.
“The platform is much more well-established and trusted and even adopted by tech giants, such as IBM, who are using it for supply chain and traceability purposes,” he says.
“Everyday people who have little or no computer expertise can still access blockchain through trading tokens or crypto. And all the platforms now make it so easy to access.
“We are seeing a rise in the popularity of blockchain and in particular, NFTs – and I believe, it’s here to stay.”
So, what’s next for the world of blockchain? Here are Prof. Kanhere’s predictions on what may take off next.
Continue reading: https://newsroom.unsw.edu.au/news/science-tech/whats-next-big-blockchain-craze

Attachments

  • p0007046.m06697.shutterstock_1932205373_1.jpg
    p0007046.m06697.shutterstock_1932205373_1.jpg
    128.3 KB · Views: 30
  • Like
Reactions: Brianna White

Blockchains And NFTs In Identification And Security Protocols

Blockchain technology first became popular with the invention of Bitcoin. Now, it is what unifies Bitcoin and all other cryptocurrencies. Another incredible innovation of our time is NFTs (non-fungible tokens). Blockchain and NFTs are two revolutionary concepts that are fast changing our new data world and how we secure it.
Since the existence of computers, data theft through malicious hacking has become a serious concern to businesses, organizations and even governments of different countries. Data scientists and cybersecurity experts have relentlessly tried to secure data and networks from these malicious bridges into computer security protocols using various means. Our aim in this article is to look at blockchain and NFTs and their contributions to identity and security protocols.
Non-Fungible Tokens
NFT blockchain technology makes use of cryptography to bring about records of transactions that cannot be altered and remains that way for as long as possible. NFTs are symbolized by using unique illustrations called cryptographic tokens. A cryptographic token brings about an added layer of security in a way that a particular asset can be tracked and identified.
The tokens can be used digitally to represent something rare, like collectibles and in-game items. Given these unique characteristics, they can be used in data security and sophisticated identifications. For businesses, an NFT serves to bring about a network whereby virtual assets can be stored and paired between those on the network and those using it. This way, it offers users greater security by removing any third party, and as a result, it keeps every vital data secure. The potential to revolutionize the way we use the internet is enormous.
Continue reading: 
https://www.forbes.com/sites/forbestechcouncil/2022/02/23/blockchains-and-nfts-in-identification-and-security-protocols/?sh=ec2d92814fc6

Attachments

  • p0007045.m06696.960x0_78.jpg
    p0007045.m06696.960x0_78.jpg
    79.3 KB · Views: 36
  • Like
Reactions: Brianna White

Artificial Intelligence could be a game-changer for India's climate strategy

Every decision brings an element of risk with it. We process the information on risks related to several decisions every day. Simpler decisions could include crossing a road, visiting a grocery store during the ongoing pandemic, or buying a new brand of shampoo. More complex decisions may include making an investment, changing jobs, or entering a relationship. We consider multiple scenarios, using a wide range of known and unknown parameters, and arrive at a decision on the action we will take. Many of these processes happen subconsciously and we may not realize how much data we have processed to arrive at decisions to take 'calculated risks’.
Decisions related to our society’s survival and development are similar but far more complex with much more data to be processed. The volumes of data involved truly turn into what is called big data, when the environment and climate-related context is taken into account. Meteorological scientist Edward Lorenz had come up with the concept of the butterfly effect, according to which the flapping of a butterfly’s wings can change the weather and even cause a tornado in a faraway place. The concept attempts to illustrate the complexity of predicting short and medium-term weather. Make this manifold when trying to deal with long-term climate change.
ENTERS ARTIFICIAL INTELLIGENCE
Processing such large and complex data sets are possible only with the help of advanced computers, and tools such as Artificial Intelligence and Machine Learning (AI/ML). While significant work has happened in the past years on forecasting climate-related risks, the science of determining what impact these risks will have on people is still in nascent stages and requires attention and investment.
Continue reading: https://www.indiatoday.in/science/story/artificial-intelligence-game-changer-india-climate-strategy-1917196-2022-02-24

Attachments

  • p0007044.m06695.ai_and_climate.jpg
    p0007044.m06695.ai_and_climate.jpg
    105.4 KB · Views: 31
  • Like
Reactions: Brianna White

How will AI transform business?

Artificial intelligence is changing the way various businesses sectors work, from marketing, customer service, data research to operations.
Artificial intelligence (AI) has become part of our daily life, whether through search engine algorithms or the use of Siri or Alexa on our mobile phones for translation, taxi requests or math calculations.
Businesses are taking big steps in adopting AI in their daily operations. The percentage of enterprises employing AI has grown by 270 percent over the past few years, according to Gartner, Inc.
Total AI investment by firms globally surged to a record-high $77.5 billion in 2021, up from $36 billion in 2020.
The Global AI Index measures national AI preparedness in 62 countries worldwide across more than 120 indicators. Its key findings reveal that the US has benefited most from this investment drive: US-based companies pulled in two-thirds of total global venture funding in AI in 2021 – or $51 billion worth of investment.
Results have showed that organizations across all industries use AI in a variety of applications, but struggle with acute talent shortages. 
Continue reading: https://www.trtworld.com/magazine/how-will-ai-transform-business-55055

Attachments

  • p0007043.m06694.ai_business.jpg
    p0007043.m06694.ai_business.jpg
    57.4 KB · Views: 32

Data Protection, Privacy and Drones

Background
Drones have long been considered as "eyes in the sky" with all but the most basic consumer models routinely equipped with some form of camera for still or video image capture. More advanced surveillance technologies can combine a sophisticated camera drone's high-quality audiovisual recording and storage capabilities with data analytics tools such as facial recognition software, gait analysis and other biometric assessment techniques to identify individuals for targeted observation. The size and manoeuvrability of drones enables them to monitor individuals at a distance and to follow and track targets, potentially without the knowledge of the person that is subject to surveillance.
As technologies develop and drones become "smarter", the possibilities for data collection are almost limitless. Global positioning system (GPS) is a technology that is often a built-in feature of drones and allows for its location (and that of any surveillance target) to be tracked and recorded. Drones can be equipped with thermal imaging cameras that detect human presence through body heat. It is also possible to use a wifi antenna affixed to a drone to locate individuals via their mobile telephones.
The above examples create obvious tension with legal obligations of privacy and non-intrusion into the personal lives of individuals (as distinct from the personal injury and property damage risks). Many legal systems consider the right to privacy as a fundamental human right and surveillance programmes are often the target of public outrage, political ire and regulatory clampdowns. Direct surveillance by way of drone technology is no less invasive – and potentially more so – than closed circuit television or fixed security cameras.
Even non-surveillance drone activity should be considered through a lens of privacy protection despite the less obvious risks. In many cases, the context of drone use and the type of data collected can create an indirect impact on individuals with a consequent implication under privacy laws. The inadvertent capture of persons (and their activities) recorded by drones used for surveying or research purposes is one example.
Accordingly, the enhanced capabilities and potential of drone-based technologies raises questions as to the obligations to be imposed upon manufacturers and operators of drones to ensure due consideration is afforded to the privacy and data collection implications of drone use.
Privacy & Data Protection Laws: General
Historically, drone regulation has been focused primarily upon safety considerations but increasing attention will need to be paid to privacy and data protection laws. Globally, there are varying levels of maturity in such legislation ranging from comprehensive, principles-based data protection regimes - such as Europe's General Data Protection Regulation (GDPR) or the Australian Privacy Act - to the patchwork of sectoral and state laws in the United States of America. In emerging markets, the situation may be further complicated by the lack of any specific data protection legislation and the potential application of local criminal codes, media and content regulation, copyright or defamation laws.
The GDPR marked a fundamental shift in the European and global approach to data protection regulation by clearly spelling out core principles relating to the collection and/or processing of personal data. In essence, personal data is to be processed lawfully, fairly and in a transparent manner for specified and legitimate purposes. This processing should either be based on the consent of the person concerned or some other basis laid down by law. Moreover, every reasonable step must be taken to ensure that personal data is accurate, relevant and limited to what is necessary in relation to the purposes for which it is processed (‘data minimisation’) and processed in a manner that ensures appropriate security of the personal data.
These principles form the basis of data protection legislation in many other jurisdictions outside Europe. The Australian Privacy Principles (or APPs) are referred to by the national data protection regulator as "the cornerstone of the privacy protection framework" in the Australian Privacy Act 1998 (Cth). They set out key pillars of openness and transparency, accuracy and security that align strongly with the GDPR. In Singapore, the Personal Data Protection Act 2012 establishes requirements for lawful data processing and principles of transparency, purpose limitation and storage limitation. Similarly, State or national laws in Canada, South Africa, Bahrain, Qatar and other territories, as well as the Model Code for the Protection of Personal Information published in 1996 by the Canadian Standards Authorisation, are all similarly principles based.
Privacy & Data Protection Laws: Drone Specific
Increasingly, governments and regulators are moving beyond guidance on the application of existing data protection laws to drone operations and towards the inclusion of more specific drone-related provisions into law. For example, California approved an update to its Civil Code in 2016 that made a person liable for physical invasion of privacy when that person:
"…knowingly enters onto the land or into the airspace above the land of another person without permission or otherwise commits a trespass in order to capture any type of visual image, sound recording, or other physical impression of the plaintiff engaging in a private, personal, or familial activity and the invasion occurs in a manner that is offensive to a reasonable person."
Continue reading: https://www.clydeco.com/en/insights/2022/2/data-protection-privacy-and-drones

Attachments

  • p0007042.m06693.clyde_co_1.png
    p0007042.m06693.clyde_co_1.png
    80.8 KB · Views: 35
  • Like
Reactions: Kathleen Martin

AI & drones top techs in supply transformation - Blue Yonder

Blue Yonder 2021 report reveals heavy supply chain transformation among disrupted businesses, with AI and drones technology topping C-suite priorities
New research from end-to-end supply chain management specialist Blue Yonder found that in 2021 the leading supply headaches for businesses were customer delays (59%), stalled production (44%) and staff shortages (40%).
As a result of this disruption - which affected 93% of respondents - Blue Yonder says the supply chain has become a priority for nearly two thirds of businesses (63%). 
The research gathered insight from 250 supply chain decision-makers, and found they are unsure about what the future holds. Among concerns are long-term effect on supply of the pandemic (37%), the changing regulatory landscape (12%) and lack of investment (7%). 
Visibility need to avoid supply disruption   
“Businesses are right to be concerned when it comes to their supply chain,” says Wayne Snyder, Blue Yonder EMEA VP Retail Industry Strategy. "To stay ahead of today’s supply chain complexities, organisations need to be able to plan intelligently, while having the visibility and flexibility to respond at pace. This can only be achieved by having a real-time, end-to-end view of the supply chain that leverages technologies such as artificial intelligence (AI) to recommend and optimise actions.”
On a more positive note, the research suggests that organisations are mitigating against risk and disruption investing time in supply chain. An overwhelming majority (83%) have increasing investment in the supply chain, with 11% investing more than $25 million.
When asked how they invested budgets, 86% of organisations did so in technology, followed by skills development (60%). Over half of organisations (58%) also invested in supply chain sustainability.
AI top tech for supply transformation
Asked what tech will have the most significant impact on reducing disruption, 53% said advancements in AI, 43% feel it's new delivery options powered by robots and drones, while 42% say it is tech that will allow for better workforce management. 
Continue reading: https://supplychaindigital.com/digital-supply-chain/ai-drones-top-techs-in-supply-transformation-blue-yonder

Attachments

  • p0007041.m06692.gettyimages_1315733319.jpg
    p0007041.m06692.gettyimages_1315733319.jpg
    130 KB · Views: 35
  • Like
Reactions: Kathleen Martin

Catapults and drones: Aerospace companies look to inspire students through hands-on projects

GRAND FORKS — Northrop Grumman has been involved with Engineers Week for decades, and it is a tradition the company is continuing at schools in the Grand Forks region, with some local help.
On Wednesday, Feb. 23, Mike Fridolfs, site director of Northrop Grumman’s Grand Sky location, teamed up with home-grown aviation and aerospace company ISight Drone Services, to bring engineering and unmanned systems activities to middle school students. Fridolfs and representatives of the two companies visited Nathan Twining Elementary and Middle School at Grand Forks Air Force Base and the public school in Emerado, with mini drones and popsicle stick catapult kits.
Fridolfs said he is hoping the activities will help inspire the next generation of engineers and inventors, some of whom may take an interest in working at an aerospace company in the region.
“Engineers Week is an exciting time for us at Northrop Grumman, and each year we look forward to bringing learning opportunities to our local students in Grand Forks and surrounding areas to show them the future of autonomous technologies,” he said. “We’re encouraging a future generation of engineers who will help deliver innovative, quality products and services to promote global security and human advancement. Who knows, maybe this week we’ve inspired the next Hedy Lamarr or Thomas Edison.”
Read more: https://www.grandforksherald.com/news/local/catapults-and-drones-aerospace-companies-look-to-inspire-students-through-hands-on-projects

Attachments

  • p0007040.m06691.catapults_and_drones.png
    p0007040.m06691.catapults_and_drones.png
    331.8 KB · Views: 36
  • Like
Reactions: Kathleen Martin

What role will drones play in the future of law enforcement?

News of the world’s first lung transplant via drone delivery conducted recently in Toronto has shone a spotlight on how drone technology can be leveraged in emergency services and law enforcement now and in the future.
What if drones could help police officers see a crime scene before they arrive? What if they could keep out of harm’s way by having a machine take their place as their eyes and ears?
In Canada, there are drones in use by law enforcement already, but the technology still comes at an extremely high price with limited functionality, making it a barrier to widespread adoption.
This is why companies like SOTI made emergency services one of the focuses of its new Aerospace Division. The division, launched last year in collaboration with Ryerson University, was created to research, design and produce drone software and hardware capable of a variety of functions within healthcare and emergency services, as well as warehouse and distribution.
Law enforcement teams across North America are working very closely with technology innovators to secure mobile technology management solutions in order to deploy the mobile devices officers need to operate at peak performance.
As this technology becomes a future reality, here are five uses for drones in law enforcement that could be achievable in the next three to five years.
Chasing suspects: Having a police officer chase a suspect can be dangerous for several reasons; the suspect could be armed, or in the case of a car chase, the chances of an accident are increased when travelling at high velocities and/or in heavily populated areas. By having a drone assist with this role, the element of risk to the officer or bystanders is removed. Drones are also much more effective and faster at tracking, providing officers with an advantage in being able to apprehend a suspect.
Search and rescue: Using drones in search and rescue missions yields two major advantages. In the case of a missing person, using a drone to locate them – especially in treacherous terrain – is a safer and more effective method than putting officers in a potentially dangerous situation. In the case where a person is in a hazardous area, drones can be used to scout and map the location to best prepare officers for the scenario they are about to engage in. Drones can even use an array of sensors to detect factors including motion, heat, weather, or even toxicity levels such as carbon monoxide.
Continue reading: https://www.blueline.ca/what-role-will-drones-play-in-the-future-of-law-enforcement/

Attachments

  • p0007039.m06690.soti_aerospace_droneonclouds_800x450.jpg
    p0007039.m06690.soti_aerospace_droneonclouds_800x450.jpg
    26.1 KB · Views: 36
  • Like
Reactions: Kathleen Martin

We need to set our mind to win, the ecosystem will fall in place, says Priya Athreyee of Accenture

“The power of belief leads to success,” says Priya Athreyee, about her illustrious career at Accenture, spanning around two decades.
Priya currently leads the Automation Delivery team for Technology for Operations globally. She delivers automation solutions to clients across industries in Accenture Operations. Prior to this role, she was working as global deployment and change management lead for Accenture’s automation platform myWizard as part of Accenture Technology.
In the past 18 years, Priya has played diverse roles within the organisation. She has a deep and long experience in leading large-scale changes in systems and processes both in India and globally as well as in driving automation journeys for several diamond clients. Alongside this, she passionately drives inclusion and diversity and leads the I&D teams in various roles at India and market levels.
In a conversation with HerStory, Priya gave us a sneak peek into her journey at Accenture and what it truly means to be a woman in operations.
Edited excerpts from the interview:
HerStory (HS): You’ve spent over 18 years at Accenture across departments. How have you dealt with challenges along the way?
Priya Athreyee (PA): It’s OK to be thrown into the deep end. That’s how one learns to adapt to the changing environment.” These wise words from a leader pretty much sums up how I navigated the unfamiliar avenues in my career journey over the last two decades. I believe the power of belief leads to success.
HS: A journey of two decades comes with a box full of lessons. Tell us about your 18-year-old stint.
PA: In these 18 years at Accenture, I have been persistent in terms of learning, shifting gears, and changing roles - it puts you in charge of what you want to achieve in the long run. Even though I come from a non-engineering background, I broke new ground, often picking up roles that did not conform to the desired skills and knowledge parameters. My leaders have pushed me to step out of my comfort zone and take a crack at varied roles.
Continue reading: https://yourstory.com/herstory/2022/02/accenture-priya-athreyee-women-operations/amp

Attachments

  • p0007037.m06688.image6dr3_1644517247911.jpg
    p0007037.m06688.image6dr3_1644517247911.jpg
    84.8 KB · Views: 40
  • Like
Reactions: Kathleen Martin

Working In Tech At Any Age–This Engineer Tells You How

The tech space has a reputation for being less friendly to older workers. But Mike McNatt, now in his fifth decade in the industry, knows how to keep the work coming. On the day we spoke, he had three interviews booked. 
Here's how he does it.
Enthusiasm
When asked the secret to his success, McNatt gives enthusiasm the highest marks. Not only is he passionate about the work, but he also enjoys meeting people. For example, McNatt has offered to drive an hour to meet a recruiter instead of having yet another online meeting. However he shows up, not only does he bring his passion, but he also brings decades of experience.  
McNatt has been playing in the tech space since the age of 12 when he first started visiting the neighbor's electronics shop. Although he's honed many skills since his first job in 1969, McNatt gravitated to test engineering, EMC testing and safety compliance where he’s developed a deep expertise.
It's in these roles that he finds the most opportunity. 
Flexibility
One of McNatt's best tricks for securing work is the willingness to accept contract positions versus full-time roles. He encourages others to give contract work a try if they are struggling to find a job. It doesn’t work for everyone, but it is a good way to stay in the game.
He also suggests paying attention to developing trends, such as the increasing number of jobs for part chasers. Not only is there a chip shortage, McNatt explained, but other electronic components can also be very hard to get.
A million transistors are nothing on an integrated circuit, which explains why there are part chasers eagerly scouting for chips at $35 an hour. Now companies are setting up part chaser departments to run down part substitutes.  
Networking
 
Another constant when job searching in the tech space is aggressive networking.
"I have found that recruiters are the main source of contract positions. Connect with several dozen in your career area, then keep in contact every few weeks. A simple "checking in" LinkedIn message will do. Always include a comment like, "let me know if I can help find a candidate for one of your open positions." 
To help other unemployed techies find work, McNatt wrote about his job-hunting experiences in a series of articles he published on LinkedIn.
Continue reading: https://www.forbes.com/sites/sheilacallaham/2022/02/23/working-in-tech-at-any-agethis-engineer-tells-you-how/?sh=5cd471432f01

Attachments

  • p0007036.m06687.silicon_wafer.png
    p0007036.m06687.silicon_wafer.png
    422.2 KB · Views: 41
  • Like
Reactions: Kathleen Martin

Q&A: Women need to be leaders in internet governance

Learning how to code changed Baratang Miya’s life.
Miya is the founder and head of GirlHype, a non-profit that empowers disadvantaged young women and girls to connect to the digital world, learn how to write code and build a career in tech.
Miya tells SciDev.Net that her message to the United Nations Internet Governance Forum in December was that women must be included in internet governance to ensure that girls and women are not left behind.
Why focus on technology? What can coding offer girls and women that other fields can’t?
You learn problem solving … and it builds girls’ tenacity and resilience. They learn how to programme and set content, you can’t get that anywhere else. They live in these environments where the problems exist, and problems create opportunities. Somebody’s looking out and says ‘there’s a lot of issues in Africa’. I’m looking at it and feeling like, ‘wow, so many opportunities in Africa and they need to be solved’.
One graduate who stands out for me is a girl from Khayelitsha, a little town in South Africa. She came from poverty. She learnt HTML, CSS, went on to Python, and Java became her best language. She went straight from high school at age 18 to work for Microsoft as an intern. Within two years, she was living in one of the high suburbs of South Africa. Seeing her changing her whole family’s life was mind-blowing.
Continue reading: https://www.scidev.net/global/role-models/qa-women-need-to-be-leaders-in-internet-governance/

Attachments

  • p0007035.m06686.miya_baratang.jpg
    p0007035.m06686.miya_baratang.jpg
    56.8 KB · Views: 44
  • Like
Reactions: Kathleen Martin

5 Reasons To Break The Bias Around Women In Tech for IWD

When I was working on my book Breaking the Gender Code, it was my son who helped me to see that the biases around gender are a type of coding, inspired by his own computer coding lessons at school. We’re coded by the Gender Code to see men and women as intrinsically different. And to lean into stereotypes around men being better at STEM and women being better at creative and caring roles.
So in honour of IWD 20222, here’s five ways we need to break the bias and ditch the out of date Gender Code:
For parents, carers and role models who want to help break the bias from the start:
1. Early intervention matters
Gender stereotyping starts from birth, with studies revealing toddlers are spoken to differently, based on their gender. Boys are typically spoken to about counting and numbers as much as three times more than girls, and another study found that in museums, boys are engaged with 2-3 times more than girls.
By setting these biases and limiting beliefs early, we’re clipping the wings of young girls who might actually love a future working in technology and STEM.
Break the BiasBabies and children are naturally curious, so encourage their natural curiosity and nurture their unique interests, rather than looking at them through a gender lens. Encourage girls in primary and high school to see tech and science as exciting prospects for jobs and careers, while at the same time encouraging boys to consider more ‘caring’ careers rather than being pigeon-holed into traditionally male roles.
For leaders, decision makers and people who have the power to effect change in tech businesses:
2. Hiring more women
While we’re seeing more women in tech roles and interviewing for tech roles, there’s still a huge barrier for women in terms of unconscious and conscious bias in the hiring process.
Diversity and gender targets can help with this, but we need to break the biases and remove any barriers to women entering the sector.
Break the Bias: Putting forward anonymous applications for jobs that don’t mention name/gender can help, and so can looking at female-only recruitment for roles, in order to level out the playing field.
Read more: https://womenlovetech.com/5-reasons-to-break-the-bias-around-women-in-tech-for-iwd/

Attachments

  • p0007034.m06685.danielle_dobson_blog.png
    p0007034.m06685.danielle_dobson_blog.png
    1.1 MB · Views: 41
  • Like
Reactions: Kathleen Martin

Women in Tech: “Find a place where you can gain experience and thrive”

research study by The National Center for Women & Information Technology showed that “gender diversity has specific benefits in technology settings,” which could explain why tech companies have started to invest in initiatives that aim to boost the number of female applicants, recruit them in a more effective way, retain them for longer, and give them the opportunity to advance. But is it enough?
Four years ago, we launched a diversity series aimed at bringing the most inspirational and powerful women in the tech scene to your attention. Today, we’d like you to meet Andrea Nagel, Product Leader, Digital Transformation at VMware Tanzu Labs.
Today’s Woman in Tech: Andrea Nagel, Product Leader, Digital Transformation at VMware Tanzu Labs
Andrea Nagel is a Product Leader at VMware Tanzu Labs, where she focuses on Digital Transformation projects, particularly in App Development & Modernisation. Andrea has over 10 years’ experience in product management for a range of companies, and is driven by a desire to build and retain diverse, successful teams within the product field.
When did you become interested in technology? What first got you interested in tech?
My interest in technology started when I was a kid playing with devices we had at home. I was excited by the creative side of computers and digital games, and enjoyed sketching out concepts and ideas for new games. I also spent a lot of time making movies with a simple Movie Maker CD Rom.
As I got older, I found I gravitated towards technology when opportunities came up. I remember jumping at the chance to build an online magazine at university – I taught myself basic HTML & CSS to win the job. So, the interest was always there, from an early age.
Continue reading: https://jaxenter.com/women-in-tech-nagel-176723.html

Attachments

  • p0007033.m06684.ek_wit_2048x848_60901_v1_nagel_768x318.jpg
    p0007033.m06684.ek_wit_2048x848_60901_v1_nagel_768x318.jpg
    37.2 KB · Views: 49
  • Like
Reactions: Kathleen Martin

3 Ways AI Will Change Revenue Technology in 2022

For the past 15 years, B2B revenue teams have been generating enormous volumes of data, in tracing the steps towards digital transformation. However, effective use of that data has, until now, lagged far behind. 
 There are two big reasons for this: First, while the majority of B2B buyer, seller and customer interactions are digital, collection and storage of interaction data have been inconsistent, and that has left significant blindspots in the collected data. 
 Second, the capabilities required to derive insights and action from the data had yet to be productized and made available for the masses of B2B organizations. AI is changing that and more in the revenue technology landscape. That will mean huge advances in what revenue teams can accomplish in the year to come.  
1. AI Will Unlock Insights and Illuminate Blind Spots
 AI is now making it possible to collect and log nearly every buyer interaction, illuminating blind spots and enabling a much more complete, high-definition view of the B2B buying process. 
 With this will come new insights about things like the volume and intensity of buyer interactions, the length of solution research, decision-making processes, and much more. 
Continue reading: https://www.toolbox.com/marketing/ai-in-marketing/guest-article/ai_changing_revtech/

Attachments

  • p0007030.m06681.artificial_intelligence_future_technology_and_business_concept.jpg
    p0007030.m06681.artificial_intelligence_future_technology_and_business_concept.jpg
    18.4 KB · Views: 39
  • Like
Reactions: Brianna White

Filter