Search This Blog

Monday, November 2, 2015

A cloudy forecast

from Cisco's Global Cloud Index report)
Cloud usage is set to quadruple by the year 2019 due to the demands of IoT, business processes and mobile applications, according to Cisco's fifth annual Global Cloud Index, which the company released this week. The forecast also predicts a huge surge in cloud service usage.
Indeed, "enterprise and government organizations are moving from test cloud environments to trusting clouds with their mission-critical workloads. At the same time, consumers continue to expect on-demand, anytime access to their content and services nearly everywhere," said Doug Webster, Cisco's vice president of service provider marketing, in a press release for theCisco Global Cloud Index (2014-2019).

read more in  Cisco's Cloudy Forecast

Wednesday, October 21, 2015

Ho hum, another hack

Hacking is so common today that even major data breaches may be filed under the "hack du jour," but what's the answer -- laws and stronger penalties, threat-intelligence sharing or sharing responsibility across the business all the way to the top?
Read more in 

Tuesday, October 6, 2015

Smartphones are key for hotel rollout

In the future, hotel keys may be regarded as quaint, as guests will open doors with their own smartphones.
On August 11, Hilton Worldwide added a new feature to its Hilton HHonors app, the Digital Key. The hotel anticipates rolling it out to 250 Hilton properties in 2016, a brand that includes Waldorf Astoria, Contrad, and Canopy. The hotel chain had already offered digital check-in, but this allows guests to use their phones not only to reserve and register their rooms but to open them, eliminating the need to stop at the front desk altogether.
Credit: Flickr
Credit: Flickr
Hilton is not the first chain to enable guests to use their smartphones as their room keys. The option has been offered at select locations of hotels chains, like Starwood. It’s a growing trend, according to Robert Cole, founder and CEO of RockCheetah, a hotel and destination marketing strategy and travel technology consulting practice. Cole anticipates a lot more hotels will adopt keyless entry options in the next few years. I spoke to him about the benefits that keyless systems offer the hotel industry.
Read more in 

Smartphones Open Doors, Literally

Tuesday, September 22, 2015

Iot enables JIT

"Fast, good, or cheap; pick two." That used to be the motto for manufacturing, as the
https://upload.wikimedia.org/wikipedia/commons/7/7e/Manufacturing_equipment_095.jpg
reality was you'd have to compromise on at least one of the three. However, today's technological advances like drones and 3D printing combined with advanced data collection make the inventory strategy of Just-In-Time (JIT) inventory more feasible than ever before. As a result, manufacturers now have the possibility of making their supply chains fast, good, and cheap. "This is nothing less than a paradigm shift in industry: the real manufacturing world is converging with the digital manufacturing world to enable organizations to digitally plan and project the entire lifecycle of products and production facilities," observed Helmuth Ludwig, CEO, Siemens Industry Sector, North America.

Read more in

JIT: The Promise of Emerging Tech for Electronics Manufacturing

Monday, September 21, 2015

A Wakeup Call for the Industry

It's the stuff of nightmares. You're driving a car but can't control it. You try to brake, but it refuses to stop. That's the scenario that Andy Greenberg vividly described in his article, "Hackers Remotely Kill a Jeep on the Highway—With Me in It."
The article went viral and finally got the public's attention about what the pair of researchers behind it—Dr. Charlie Miller from Twitter security and Chris Valasek, director of the Vehicle Security Research—have been trying to get across for years....
The suit against Chrysler and Harman points out that Miller and Valasek had alerted the companies to the vulnerability ahead of time, so they knowingly passed on a potentially dangerous product to customers. The danger is not "unique" (as Harman put it) to Chrysler or even to infotainment systems.
Another publicized car hack hit the news last month. University of California computer security professor Stefan Savage's research team demonstrated a successful hack of a Corvette through SMS messages. You can see it at work in this brief video.

- Read more in: http://www.baselinemag.com/blogs/a-wakeup-call-for-the-connected-car-industry.html#sthash.7lKlh8Qi.dpuf

Friday, September 18, 2015

A game-changer for football

Many brands boast of being “The official… of the NFL.” This season, a technology company called Zebra claims a more unique position. It’s the Official On-Field Player-Tracking Provider of the National Football League.
With this partnership between the technology company and the NFL, the game played between the New England Patriots and the Pittsburgh Steelers last night represents more than just a season opener; it was a game-changer.

Credit: Pixabay
Credit: Pixabay
The September 10 game represented a first for fan access to Next Gen Stats” in real time. While the NFL has used Zebra information from thousands of plays over the past couple of years, the information was retained internally or shared for broadcast. This was the first game to make it directly accessible to fans through the NFL app for Microsoft's Xbox One
Read more in 

A Data-Driven Game-Changer for Football

Thursday, August 27, 2015

The trust factor for IoT

pic from https://farm8.staticflickr.com/7296/15768208714_9f9376cc7d_o_d.jpg


We talk a lot about IoT, referring of course, to the Internet of Things. But perhaps we should be thinking of making the T stand for trust. That’s what some are working on now in establishing industry standards to be worth of trust by committing to adopt best practices.

Essentially the OTA's best practices and standards boil down to two overarching considerations. One: Device manufacturers have to consider how they will secure the data collected on their devices. Two: The consumer has to be clearly informed about the nature and extent of the data collected. Having that information allows the potential purchaser to know exactly what they would be getting into with the Internet of Things (IoT) device, and whether or not they consider the gains are worth the risk. Having a universal standard also makes it clear how one company compares to another with respect to data privacy and security.

Read more in