Category Archives: Technology

AROUND THE CLOUD: What’s Making Tech News Today

AROUND THE CLOUD: What’s Making Tech News Today

Around The Cloud

Three big stories dominate the web this Tuesday morning and signal huge shifts in the industry landscape; two involving Google and one regarding Apple.

Let’s take a quick look:

Google’s cloud services received a major endorsement with the news that streaming music service Spotify will be moving its technology to the Google Cloud Platform. The Swedish-based leaders in streaming music are not putting all their eggs in one basket, retaining some of the services of Amazon’s CloudFront and Simple Storage Service, but tech blog Engadget reports that “it’s migrating its core computing infrastructure (or its backend), which it uses to store and process data, from its own data centers to Google Cloud Platform.”

Spotify has been effusive in its praise of Google and the work it has put into its cloud infrastructure. “What really tipped the scales towards Google for us, however, has been our experience with Google’s data platform and tools,” said Nicholas Harteau, Spotify VP of Engineering. “Good infrastructure isn’t just about keeping things up and running, it’s about making all of our teams more efficient and more effective, and Google’s data stack does that for us in spades.”

Another Google-owned company, Boston Dynamics unveiled its latest technology, a droid which it is calling Atlas, via a YouTube video which showcases the machine’s capabilities. The company has become well known for the capabilities of its robots and how they respond when kicked or pushed or fall over and this new release is no exception. The robot is seen opening doors, keeping its balance while walking through the snow and picking up 10lb boxes and stacking them on shelves. When it is pushed over it manages to get up quickly and efficiently. Atlas gives us a clear indication of just how close we actually are to having machines that work alongside us in everyday human situations.

Finally, Apple continues to argue that a federal judge has no right to force it to create a software workaround which would sidestep the built-in encryption that is part and parcel of every iPhone. The Cupertino-based tech giants have hired high-profile lawyer Theodore Boutrous, Jr. to argue that it is well within its First Amendment rights to not unlock the phone which was associated with a high-profile terror attack in San Bernadino late last year.

Boutrous told the Los Angeles Times that “”The government here is trying to use this statute from 1789 in a way that it has never been used before. They are seeking a court order to compel Apple to write new software, to compel speech.” He went on to add that “it is not appropriate for the government to obtain through the courts what they couldn’t get through the legislative process.

The company will formally file its response to the court order this Friday.

By Jeremy Daniel

2016 Connected Enterprises Report

2016 Connected Enterprises Report

Connected Enterprises Report

Dimension Data’s 2016 Connected Enterprise Report is out, discussing collaboration trends, insights, and strategies in the digital age. With the promise of lower costs coupled with greater productivity, increased agility and better customer engagement, collaboration technologies are providing tools for real-time communication, file sharing, project management, and social networking which benefit product development, competition response, employee efficiency and more.

Connected Enterprise Report - Infographic_001

Fundamental Discoveries

  • 40% of organizations lack a defined unified communication and collaboration strategy.
  • Increased productivity is the most important collaboration strategy (19%), and increased sales the second (14%).
  • Only a paltry 4% of organizations use return on investment (ROI) as the primary assessment of collaboration technology success.
  • One out of four IT departments measure collaboration project success on the implementation of the technology rather than how well it’s used and adopted, with 17% or organizations not implementing collaboration training programs, and 16% of travel policies remaining unchanged and thus offering no encouragement to utilize collaboration tools.
  • A massive 81% of enterprises believe collaboration has enhanced customer engagement and improved customer service.
  • While 88% of organizations say decision-making processes have been improved through collaboration, many struggle to leverage collaboration to improve their competitive positioning.
  • Though currently only 20-25% of enterprises rely on hosted collaboration services, nearly a third of IT departments consider moving unified communication and collaboration to the cloud to be the most significant technology trend influencing their collaboration strategies.
  • The majority of businesses combine line of business and IT insights when selecting, purchasing, and implementing collaboration technology.

Productivity, Teamwork, and Profit


These top objectives for collaborative enterprises rely on streamlined communications which make it easier for employees to interact from anywhere, at any time, via any device, and through any app, breaking down both organizational and geographical barriers and allowing people to share knowledge and quickly take action. Contact centers using collaboration tools are also better able to facilitate communication and teamwork, ensuring improved customer service, while the reduced need for air travel and hotel expenses lowers costs significantly in global organizations without the loss of face-to-face interaction.

The top five single most important objectives of collaboration are:

  • Improve individual employee productivity;
  • Improve sales/revenue;
  • Accelerate decision-making;
  • Reduce business expenses;
  • Improve teamwork among employees.

Cloud Migration

With the cloud now essential to most businesses, cloud technology is the principle platform allowing enterprises to deploy applications efficiently, cost-effectively, and at scale, and migrating collaboration applications to the cloud has become central to many enterprises’ abilities to make collaboration technology available to the greatest number of users in the most cost-effective way. Top technology trends affecting most organizations’ collaboration strategies are:

  • Adopting collaboration applications as hosted services, rather than deployed on-premise – 27% of IT departments consider this to be the most important trend affecting their collaboration strategies.
  • Adopting collaboration applications via a subscription model, rather than more traditional licensing – 14% of IT departments consider this the most important trend.
  • Moving collaboration applications to private data centers, rather than running them on dedicated hardware – 10% of IT departments believe this to be the most important trend.

The many reasons for moving collaboration to the cloud are an assorted set of strategic, operational, and financial motivations, but significantly observed is the potentially lower costs of cloud (at least initially), and when adopted as a hosted service, these costs can become operational rather than capital expenses. Furthermore, administration and updating of applications is easier in the cloud, ensuring less onerous management processes. Those with an organization-wide cloud strategy in place are likely to take the cloud direction for their collaboration applications, but currently, 75% of collaboration applications are deployed on-premise, and so it will still be some years before many enterprises entirely migrate collaboration technology to the cloud.

By Jennifer Klostermann

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem

It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls systems, retail terminals and scanners, and kiosks to medical devices, heating and lighting systems, connected homes, and smart cars.

Identity and authentication for the IoT enables the use of foundational information security concepts, including confidentiality, integrity, availability, authentication, and non-repudiation. At the core, identity binds credentials. It allows an operator to well manage IoT devices, define access, set policies, and secure communications to protect devices and data. But within the Identity of Things (IDoT), how does one clearly define the credential and the accompanying authentication and encryption services?

Identity and Access Management

The Cloud Security Alliance (CSA) first raised this issue back in September 2015 when the organization released a Summary Guidance on Identity and Access Management (IAM) for the IoT. Within the document, the CSA emphasized the importance of properly identifying things in order to enable authentication, encryption, and data integrity in an ecosystem. Currently, there are more than 20 different study groups, consortiums, alliances, and standards initiatives working toward creating a secure framework for the IDoT.


(Image Source: Shutterstock)

Issues such as scale, power and computational constraints, ruggedized requirements, energy limitations, increased number and variation of connectivity protocols, and cost factors, among others, make it difficult to simply impose a legacy enterprise IAM or credential management solution. Furthermore, while scenarios for IoT authentication are numerous, there are three notable challenges: token-based authentication currently only works for HTTP, symmetric key mechanisms require input at manufacture, and standard Public Key Infrastructure (PKI) is generally considered impracticable for constrained environments.

Cybersecurity Obstacles 

The three obstacles are ones the cybersecurity industry is working diligently to overcome. For token-based authentication, new methods need to be devised for all the new connectivity vectors (cellular, Bluetooth, Wi-Fi, NFC, RFID, etc.), either as one, convergent authentication method or one for each vector. Both approaches will require significant research and development.


Alternatively, and with some modifications, symmetric key mechanisms can be adapted for the IDoT. For example, Digital Short Range Communications (DSRC), used in vehicle-to-vehicle communications, supports a much smaller certificate structure than the standard X.509. Meanwhile, the use of certificates requires some form of central mechanisms and management structure, such as PKI. In fact, many (and notably certification authorities) tout PKI as the contending standard for identification, encryption, and authentication of IoT devices, but traditional PKI does not scale well for the IoT. A more dynamic key architecture may need to be developed. Essentially the method chosen will depend on the constrained devices in question and their respective environment.

From a private sector perspective, a number of firms are already promoting authentication, identity, and related management services to address the challenges head-on. The movement in the private sector is dynamic, with numerous firms—from startups to big players in the enterprise IAM and authentication and key management space—investing in the IoT market. While some are offering data-centric security platforms for IoT and M2M, others are developing cloud-based IoT security platforms to create and manage digital identities. The solutions are wide-ranging and varied.

In all, the IDoT market opportunity is still nascent, but it is evidently expanding quickly. Most pressing is the development of adapted identity solutions. These solutions will need to revolve around data centric encryption, dynamic certificates and key architecture.

By Michela Menting

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

Will GPS, The Cloud, And The IoT Enable A New Level Of Mass-surveillance?

New Levels of Mass-surveillance?

There’s a dark cloud hanging over the cloud. Recently, US security chief James Clapper blithely revealed that the government “could” use the Internet of Things for civilian surveillance.

Given the heightened alarm caused by domestic terrorism, I take it the word ‘will’ is more applicable than ‘could’ in this case. If the FBI is capable of making the chilling’ request that Apple build a backdoor into the iPhone, it’s capable of requesting the same of the IoT. Tim Cook makes a fine point when he says bad actors would find means of encrypting iOS to circumvent the backdoor. This mirrors a point I will make about surveillance and the IoT.


(Infographic Source:

But first, how did we get here? Are the IoT and the cloud on which we store data a Trojan horse, a way of sneaking constant government surveillance into our lives?

In terms of the IoT, I’d like to argue it all began with a technology we sometimes take for granted: GPS. The US government started the Global Positioning System project in 1973. It has enabled a variety of innovations that are precursors to the IoT. In turn, the IoT may enable a whole new level of government surveillance.


GPS is essentially a web of 32 satellites that collect geographic and chronological data, transmitting it via radio waves to antennae, monitors, and receivers on the ground.

First, satellites communicate with a Control Segment, which consists of several master control stations, four antennae, and six monitor stations.

The Control Segment sends signals to the User Segment, which consists of hundreds of thousands of receivers in the hands of military, scientific, commercial, and civil personnel worldwide.

Finally, the civilian segment employs the accurate locational and chronological data for everything from astronomy to automotive navigation.

GPS and private sector innovation

Before 1996, any sort of private sector GPS-related business involved contracting with the military. Then, Bill Clinton made the network available to civilians. But the signal wasn’t very reliable until 2000, when Clinton discontinued ‘selective availability’, which scrambles the signal.

The government originally had selective availability in place for security reasons. After Clinton cut it, Geocaching, invented by a GPS enthusiast named Dave Ulmer, helped popularize GPS with consumers. The combination of metal detecting and Geocaching is an early example of the technological synthesis that characterizes the IoT.


GPS receivers began popping up in cars, mounted on the dashboard or rearview mirror. In 2004, Qualcomm succeeded in integrating GPS with mobile phones. That same year, Dutch company TomTom invented the PND (Personal Navigation Device), a touchscreen GPS unit with software that prefigured smartphone GPS apps.

Google debuted its free navigation system for Android in 2009. By then, stand-alone GPS from the likes of Garmin and TomTom had lost out to apps. These brands then began to market premium navigation apps for iOS and Android. Meanwhile, brands were discovering they could mine user location data, paying apps for the wealth of data accumulating on the cloud.

Some auto manufacturers also began incorporating onboard GPS, and the possibility of the autonomous car, one of the harbingers of the IoT, started to look real. Gig startups such as Uber and Lyft developed apps that depend to a great extent on GPS. Automated tractors from brands such as John Deere, Case IH, and New Holland have been mobile since 2008.

In Finland, Volvo is using GPS to warn drivers about the location of herds of elk. The warning system incorporates GPS tracking, animal-vehicle collision statistics, and analysis of wildlife movement patterns. If and when the roads become smart roads, as would be the case with the IoT, sensors in the road and other locations could relay data about elk to the cloud, where it would then be analyzed in combination with GPS data to provide an alert to the driver—or to the autonomous vehicle.

Geolocation apps such as Foursquare, Gowalla, and Brightkite are bringing A-GPS (Assisted GPS, which uses cell-sites and, sometimes, Wi-Fi networks to triangulate with satellites for greater accuracy) into the social realm. These apps incorporate location check-ins, social networking, events, and games in an effort to make GPS fun.

GPS, the IoT and government surveillance

Each smartphone, and any smart device, has a GPS chip in it. In my opinion, GPS is the baseline enabling technology for the IoT. Because of it, we realized we could track objects with radio waves—thus RFID. Other specialized sensors, such as optical tags and quick response codes, only need to be added to provide qualitative information. And of course Wi-Fi is in the mix.

If the FBI succeeds in using the All Writs Act of 1789 to break Apple’s encryption, it will set a precedent for the IoT as a massive surveillance tool. Since the IoT is essentially a network of GPS-enabled smart objects, the FBI will know exactly where we are at all times. Information we store on the cloud would be fair game, too.

The FBI’s argument is that they want to hack smartphones to catch the bad guys. Why do we have to be so concerned about our privacy when this would go towards deterring crime?

The principle of privacy, that’s why. And criminals will be aware of government surveillance. Terrorists will know that to remain undetected they’ll need to remain off the smart network or implement additional encryption. As we’re seeing with groups such as Isis, they’re technologically savvy. They would only need to train and hire good hackers.

We’re now witnessing an era when the private sector innovations with GPS, the cloud, and IoT may become tools for government use. It all hangs in the balance as the IoT advances.

By Daniel Matthews

The Difficulties Of Operationalizing Big Data

The Difficulties Of Operationalizing Big Data

Operationalizing Big Data

Practically everything is digital now – if not at the moment, it definitely will be in the near future.

This big change caused the creation of something we call Big Data. Each time people use their smartphone, create a new profile on a website, purchase an item or update their social platform, the amount of available data grows.

Most companies have become aware of the massive potential of using Big Data, but detailed analysis of such data needs to become the norm in this modern age. However, many are experiencing difficulties with data consolidation, and don’t really know how to operationalize Big Data. There are a number of problems associated with this process that need to be addressed.


(Infographic Source: Domo)

The Numbers Are Huge

An amazing and a bit of a scary fact about Big Data is that over 2.5 exabytes of new data is created on a daily basis. But that’s not all – those numbers are growing month after month. It’s very difficult to comprehend the amount of information available, let alone manage it properly. This information, which eventually creates a data pond, doesn’t come just through the internet, but also through customer data collected by businesses and large corporations.

During the last 20 years or so, businesses have based their advertising strategies on this type of data. In one survey that has been conducted recently, with about 1000 participants from different industries, over 70% of them stated that Big Data is of crucial importance to their business.

Diversity Is a Problematic Factor

If something is measurable, it can be managed. Obviously, we’re aware of the growing amounts of data arriving each second – that’s actually equal to all of the information stored on the internet twenty years ago – but that doesn’t make things any easier, because of one problematic little factor – diversity.


(Image Source: Shutterstock)

It doesn’t really matter where the data is coming from – social platforms, GPS signals, smartphones, etc. – because most of it has one thing in common; they are relatively new. This incredibly fast jump forward in all areas of technology makes it quite difficult for Big Data to be properly stored and efficiently managed.

Most businesses are starting to migrate to the cloud. As this continues to happen, the diversity of Big Data will keep on growing, expanding and become more and more difficult to control.

Most Companies don’t have the Proper Methodology

The way that companies currently control and manage these huge data sets is by placing them in a pattern that can be properly analyzed by already existing methodologies. As we just mentioned – the way business is done is changing, so it’s a matter of time when this will turn into a huge problem. It’s not enough to just load a large amount of data without an efficient way of structuring it to allow for greater accessibility and information.

Where to Start?

The general problem with Big Data is that it’s being improperly structured. Well, actually, not structured at all. Look at it this way – imagine a huge storage space that’s filled with piles and piles of items that are nothing alike. The first thing to do here is to get those piles sorted into categories.


Things like metadata tags that would allow you to structure the data more efficiently, and rules that can be set up to determine the way certain types of data need to be stored and modified, and if any information needs to be masked. In other words, the data that is loaded has to form a comprehensive “skeleton” that allows data analysts to quickly extrapolate tactics and strategies. Additional attention should be paid to securing all this information.

All in all, some changes are in order. Each and every customer or client is a data transmitter, so to speak, and are witnessing a sort of informational evolution. With huge amounts of information gathering into data lakes, it is important to set ground rules that help create a basic structure for storing all the available data, so that it can be efficiently accessed and analyzed. After all, it is the monotonous grunt work that sets the stage for grand business strategies.

By Pavle Dinic

How To Use Big Data And Analytics To Help Consumers

How To Use Big Data And Analytics To Help Consumers

Big Data Analytics

Businesses are under increasing pressure to develop data-driven solutions. The competitive advantage gained by a successful strategy can be immense. It can create new opportunities and help businesses to react to different scenarios or sudden changes in the market. But innovation and resilience are not easily achieved, and organizations always face difficult decisions about what data to collect and how to leverage insights effectively.

Even today, companies are still unsure about how to use the data they collect, with differences between C-suite executives reflecting wider organizational divisions. But, by looking at organizations that use data and analytics to identify and help consumers successfully, a few useable insights emerge.

Think Big, Start Small

The scale and technical challenges involved in big data and analytics projects can be a problem, especially when paired with lofty expectations and the high fixed costs involved in research and development. These barriers can make it difficult for small companies to keep pace with larger ones who have bigger budgets and access to the latest technology.


One way that small and big companies alike can exploit the disruptive potential of big data analytics is by starting small, with a clear focus on a single area and application. By increasing – and demonstrating – the value of big data and analytics in one area, such as customer support and relationship management (CRM), before moving on to the other applications, you can build expertise and understanding, with the benefits filtering down to other parts of the organization bit by bit.

Invest in Talent

Lack of talent is one of the main obstacles faced by small and medium-sized businesses looking to implement big data and analytics strategies. Many struggle to find people with the high-level skills necessary to conceive and run a big data and analytics project. With technical expertise a prerequisite for success, it’s no surprise that organizations with the largest budgets tend to attract much of the best talent. Online giants like Amazon, whose recommendation engine is a standout example of the potential of big data, or new peer-to-peer companies like Uber with sophisticated data-driven models and large pots of venture capital, find it easier to innovate and stay ahead.


(Image Source: Shutterstock)

Smaller B2C companies need to ensure they overcome the skills shortage by adopting a variety of carefully targeted measures. Here the importance of arranging external or internal technical training for existing staff, and creating a data-driven culture in which analytics informs understanding of customer demand, should be underlined. This may mean turning to consultants or contract employees, at least in the short term, to build internal resources through the transfer of knowledge and expertise.

Overcome Security Challenges

Any commercial strategy that involves the collection and analysis of data is going to raise security concerns. The capacity to capture and analyze customer data is one thing, the technical expertise to keep this information secure is another. In an environment where any breach or loss of data can leave a business’s reputation irrevocably damaged, there is pressing need to invest in data encryption and information security, and for any security strategy to have broad support across the organization.


Trust and privacy concerns may persist, however. For these to be addressed, businesses need to adopt a raft of measures designed to establish and build trust. On the one hand, these will involve outward-looking measures to do with communication and transparency; but, on the other, these must be based on solid internal processes, including – but not confined to – the implementation of compliance mechanisms, codes of conduct and company values.

The Potential of Big Data and Analytics

Having outlined what it can take to make big data work, and suggested the challenges that must be overcome, we are left asking: ‘Is it worth it?’ A concrete example can help to illustrate the potential for big data to generate increased revenues and improved customer experience. Supply shortages, poor on-time delivery and inaccurate sales forecasts are significant problems for technology manufacturers, leading to bottlenecking and, ultimately, higher prices. By using big data and analytics to improve the sophistication and accuracy of sales forecasts, manufactures can ensure their products are consistently available and on-time, and at prices that are genuinely competitive.

By George Foot

Automation – Are We At Risk?

Automation – Are We At Risk?

Future Automation 

The automation of society is happening. Those who have read Kurt Vonnegut’s Player Piano know that it depicts a dystopia in which the economic system has made material abundance plentiful, but deprives the masses of meaningful labor. He shows us a future where all work is menial and unsatisfying, and where only a small number that achieves higher education is admitted to the elite and its work. This was in 1952.

mosheToday, researchers Frey and Osborne predicted in 2013 that 47% of US jobs were susceptible to automation by 2050. According to Moshe Vardi, Professor of Computer Science, Rice University, machines could take 50% of jobs in the next 30 years.

The automation revolution is occurring at revolutionary speeds, however, the impact on our society is being felt with mass unemployment and psychological aimlessness.

The automation revolution is upon us, though it will not happen without radical changes in the social conventions surrounding labor. As the machines eat up more jobs, the dystopia is real, as we fear the mass unemployment and psychological aimlessness. Our reaction will be to stall the third industrial revolution. We can look back on futurists like Vonnegut, and develop a sense of knowing of what is to come.

The Last Job on Earth

Alice shows us a dim future in which the automation revolution takes every last job we have. The dystopian society had become real, however there is no need to fear this sort of outcome. There are many solutions and outcomes that are real today, and show us a positive outlook for a bright future.


(Image Source: Shutterstock)

One idea is to de-link work from wages. You can see this taking place on any business flight or Starbucks coffee shop. Everywhere you look there are men and women hunched over laptops and tablets, they are working under trees in the park, on buses, in front of the television. It’s a futuristic factory, they flip from work to emails, and nobody sets a timer. The new work strategy is to work to targets or goals, not time.

In order to properly de-link work from our wages, we would still need a standard of income. A combination of a universal basic income, paid out of taxation, and an aggressive reduction of the working day will unleash the automation revolution at jet speeds. As usual, Europe is ahead of the curve with Sweden cutting the workday to 6 hours, while Finland has already begun experimenting with a basic citizen’s income.

The ideas are similar to the ideas presented to us in Robert Heinlein’s For Us, the Living, where he depicts an automation revolution that results in an economic system known as the “Heritage Check,” which was supplanted by taxation. The shift was made possible by huge advances in technology and production capacity as machines continued to free up our time. It seems that again, science fiction has closely predicted our current state of ideas, and the automation revolution that is upon us.

Don’t Fear Automation

The news may be more unsettling that with current economic news. The fear in the headlines reads louder than the truth. According to reports millions of jobs are at high risk for automation. This isn’t just for blue-collar workers; computers are now taking over tasks performed by professional workers, raising fears of massive unemployment. As the cost of technology reduces or the price of human labor increases, the pace of job automation is likely to accelerate.


Those job areas where the tasks are manual or repetitive are more vulnerable than those that are in the creative, technical fields, or where strong interpersonal skills are required. At the same time, many new jobs are created that are directly due to automation that requires an individual to control. Technology has created far more jobs than it has destroyed and these new jobs are better paying and tend to be safer from the risk of future automation.

“As technology advances, it reverses the characteristics of every situation again and again. The age of automation is going to be the age of ‘do it yourself.’” Marshall McLuhan

By Tina Rose

Exciting Possibilities With 3D Printing Innovation

Exciting Possibilities With 3D Printing Innovation

3D Printing Innovation

An early vision of man’s interaction with machines beyond the internet of things.

Since the dawn of time, humans have manipulated the physical world around them into tools which they use to make life easier. In today’s world, the primary tool for most people is the computer and the staggering number and variety of tasks that it can accomplish. Yet, the way we interact with this tool has remained essentially the same – via a keyboard or a mouse and, more recently, a touch screen.

Sean Follmer, an assistant professor of Mechanical Engineering at Stanford University and has been intrigued by this conundrum for a number of years. Speaking at a recent TED talk, he explains that “my belief is that we must need new types of interfaces that can capture these rich abilities that we have and that can physically adapt to us and allow us to interact in new ways.”

As the Internet of Things moves ever closer to a reality, some visionary scientists are seeing a world beyond when devices are connected and into a more fluid, adaptive spatial environment.

Follmer recently earned a PhD from MIT for his work in human-computer interaction that has given birth to an extraordinary technology called inFORM. What is inFORM? It’s an interface that can come off the computer screen and that you can manipulate physically. Whether it’s a 3D application, or digital clay which you can sculpt into a brand new shape, the elements on the surface rise up and are manipulated via actual, physical touch. “The idea is that for each individual application, the physical form can be matched to the application,” he says, “and I believe this represents a new way that we can interact with information, by making it physical.

Exciting Possibilities

New applications of this technology are being dreamed up all the time. Whether it’s in the arena of urban planning around traffic planning or spatial density, or tools for blind people, even new musical instruments, there are a wealth of possibilities that are becoming evident with inFORM.

One of the most astonishing demonstrations during Follmer’s TED Talk was the ability to render a person or an object remotely. Popular Mechanics magazine explains how “for this, the tangible media team decided to use a standard Xbox Kinect, a sensor typically used for motion-intensive gaming, to capture a person’s movement. A mounted projector also displays color.”


(Image Source: MIT/Popular Mechanics)

The ultimate effect of this is like seeing a person reach through a digital screen and manipulate objects on a table in another space. “Or you can have an object that’s linked between two places, so as I move a ball on one side, the ball moves on the other as well”, said Fowler at the TED Cern conference.

Over the next five years, many of the devices that we buy will be internet enabled and connected in ways that attempt to make our lives easier. But it is becoming easier to predict a time when devices themselves are obsolete, and the environment that we build and live in, takes on an intelligent and fluid dynamism that is likely to transform the globe in ways we are only beginning to imagine.

By Jeremy Daniel

CloudTweaks Comics
The DDoS That Came Through IoT: A New Era For Cyber Crime

The DDoS That Came Through IoT: A New Era For Cyber Crime

A New Era for Cyber Crime Last September, the website of a well-known security journalist was hit by a massive DDoS attack. The site’s host stated it was the largest attack of that type they had ever seen. Rather than originating at an identifiable location, the attack seemed to come from everywhere, and it seemed…

Security and the Potential of 2 Billion Device Failures

Security and the Potential of 2 Billion Device Failures

IoT Device Failures I have, over the past three years, posted a number of Internet of Things (and the broader NIST-defined Cyber Physical Systems) conversations and topics. I have talked about drones, wearables and many other aspects of the Internet of Things. One of the integration problems has been the number of protocols the various…

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

Cloud Infographic – DDoS attacks, unauthorized access and false alarms

DDoS attacks, unauthorized access and false alarms Above DDoS attacks, unauthorized access and false alarms, malware is the most common incident that security teams reported responding to in 2014, according to a recent survey from SANS Institute and late-stage security startup AlienVault. The average cost of a data breach? $3.5 million, or $145 per sensitive…

Update: Timeline of the Massive DDoS DYN Attacks

Update: Timeline of the Massive DDoS DYN Attacks

DYN DDOS Timeline This morning at 7am ET a DDoS attack was launched at Dyn (the site is still down at the minute), an Internet infrastructure company whose headquarters are in New Hampshire. So far the attack has come in 2 waves, the first at 11.10 UTC and the second at around 16.00 UTC. So…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Security: Avoiding A Hatton Garden-Style Data Center Heist

Security: Avoiding A Hatton Garden-Style Data Center Heist

Data Center Protection In April 2015, one of the world’s biggest jewelry heists occurred at the Hatton Garden Safe Deposit Company in London. Posing as workmen, the criminals entered the building through a lift shaft and cut through a 50cm-thick concrete wall with an industrial power drill. Once inside, the criminals had free and unlimited…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

5 Ways To Ensure Your Cloud Solution Is Always Operational

5 Ways To Ensure Your Cloud Solution Is Always Operational

Ensure Your Cloud Is Always Operational We have become so accustomed to being online that we take for granted the technological advances that enable us to have instant access to everything and anything on the internet, wherever we are. In fact, it would likely be a little disconcerting if we really mapped out all that…

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data (And Why You Need To)

How To Humanize Your Data The modern enterprise is digital. It relies on accurate and timely data to support the information and process needs of its workforce and its customers. However, data suffers from a likability crisis. It’s as essential to us as oxygen, but because we don’t see it, we take it for granted.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

Why Security Practitioners Need To Apply The 80-20 Rules To Data Security

The 80-20 Rule For Security Practitioners  Everyday we learn about yet another egregious data security breach, exposure of customer data or misuse of data. It begs the question why in this 21st century, as a security industry we cannot seem to secure our most valuable data assets when technology has surpassed our expectations in other regards.…


Sponsored Partners