GDPR Compliance

System Vulnerabilities Are an Issue for Everyone in the Cloud Environment

System Vulnerabilities Are an Issue for Everyone Over the past decade, we have seen a drastic increase in the number of companies relying on cloud services. Given the nature of the cloud as a shared-resource environment, threats that infiltrate the system of a single provider
Bridging the educational divide–How business networks level the playing field for those most in need

Bridging the educational divide–How business networks level the playing field for those most in need

The next BriefingsDirect panel discussion explores how Step Up For Students (SUFS), a non-profit organization in Florida, has collaborated with SAP Ariba to launch MyScholarShop, a digital marketplace for education that bridges the information gap and levels the playing field for those students most in
The Drone Explosion

The Drone Explosion Continues To Provide Unique Options

The Drone Explosion

One of the things I have posted about often here on CloudTweaks is the ever growing world of drones. There are legal requirements now for how, where and when you fly your drone. The FAA has a registration site to reduce the abuses that have been flagrantly visible. The number of near misses (airplanes and drones) has increased. Last year a drone flew over the US Open in Flushing Meadows. Since my last post in May 2017, some new drone offerings are now available. Delivery drones now drop burritos for people in more than three cities. Nobody is doing pizza yet, per my Pizza drone post here on CloudTweaks but it is coming I am sure.

The market and capabilities in the drone space continue to expand. Waterproof drones are in development (capable of landing on water) and these include water proof cameras. I doubt the lighting will be great so viewing the ocean floor isn’t an option. But the concept of water proof drones is something on the soon to be shipping the horizon. You wouldn’t land a waterproof drone on rough water, it would likely get swamped, but you could land it less choppy water.

Recently FLIR, the people that make infra-red imaging devices, released an Infra-Red camera Gimball (the camera mount for a drone is different than other camera mounts and is called a gimbal).  This allows for the ability to see heat maps from above. I have talked about the fact that every fire department and fire chief in the US should get a drone with infra-red cameras, and train on how to fly it. Just the reality of being able to determine hot spots on a roof without sending firefighters in is a huge potential life-saving toolset.

Another interesting product set that is upcoming in the drone world is the ever expanding camera capabilities. In particular, there are gimbals in development that would allow you to attach a 360 camera to your drone. A 360-degree camera mounted on a drone would allow you to present wider angle views from above. Making the Gimbals flexible and easily swapped it another offering that some drone companies are considering.

All of this goes back to my initial call for regulations that are now real. In the future, I would hope that the companies selling drones will have to register every drone before it leaves their facilities rather than end users having to register them as is the case now. The last part of what needs to change remains the reality of image ownership. I have spent a lot of time considering the reality of images taken by a drone.

Drones are amazing and fun devices. They are devices however that can cause problems for other people, intended or unintended. One of the things you really should consider when flying them is to think of them as an extension of yourself. If you shouldn’t be somewhere, then by all means neither should your drone!

By Scott Andersen

Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

TOP ARCHIVES

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security: Whose Business Is It, Anyway?

Cloud Communications Security Don’t count on cloud providers to provide all your UCaaS security It’s official: Unified Communications-as-a-Service (UCaaS) has ...
6 Best Practices For Increasing Security In AWS In A Zero Trust World

6 Best Practices For Increasing Security In AWS In A Zero Trust World

AWS Security Best Practices Enterprises are rapidly accelerating the pace at which they’re moving workloads to Amazon Web Services (AWS) ...
Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

Will 2018 Be the Year Augmented Reality Moves Outside ‘Pokémon Go’?

2018 Augmented Reality If you’ve never heard of “Pokémon Go” — or at least never had the concept explained to ...
Digital Identity Trends – Previewing The Year Ahead

Digital Identity Trends – Previewing The Year Ahead

Digital Identity Trends The lack of security of the Internet of Things captured public attention this year as massive distributed ...
Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks: Best Practices and Preventative Measures

Ransomware Cyber-Attacks “WanaCrypt0r 2.0” or “WannaCry,” an unprecedented global ransomware cyber-attack recently hit over 200,000 banking institutions, hospitals, government agencies, ...

PARNTER LEARNING

$1,499.00Enroll Now

Cyber Security Expert Master's Program

Cyber Security Expert Master’s Program

The course will teach you: Advanced hacking concepts that can help you manage information security better. Architectures of frame cloud data storage and security strategies. You will learn how to use them to find and analyze risks. How to install, ...

$2,899.00Enroll Now

CEH (v10) – Certified Ethical Hacker Training Course

CEH (v10) – Certified Ethical Hacker Training Course

The course will help you: To understand the tactics and methodologies that hackers use to attack and penetrate any network. Understand honeypots, wireless hacking, firewall, and IDS. Become an expert in the hacking concepts, including smartphone hacking, writing virus codes, ...