CLOUDTWEAKS CONTRIBUTOR PROGRAM

Join the CloudTweaks thought leadership contributor program which includes a customized profile, branded identity page, newsletter marketing, social amplification and more...

The program is currently available to consultants, influencers or executive level contributors.

underwater

The Future of Drone Tech

The Future of Drone Tech

There are three interesting concepts in the drone world of today; The first is the GPS based follow me, a connection between the controller used and the drone. The drone can “follow” the GPS signal of the controlling device.  If the controller moves, the drone moves. In the world of Selfie drones, this is a really useful ability. The second interesting reality in the drone world today is the growing need for rules around specific things like airports. Far too many near misses in the past year to continue to allow drones to be where they are when they are. Finally, the third interesting thing is the reality of drone environment flexibility. Drones require a safe landing area, but with the Water Strider and other products, you can now increase the safe landing areas to include bodies of water.

Future of Drone Tech

All of this integrating with the new concepts of Edge Computing. Edge Computing is a concept of pushing computer processing services to the edge of your organization’s network using IoT; Drones allow you to push the Edge of computing even further. Many organizations use drones today for data collection and data retrieval. Using a drone for data collection is the mix of the three capabilities I started out talking about, follow me, rules about where I can fly and environmental variability. If I can safely land a drone on the water as well as the dry land it increases the places where I can collect data.  In the past here on CloudTweaks, I have talked about the concept of modular drones. For the world of edge computing, a modular drone is suddenly worth the weight it can carry.

Imagine being able to fly over an area four times using four different cameras. Infrared from FLIR, Standard HD from any number of Vendors, Laser Mapping and finally either Sonar or Lidar. Lidar gives you exact distances, Sonar exact depth and then Laser Mapping gives you details of the ground below you. Using these tools allows organizations to build a combined map that shows not only what is there, but also any and all abnormalities.

Some of the new technologies for drones allow for one drone to be flown four times with the different attachments or, four drones flown in unison to deliver the information. It is critical that the software for the drones is synchronized so that as they fly overhead, they are working together, Lidar and Laser Mapping cameras both map the ground and anything between them and the ground so if another drone flies underneath it become part of the map.

It can’t be that long before someone makes the key find drone swarm. Lose your keys, launch the swarm!

By Scott Andersen

Scott Andersen

Scott Andersen is the managing partner and Chief Technology Officer of Creative Technology & Innovation. During his 25+ years in the technology industry Scott has followed many technology trends down the rabbit hole. From early adopter to last person selecting a technology Scott has been on all sides. Today he loves spending time on his boat, with his family and backing many Kickstarter and Indiegogo projects.

The Lighter Side Of The Cloud – Smoke
The Lighter Side Of The Cloud - K.I.S.S
The Lighter Side Of The Cloud - Going Viral
Collaboration in 2018 and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration in 2018 and Beyond: Four Technology Trends That Will Have Maximum Impact

Collaboration in 2018 Four Technology Trends 2017 is coming to an end, which marks the time of year when we ...
The Cloudification of Healthcare: Benefits and Risks

The Cloudification of Healthcare: Benefits and Risks

Cloud Healthcare: Benefits and Risks Many organizations are moving most of their business-critical applications and workloads to the cloud. The ...
Chris

How to Avoid Becoming Another Cloud Security Statistic

Cloud Security Statistic Last year, Gartner predicted that, by 2020, 95 percent of all cloud security failures will be caused ...
Infosec thought leaders

Cryptocurrencies and Ransomware: How VDI Can Help Defend Against the Next Ransomware Attack

Cryptocurrencies and Ransomware The WannaCry ransomware made headlines back in May when it crippled hospitals across the UK and put ...
The New Kids On The Block: Data Protection Officers

The New Kids On The Block: Data Protection Officers

Data Protection Officers The General Data Protection Regulation (GDPR) is officially here. Yet, organizations are still unaware, are ignoring, or ...
Why ‘Data Hoarding’ Increases Cybersecurity Risk

Why ‘Data Hoarding’ Increases Cybersecurity Risk

Data Hoarding The proliferation of data and constant growth of content saved on premise, in cloud storage, or a non-integrated ...
Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

Malware Will Cripple Cloud And IoT Infrastructure If Not Contained

The Malware Cloud Concern This year we’ve had two cyber attacks in which malware was used to cripple government computer ...
Network Management Software Buyer Guide 2018

Network Management Software Buyer Guide 2018

This concise data-driven report covers the Network Management software landscape, as of August 2018. he 24-page report includes: Market Overview - Top 10 Network Management products in 2018, User reviews and vendor size data, In-depth look at the Top 3 ...
20 Leading Cloud CMS Wordpress Alternatives

20 Leading Cloud CMS WordPress Alternatives

Cloud CMS Wordpress Alternatives Content management systems (CMS) have grown exponentially in recent years. Their number and features have exploded. There are now dozens of cloud CMS Wordpress alternatives for startups and small business. CMS is getting more sophisticated. Website building ...
Cloud Monitoring and Data Performance Services

Cloud Monitoring and Data Performance Services

CLOUD PERFORMANCE MONITORING The Dynamic State Of Cloud Performance Monitoring And Evaluation Monitoring and evaluation in cloud computing are essential processes. They determine whether a company’s applications on the cloud are effective, safe, and efficient. They also help eliminate failures in ...
Cloud And Cybersecurity: 5 Things CISOs Need To Consider

Cloud And Cybersecurity: 5 Things CISOs Need To Consider

The Cloud and Cybersecurity Tomorrow’s digital enterprise is at war today. War not only with external cybersecurity hackers and viruses, but also within the organization itself – a conclusion based on my discussions with information security managers and cloud architects ...
Leading Programming Languages - TIOBE Index for July 2018

Leading Programming Languages – TIOBE Index for July 2018

Last month we announced that TypeScript entered the TIOBE index top 100 for the first time. TypeScript appears to keep growing in popularity. This month it entered the top 50. TypeScript is slowly becoming the new and improved JavaScript. One ...