During the past few years, the Internet of Things (IoT) has become one of the hottest movements of our time. Although many technology trends and buzzwords come and go overnight, it’s clear that the IoT is here to stay. Almost half of the world's population is online, and technology is a deeply integrated part of our lives. Smart thermostats regulate our business and household temperatures, connected cameras watch over our homes and pets, online TVs and speakers respond to our every need, and intelligent devices constantly monitor our health.According to Gartner, the number of world-wide Internet connected devices will grow to 11.4 billion by 2018. It’s a phenomenal trend that will continue to spread until human and machine connectivity becomes ubiquitous and unavoidably present.To read this article in full or to leave a comment, please click here
During the past few years, the Internet of Things (IoT) has become one of the hottest movements of our time. Although many technology trends and buzzwords come and go overnight, it’s clear that the IoT is here to stay. Almost half of the world's population is online, and technology is a deeply integrated part of our lives. Smart thermostats regulate our business and household temperatures, connected cameras watch over our homes and pets, online TVs and speakers respond to our every need, and intelligent devices constantly monitor our health.According to Gartner, the number of world-wide Internet connected devices will grow to 11.4 billion by 2018. It’s a phenomenal trend that will continue to spread until human and machine connectivity becomes ubiquitous and unavoidably present.To read this article in full or to leave a comment, please click here
As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control.+ Also on Network World: The tricky, personal politics of cloud security +
When leveraging cloud services, enterprises need to evaluate several key factors, including:To read this article in full or to leave a comment, please click here
As enterprises move their applications and data to the cloud, executives increasingly face the task of balancing the benefits of productivity gains against significant concerns about compliance and security.Security in the cloud is not the same as security in the corporate data center. Different rules and thinking apply when securing an infrastructure over which one has no real physical control.+ Also on Network World: The tricky, personal politics of cloud security +
When leveraging cloud services, enterprises need to evaluate several key factors, including:To read this article in full or to leave a comment, please click here
Digital disruption has demolished more than 50% of the Fortune 500 since 2000
Technology is creating new online-only companies—i.e., Kickstarter for funding, Sofi for lending and Venmo for payments. The digital disruption and, more important, its pace continues to disrupt long-established business models. Incumbents, not wanting to become another cautionary tale of digital disruption, are making radical changes to their businesses to focus on online and mobile channels.To read this article in full or to leave a comment, please click here
Digital disruption has demolished more than 50% of the Fortune 500 since 2000
Technology is creating new online-only companies—i.e., Kickstarter for funding, Sofi for lending and Venmo for payments. The digital disruption and, more important, its pace continues to disrupt long-established business models. Incumbents, not wanting to become another cautionary tale of digital disruption, are making radical changes to their businesses to focus on online and mobile channels.To read this article in full or to leave a comment, please click here
Since 2011, the Federal Reserve Board has conducted an annual survey that asks consumers how they use their mobile phones to interact with financial institutions, make payments, and manage their personal finances.Here are some of the key takeaways from the 2016 survey:
In 2015, 67% of Millennials used mobile banking. This compares to 18% for those consumers aged 60 or over. And the usage gap is widening.
40% of the unbanked had access to a smartphone.
70% of the underbanked were smartphone owners.
Driven by lower requirements for account creation, lower cost of banking, and ease of use of mobile banking solutions, consumers who have traditionally been excluded from the banking system and consumers who are coming of age for banking solutions are adopting mobile banking rather than opting for traditional banking solutions like ATMs or branch tellers. The accelerated adoption of mobile banking by Millennials, the underbanked and the unbanked is even more obvious in developing markets which (a) have a lot more underbanked and unbanked consumers and which (b) are leapfrogging desktop Internet to move directly to mobile Internet.To read this article in full or to leave a comment, please click here
Fraud is a $1 trillion annual problem worldwide. With rapid growth in ecommerce and online banking over the past decade, fraudsters are increasingly shifting to using computers and smartphones to commit fraud. One technology that helps companies and governments spot fraud—and sometimes stop it before it starts —is device fingerprinting.
Device fingerprinting works by uniquely identifying computers, tablets and mobile phones based on various attributes (e.g., browser version, screen dimensions, list of installed fonts, etc.). So, if a fraudster were to commit fraud using a particular mobile phone and was caught and that phone was fingerprinted, it would be difficult for that fraudster to commit another transaction from the same device. However, the fingerprint changes every time a user makes a device update. It’s therefore incredibly easy to fake a new device fingerprint.To read this article in full or to leave a comment, please click here
Fraud is a $1 trillion annual problem worldwide. With rapid growth in ecommerce and online banking over the past decade, fraudsters are increasingly shifting to using computers and smartphones to commit fraud. One technology that helps companies and governments spot fraud—and sometimes stop it before it starts —is device fingerprinting.
Device fingerprinting works by uniquely identifying computers, tablets and mobile phones based on various attributes (e.g., browser version, screen dimensions, list of installed fonts, etc.). So, if a fraudster were to commit fraud using a particular mobile phone and was caught and that phone was fingerprinted, it would be difficult for that fraudster to commit another transaction from the same device. However, the fingerprint changes every time a user makes a device update. It’s therefore incredibly easy to fake a new device fingerprint.To read this article in full or to leave a comment, please click here