Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here
Blockchain technology has been generating excitement in the public and private sectors for the past several years for many reasons — a prominent one being support for self-executing contracts commonly referred to as smart contracts. But while smart contracts have the potential to streamline many business processes, full automation isn't likely anytime in the foreseeable future."Smart contracts are a combination of some certain binary actions that can be translated into code and some reference to plain language like we have today that is open to litigation if you mess up," says Antonis Papatsaras, CTO of enterprise content management company SpringCM, which specializes in contract workflow automation. "I think it's going to take forever."To read this article in full or to leave a comment, please click here
With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here
With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here
With mid-market companies feeling an increasing need to devote time and resources to network security, the security-as-a-service model is gaining traction, according to new research released yesterday by 451 Research."The security challenge for mid-tier businesses is multi-dimensional," Daniel Cummins, analyst at 451 Research, said in a statement. "For these businesses, everything seems to be increasing — attack frequency, compliance requirements, complexity, costs and the number of security products that need to be managed. Cloud-based security-as-a-service offers potentially significant advantages in terms of simplicity and access to security that may prove to be less complex and expensive than traditional approaches."To read this article in full or to leave a comment, please click here
Insurance companies are on the front lines when it comes to exposure to the financial risks of climate change. The internet of things (IoT) is shaping up to be a key component in mitigating those risks."Insurance companies rely upon historical loss records to guide their underwriting and set their prices," Washing Insurance Commission Mike Kreidler and California Insurance Commission Dave Jones wrote in the forward of Insurer Climate Risk Disclosure Survey Report & Scorecard: 2016 Findings & Recommendations by nonprofit organization Ceres. "More and more frequently, the climate is behaving in ways that we can't predict. Weather patterns are shifting, and the severity and breadth of damage are intensifying, resulting in more costly disasters than we've ever seen. There is no basis in historical data for events like Hurricane Sandy, the Joplin, Missouri tornado, the Oso landslide in Washington state and record-breaking landslides in Western states. In 2016 alone, 31 major disaster declarations were reported to the Federal Emergency Management Agency (FEMA) by the end of August."To read this article in full or to leave a comment, please click here
If you're trying to do business intelligence (BI) on big data and the capability to handle large number of concurrent queries is a key issue for you, Google BigQuery may well be the way to go, according to a new Business Intelligence Benchmark released Thursday by AtScale, a startup specializing in helping organizations enable BI on big data.[ Related: Google BigQuery update aims for enticing Hadoop users ]To read this article in full or to leave a comment, please click here
The modern enterprise is data-driven. The capability to quickly access and act upon information has become a key competitive advantage. But business data is often siloed and fragmented. To gain a competitive edge from your information, you need a single view of your data.Most organizations today have a complicated process for managing their data, one that usually involves multiple data sources of variable structure, ingestion and transformation, loading into an operation database and supporting the business applications that need the data. Analytics, business intelligence (BI) and reporting tools require access to the data, which frequently requires a separate data warehouse or data lake. These layers all need to comply with security protocols, information governance standards and other operational requirements.To read this article in full or to leave a comment, please click here
Transporting freight operates at a massive scale in the U.S., most of it hauled by trucks that are the lifeblood of the American economy. But the trailers those trucks are hauling typically have a load efficiency of 70 to 75 percent, says Tom Bianculli, CTO of Zebra Technologies. The remaining 25 to 30 percent is air.But smart environments powered by the internet of things (IoT) can change that, Bianculli says. Zebra's new SmartPack Trailer offering, announced at ProMat 2017 in Chicago today, uses sensors on the dock doors of distribution facilities, which peer into each trailer using a combination of 3D depth-sensing technology and a conventional megapixel camera.To read this article in full or to leave a comment, please click here
The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period. What follows are the nine biggest threats on the horizon through 2019 that your organization may have to manage and mitigate.Theme 1: Disruption from an over-reliance on fragile connectivity
Organizations today depend of instant and uninterrupted connectivity, smart physical devices and trustworthy people. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information.To read this article in full or to leave a comment, please click here
The information security threat landscape is constantly evolving. To help you navigate the terrain, each year the Information Security Forum (ISF) — a nonprofit association that researches and analyzes security and risk management issues on behalf of its members — puts out its Threat Horizon report to provide members with a forward-looking view of the biggest security threats over a two-year period. What follows are the nine biggest threats on the horizon through 2019 that your organization may have to manage and mitigate.Theme 1: Disruption from an over-reliance on fragile connectivity
Organizations today depend of instant and uninterrupted connectivity, smart physical devices and trustworthy people. But that dependence makes them vulnerable to attacks on core internet infrastructure, devices used in daily business and key people with access to mission-critical information.To read this article in full or to leave a comment, please click here
Customer experience is the name of the game at Adobe Summit 2017 in Las Vegas this week. Today the company unveiled its new Experience Cloud offering, along with a new partnership with Microsoft aimed at creating a standard semantic data model for customer experience apps and services.For years, digital marketers have measured digital interactions to gather customer data in an effort to optimize customer interactions in real-time by doing things like personalizing landing pages and targeting display ads. The new Adobe Experience Cloud brings together Adobe Marketing Cloud, Adobe Advertising Cloud and Adobe Analytics Cloud in an effort to take the technology Adobe has developed for digital marketers and extend it to all the areas that touch on customer experience, like optimizing and personalizing customer support or building products.To read this article in full or to leave a comment, please click here
At Strata + Hadoop World in San Jose, Calif., Tuesday, MapR Technologies took the wraps off a new small footprint edition of its Converged Data Platform geared for capturing, processing and analyzing data from internet of things (IoT) devices at the edge.MapR Edge, designed to work in conjunction with the core MapR Converged Enterprise Edition, provides local processing, aggregation of insights at the core and the ability to then push intelligence back to the edge.To read this article in full or to leave a comment, please click here
At Strata + Hadoop World in San Jose, Calif., Tuesday, MapR Technologies took the wraps off a new small footprint edition of its Converged Data Platform geared for capturing, processing and analyzing data from internet of things (IoT) devices at the edge.MapR Edge, designed to work in conjunction with the core MapR Converged Enterprise Edition, provides local processing, aggregation of insights at the core and the ability to then push intelligence back to the edge.To read this article in full or to leave a comment, please click here
Cybercrime is becoming more automated, organized and networked than ever before, according to the ThreatMetrix Cybercrime Report: Q4 2016.Cybercriminals are increasingly targeting online lenders and emerging financial services, says Vanita Pandey, vice president of strategy and product marketing, ThreatMetrix.[ Related: 8 tips to defend against online financial fraud threats ]To read this article in full or to leave a comment, please click here
Cybercrime is becoming more automated, organized and networked than ever before, according to the ThreatMetrix Cybercrime Report: Q4 2016.Cybercriminals are increasingly targeting online lenders and emerging financial services, says Vanita Pandey, vice president of strategy and product marketing, ThreatMetrix.[ Related: 8 tips to defend against online financial fraud threats ]To read this article in full or to leave a comment, please click here
The internet of things (IoT) may present the biggest opportunity to enterprises since the dawn of the internet age, and perhaps it will be bigger. Research firm Gartner predicts there will be nearly 20 billion devices on the IoT by 2020, and IoT product and service suppliers will generate $300 billion+ in revenue.Successfully leveraging that opportunity — bringing together sensors, connectivity, cloud storage, processing, analytics and machine learning to transform business models and processes — requires a plan."In the course of my career, I've estimated and planned hundreds of projects," John Rossman, who spent four years launching and then running Amazon's Marketplace business (which represents more than 50 percent of all Amazon units sold today), writes in his new book, The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies. "I've learned that, even before you start seeking answers, it's imperative to understand the questions. Guiding a team to a successful outcome on a complex project requires understanding of the steps and deliverables, necessary resources, and roles and every inherent risk and dependency."To read this article in full or to leave a comment, please click here
IBM is making machine learning technology available in the place where much of the world's enterprise data resides: the z System mainframe.
Today Big Blue announced IBM Machine Learning, a cognitive platform for creating, training and deploying a high volume of analytic models in the private cloud. The platform draws on the core machine learning technology from its Watson Machine Learning service on its Bluemix public cloud offering.
"Our mission is making data simple and accessible to clients," says Rob Thomas, general manager, IBM Analytics. "If you look at the data landscape today, over 90 percent of the data in the world today cannot be Googled. It's neither simple, nor accessible. Most of that data resides behind corporate firewalls in private clouds."To read this article in full or to leave a comment, please click here
Marking a major step forward for artificial intelligence (AI), Libratus, an AI developed by Carnegie Mellon University (CMU), has resoundingly beaten four of the best heads-up no-limit Texas hold'em poker players in the world in a marathon, 20-day competition.After 20 days and a collective 120,000 hands played, Libratus closed out the competition Monday leading the pros by a collective $1,766,250 in chips."I'm just impressed with the quality of poker Libratus plays," pro player Jason Les, a specialist in heads-up no-limit Texas hold'em like the other three players, said at a press conference yesterday morning. "They made algorithms that play this game better than us. We make a living trying to find vulnerabilities in strategies. That's what we do every day when we play heads-up no-limit. We tried everything we could and it was just too strong."To read this article in full or to leave a comment, please click here
The internet of things (IoT) presents an opportunity for enterprises to rewrite the rules of their industry. The potential upside is massive: According to research firm Gartner, there will be nearly 20 billion devices on the IoT by 2020, and IoT product and service suppliers will generate $300 billion+ in revenue.By bringing together sensors, connectivity, cloud storage, processing, analytics and machine learning, IoT may well transform countless industries, from healthcare to manufacturing to utilities, transit, government and more. But IoT is still in its early days. Creating and executing an IoT strategy for your organization is no mean feat, says John Rossman, author of The Amazon Way on IoT: 10 Principles for Every Leader from the World's Leading Internet of Things Strategies.To read this article in full or to leave a comment, please click here