By Edward Robles – Qondado LLC
Magnetic stripes on cards were developed in the late 1960s. The technological breakthrough helped convert “raised letter” credit cards from single-purpose tools to universal cards accepted by a wide variety of places. Even more importantly, the development of the magnetic stripe cleared the way for fast, nearly instantaneous computerized transactions. As a result, every credit or debit card has the same format of information in the same place with only slight variations in color and branding based on the issuer.
Today, credit, debit and charge cards are the instrument and interface of most transactions around the world. The design and utility crosses cultures, languages and requires no explanation. Retail and banking systems know precisely how to handle and capture credit card data due to the uniform nature of the instrument. This is not the case in the mobile payments space. Continue reading
Following last week’s DDoS attack against Dyn, which was carried out through a huge IoT botnet, there’s a general sense of worry about IoT security—or rather insecurity—destabilizing the internet or bringing it to a total collapse.
All sorts of apocalyptic and dystopian scenarios are being spinned out by different writers (including myself) about how IoT security is running out of hand and turning into an uncontrollable problem. There are fears that DDoS attacks will continue to rise in number and magnitude; large portions of internet-connected devices will fall within the control of APT and hacker groups, and they will censor what suits them and bring down sites that are against their interests. The internet will lose its fundamental value. We will recede to the dark ages of pre-internet. Continue reading
The Internet of Things (IoT) is often hyped as the next industrial revolution—and it’s not an overstatement. Its use cases are still being discovered and it has the potential to change life and business as we know it today. But as much as IoT is disruptive, it can also be destructive, and never has this reality been felt as we’re feeling it today. Continue reading
Data analytics is something that you read and hear about a lot these days. It’s been touted as the science and technology that can help organizations reduce costs, increase efficiency, identify new opportunities and increase their competitive advantage.
Data analysts uses mathematics, statistics, and sometimes machine learning, to find meaningful patterns across registered data and turn them into meaningful results and actionable insights. While the concept of analytics isn’t new, recent advances in storage and computation technologies are enabling us to store and process data in huge volumes, and are taking data analytics to the next step, opening up possibilities that weren’t conceivable before. Continue reading
businesses need to turn real-time data into real-time decision making if they are to succeed in an ever-changing business environment.
Guest post by Julie Lockner of InterSystems
“The biggest problem we face is re-shaping ourselves so that we’re better placed to change as rapidly as the world around us.”
Wise words from Stephen Foreshew-Cain, executive director of the UK’s Government Digital Service, as he looked forward to the government of the future. The same holds true for business across all sectors.
Change is rapid and constant, and the traditional model of basing decisions on meticulously gathered and refined historical data is no longer fit for purpose. Looking over one’s shoulder is no way to make positive decisions; basing choices on information that is hours, days and event months old is the equivalent of driving through the rear view mirror. Continue reading
At the time of its invention, the supply chain was an ingenious idea, made to streamline and facilitate the journey of raw goods as they made their way from their source to factories and ateliers, were turned into products and consumables, and were finally shipped to retailers and consumers.
But that was more than a century ago, before our economies became as globalized and fragmented as they are now. Continue reading
News broke last week that Yahoo has allowed intelligence agencies to scan user emails. This comes at a very bad time for Yahoo, right on the heels of its 500 million user account data breach—made public earlier this month—and while the company is trying to be acquired Verizon for the meager price of $4.8 billion.
Other tech giants immediately denied having had similar cooperation with government agencies in the wake of the Yahoo leak, though they all have a track record of wholesaling their data to government agencies under the NSA’s PRISM program. Continue reading