Digital disruption in electricity, water and gas utilities. The utility sector is at a turning point as digitization is now an unstoppable force that brings significant economic advantage to those that embrace it. The permanent shift to renewables and natural gas for power generation, for example, gives electricity companies the chance to build automation into new networks and platforms and complement base load with near real-time data-driven decision making. Off-grid and hybrid-grid power generation and distribution systems also disrupt traditional pricing models by allowing on-demand distribution of energy-as-a-service. These issues also affect the water sector, where energy is typically 30% of water utility costs. WaterRead More →

Al What is RPA? Why is it important? What are its benefits? What are different types of RPA? How does it work? How to choose RPA vendors? How is RPA priced? Movies have been feeding us physical robots for a long time. However the first AI bots that we will work with are software bots. This shouldn’t be surprising as hardware is hard while software is eating the world. Interest in RPA has grown ~10x in the past 1.5 years. This is no surprise since Fortune 500 CEOs can not stop talking about it. As John Cryan, CEO of Deutsche Bank said in September 2017: In our banks we haveRead More →

Even the most complex topics can be segregated in easy to consume buckets. Let me try to explain them   Artificial Intelligence (AI) Human Intelligence Exhibited by Machines Intelligence exhibited by machines Broadly defined to include any simulation of human intelligence Expanding and branching areas of research, development, and investment Includes robotics, rule-based reasoning, natural language processing (NLP), knowledge representation techniques (knowledge graphs) … Machine Learning (ML) An Approach to Achieve Artificial Intelligence Subfield of AI that aims to teach computers the ability to do tasks with data, without explicit programming Uses numerical and statistical approaches, including artificial neural networks to encode learning in models Models built usingRead More →

Scientists, technologists, engineers, and visionaries are building the future. Amazing things are in the pipeline. It’s a big deal. But you already knew all that. Such speculation is common. What’s less common? Scale. How big is big? “Silicon Valley, Silicon Alley, Silicon Dock, all of the Silicons around the world, they are dreaming the dream. … 1. Deep Learning Could Be Worth 35 Amazons Deep learning is a subcategory of machine learning which is itself a subcategory of artificial intelligence. Deep learning is the source of much of the hype surrounding AI today. As deep learning advances, it should automate and improve technology, transportation, manufacturing, healthcare,Read More →

You need to practice your serve but hate picking up the balls? Enter every tennis player’s dream companion: Tennibot bills itself as the world’s first autonomous tennis ball collector. It’s a camera- and sensor-outfitted Roomba-of-sorts that’ll collect up to 90 balls at a time. The battery lasts four hours.Read More →

Top Three IoT Security Trends Here is the top three IoT security trends to follow in 2018, including digital identity and regulatory challenges. Gartner estimates the mushrooming number of connected devices will reach more than 20 billion in 2020. Keeping these devices secure will present major challenges for Internet of Things (IoT) hardware and solution vendors in the years ahead. Here are some of the major IoT security trends to follow in 2018. Security trend #1: The Identity of Things Traditional identity and access management (IAM) systems were developed to identify humans, not machines. To cope with the new connected IoT world, IAM leaders mustRead More →

The Open Web Application Security Project (OWASP) puts out a regular list of the top 10 most critical web application security risks with the hopes of raising awareness and helping organizations develop a culture of more secure code. With that in mind, let’s take a look at the top five: 1. Broken Access Control This means that restrictions on authenticated users are not properly enforced, leading to one user able to see other users’ files or modify other users data. 2. XML External Entities Fun to say, not fun when it happens. This occurs when older or badly configured XML processors evaluate external entity references within XMLRead More →

Why Blockcain Technology ? Blockchain is poised to change IT Industry in much the same way open-source software did a quarter of a century ago. And in the same way that Linux took more than a decade to become a cornerstone in modern application development, Blockchain will take years to become a lower cost, more efficient way to share information between open and private networks. But the hype around this seemingly new, secure electronic ledger is real. In essence, blockchain represents a new paradigm for the way information is shared and tech vendors and companies are rushing to figure out how they can use theRead More →

A guide to Raspberry Pi alternatives, from low-cost options to more powerful boards. Six years after the release of the $35 Raspberry Pi computer, demand remains as strong as ever, with sales on track to pass 18 million boards anytime now. While the Pi’s initial success stemmed from it being a budget board packed with enough computing power and features to perform tasks ranging from controlling robots to running a media center, its enduring popularity results from its strong software support and extensive community, who help newcomers and have created a wealth of tutorials and guides. But the Pi is not alone, a broad spectrum ofRead More →