Insights

Intertrust INSIGHTS is a forum for Intertrust and its partners to share insights into the industries and technologies we work in.


Sign up for updates

Subscribe to Blog via Email

Enter your email address to subscribe to this blog and receive notifications of new posts by email.


Top Categories:

How Green Technologies Of The Future Are Being Built In Singapore

By Press |

Also known as The Lion City, The Garden City and the Little Red Dot, Singapore is famous for its significant achievements in innovation, favorable tax system, recognized universities and great life quality. However, Singapore also ranks at the very top of the world’s most densely populated independent territories right after Macau and Monaco. And with insignificant amount of natural resources of its own, the country needs a strong, forward-thinking take on energy and innovation in order to power its fast-growing community.

Data, Research, Technology, Energy, Visualization | Comments Off on How Green Technologies Of The Future Are Being Built In Singapore

Calculating energy production from weather forecast in Python

By Press |

In a previous post, I’ve used Python Data Tools to fetch and visualize weather data using Datahub API (sign up for a free API key to try it). Today I’m going to solve another simple use-case using few other Python-based tools and the very same data and API. One of the heavily-influenced weather-dependent industries is Renewable Energy…

Data, Technology, Developer, Energy | Comments Off on Calculating energy production from weather forecast in Python

Casual Mobile Gaming is Ad Tech’s Future

By Steven Rahman |

At the close of the summer of 2016, there was no more perfect metaphor for user acquisition than the mobile game Pokémon Go by Nintendo. Users and their devices spent hours, if not whole days, hunting and collecting Pokémon. If you are still unfamiliar with Pokémon Go, well…welcome back from your lengthy sojourn in…

Mobile Gaming, User Acquisition, Augmented Reality | Comments Off on Casual Mobile Gaming is Ad Tech’s Future

Is the connected home possible without a walled garden?

By Elisabeth Kindig |

We live in a brilliant time when doors open without keys and coffee brews itself. Refrigerators come with sensors and cameras to track what’s inside your fridge. We’ll have an incredible 500 devices per home by 2022, according to Gartner. But with so many devices running on different platforms, we risk ending up with a mess of separate walled gardens.

Technology | Comments Off on Is the connected home possible without a walled garden?

2016 State of Mobile App Security Report

By Intertrust |

This report covers the mobile market, the role security plays within the market, the cost of data breaches, different mobile operating systems and their vulnerabilities, a look at app security for the Internet of Things, what developers can do to secure apps, and how whiteCryption can help.

Research | Comments Off on 2016 State of Mobile App Security Report

Intertrust’s CTO Discusses IoT Security at NIST Event

By Phil Keys |

The National Institute of Standards and Technology (NIST) is an important part of of the U.S. Federal Government’s activities to support science and technology. Of course NIST’s efforts extend to the computing field as well and NIST is a key agency for leading the Federal Government’s activities in evaluating and adopting cutting edge computing techniques. So, of course we were honored when Intertrust’s Chief Technology Officer…

Blog | Comments Off on Intertrust’s CTO Discusses IoT Security at NIST Event

Who Will Win In The Broken Connected Home Market?

By Phil Keys |

With the promise of any device being able to communicate with another device largely kept, the Internet is truly a world wonder. The Internet’s promise is now coming to a new mass market, the connected home. Yet, the way the connected home market is shaking out right now, it looks like we may end up not with an open Internet type of market but a walled garden type of market controlled by some familiar logos.

Connected Devices | Comments Off on Who Will Win In The Broken Connected Home Market?

Who is responsible for the data security of 50 billion connections?

By Elisabeth Kindig |

What the internet of things pushes forward is a reversal on the old paradigm that humans are the solution to the problem that technology creates. If we look closer at the human supply chain for the IoT, there are three key players: manufacturers, developers and end users. Here’s how they can advance the future with foresight (rather than the proverbial hindsight):

Data | Comments Off on Who is responsible for the data security of 50 billion connections?

The State of the Smart Home Market by John Feland

By Phil Keys |

John Feland, CEO and founder of Argus Insights, an analytics firm specializing in consumer sentiment analysis, spoke on June 10th at Intertrust headquarters. Building on his earlier work at IDEO and Stanford, Feland founded Argus to use analytics from social data and product reviews to clarify consumer sentiment and help companies better understand market and product trends…..For this discussion, Feland shared some of Argus’ insights on the consumer smart home market. First, the good news (based on data from March 2015-2016) was that consumer sentiment around smart home products climbed more quickly than those around laptops and tablets (these two actually went down), smartphones, and wearables

Blog | Comments Off on The State of the Smart Home Market by John Feland

Sparse Data Alternatives With Neural Network Embeddings

By Mike Tamir |

Last week, we had the opportunity to participate at the Data by the Bay Conference, which is the first data grid conference matrix with six vertical application areas spanned by multiple horizontal data pipelines, platforms, and algorithms. Data by the Bay unifies data science and data engineering to examine what really works to run businesses at scale…

Blog | Leave a comment

“Necessity, Computational Models and Competition,” Intertrust’s CTO Describes How Tech Innovation Really Happens

By Phil Keys |

Even if you are just a casual observer of the technology industry, you’ve certainly heard about Moore’s Law, i.e. the number of transistors in an integrated circuit doubles every two years. Moore’s Law certainly has been a driver in the technology industry, but Intertrust’s Chief Technology Officer (CTO) and Bell Fellow David Maher recently gave a talk on another view on what drives innovation.

Security, Developer, Blog, Innovation | Comments Off on “Necessity, Computational Models and Competition,” Intertrust’s CTO Describes How Tech Innovation Really Happens

Impediments to Interoperability: Why Can’t We All Just Get Along?

By Knox Carey |

Tomorrow I will be giving an invited talk at the Human Genome Variation 2015 conference in San Francisco. The title of my talk is Impediments to Interoperability: Why Can’t We All Just Get Along? For ethical and scientific reasons — some of which I will briefly outline in my talk — data sharing is imperative in genomics. And yet, very little data sharing actually happens. Why?

Privacy, In the News | Leave a comment

“The Big Data of Food” Food Security Symposium, Session 6: Dr Talal Shamoon

By Intertrust |

The future of food – the future of biodiversity | The global impact of UK food consumption | #FutureofFood2015

Comments Off on “The Big Data of Food” Food Security Symposium, Session 6: Dr Talal Shamoon

Digging Data to Secure our Food Supply

By Anahita Poonegar |

Unprecedented access to data is transforming the food ecosystem. Making as much data as possible accessible helps make the food ecosystem efficient while keeping the environmental impact as low as possible. Responsible organizations must have complete sets of data available to make truly useful services. Ensuring that data is handled with appropriate concern for privacy and other rights of the data holders will be an important factor in making this happen.

Blog | Comments Off on Digging Data to Secure our Food Supply

Talal Shamoon: VW’s hack and the future of the automobile

By Intertrust |

Technology disruption rear-ended Volkswagen in a most ironic way last week. While many have written about VW’s arrogant approach to emissions testing, few have noted a more serious issue that goes to the heart of all mainstream car makers’ modus operandi…

News | Leave a comment

Q&A with a Data Scientist: What is Lookalike Modeling?

By Intertrust |

Data science has risen in popularity as one way to train a customer model to seek and duplicate based on predictions of who behaves like your best audience. This specific practice is called “lookalike modeling,” and although not new to the offline world, it requires special consideration – especially when new parties onboard from offline into the complex, mobile space.

Research | Comments Off on Q&A with a Data Scientist: What is Lookalike Modeling?

The Trusted Intermediary Model: Supporting Both Privacy and Internet Services

By David Maher |

While many techniques for protecting online privacy have been proposed, a variety of issues call into question their effectiveness for individuals and for the commercial entities that want to provide services to them.

Blog | Leave a comment

The Car as an Internet-Enabled Device, or how to make Trusted Networked Cars

By Intertrust |

This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.

publication | Leave a comment

Persistent Security, Privacy, and Governance for Healthcare Information

By Intertrust |

This paper describes necessary elements for a solution to the problem of governed information sharing, and discusses how new developments in trusted computing enable new applications for patient privacy, data security, and medical research.

publication | Leave a comment

Octopus: An Application Independent DRM Toolkit

By Intertrust |

Most DRMs that are in use today are based on DRM specific declarative rights expression languages and authorization mechanisms that have strong semantic coupling to the application in which they are employed. A notable exception to this approach can be found in the Octopus system described in this paper. Octopus employs several concepts from the trust management philosophy originally posited by Blaze, et al. in 1996, but perhaps its most striking similarity can be found in its clear separation of authorization mechanism from application semantics.

publication | Leave a comment

2015-2016 Trends & Predictions in Data, Apps and IoT

By Intertrust |

“Mobile video traffic now accounts for more than half of all mobile data traffic at 55% in 2015. The top 20% of power users generated 59% of mobile data traffic. Download the report to read more…”

Research | Comments Off on 2015-2016 Trends & Predictions in Data, Apps and IoT

Learn what is driving success for advertisers

By Intertrust |

Download the Q3 2015 report. The mobile ecosystem faces a problem: brands have been timid to enter the space with single digit allocations for mobile hovering at 8%. We dig deep to answer hard questions on why a budget adjustment to 16% is more appropriate considering time spent on this device.

Research | Comments Off on Learn what is driving success for advertisers

Gain powerful insights into data and mobile audiences

By Intertrust |

Download the Q2 2015 report. This quarter we cover mobile ad spend, which will see 430% growth between 2013 and 2016, when it is set to surpass $100 billion. However, can ad-technology keep up with the growth?

Research | Comments Off on Gain powerful insights into data and mobile audiences

Welcome to the inaugural mobile data report by Personagraph

By Intertrust |

2014 was an exciting year marking a significant increase in global data usage with some analysts predicting a 10x increase in mobile data by 2019.

Data, Research | Comments Off on Welcome to the inaugural mobile data report by Personagraph

Copyright © 2015 Intertrust Technologies Corporation All rights reserved.