As security breaches are increasing in size and type, newer security technologies are being designed to protect against the breaches. Cryptography is at the core of these security technologies.
A fundamental objective of cryptography is to secure communications between two parties, so that only the communicating parties can read and process the communicated messages. This objective is a natural requirement of human society; the study of securing communications (cryptography) goes back at least 4,000 years.
Machine Learning (ML) is closely related to computational statistics which focuses on prediction-making through the use of computers. ML is a modern approach to an old problem: predictive inference. It makes an inference from “feature” space to “outcome/target” space. In order to work properly, an ML algorithm has to discover and model hidden relationships between the feature space and the outcome space and create links between the two. Doing so requires overcoming barriers such as feature noise (randomness of features due to unexplained mechanisms).
This report covers video on demand, OTT, TV Everywhere and Global markets including China, India, United Kingdom and Germany. The number of devices and wireless connections is creating a shift, opening up markets such as China and India for U.S. exporters, where the M&E industry is outpacing the overall economy.
Targeted video advertising is the “holy grail” for businesses and enterprises taking advantage of mobile platform. However, not all data collection is the same. This white paper covers digital ad spend, video advertising, and addressable media topics.
Florian Kolb, who heads up Silicon Valley operations for Intertrust’s partner innogy, was invited to speak at the Edison Electric Institutes’ second annual International Utility Executive Summit held on April 5th, 2017 in Washington D.C. At the event, Kolb spoke about how the Digital Age is driving the need for utilities to innovate in customer experiences.
For IoT security to be successful, there needs to be an effective way to reason about how humanity can trust the security, safety, and privacy of this massive transformation of the world. Most importantly, “ordinary people,” whether they are consumers or workers, must be able to safely, reliably, and intuitively interact with vast, complex, interconnected systems of IoT devices. It can be overwhelming to think about all the ways individuals and society can be damaged by the haphazard engineering of systems that merge the physical and digital worlds.
In the second issue of Planet OS Visionary Series we discuss the transforming energy industry with David Hostert, the Head Of Wind Energy Research at Bloomberg New Energy Finance. With more than a decade of experience in the industry, David was glad to answer our questions about the present and the future of smarter energy.
Here’s a demonstration how to get from raw data to animated weather maps and graphs with just a few simple commands. Starting from the raw data means that you are not limited to just creating weather forecasts, but you can run your own dedicated analysis or models on top of the data.
Also known as The Lion City, The Garden City and the Little Red Dot, Singapore is famous for its significant achievements in innovation, favorable tax system, recognized universities and great life quality. However, Singapore also ranks at the very top of the world’s most densely populated independent territories right after Macau and Monaco. And with insignificant amount of natural resources of its own, the country needs a strong, forward-thinking take on energy and innovation in order to power its fast-growing community.
In a previous post, I’ve used Python Data Tools to fetch and visualize weather data using Datahub API (sign up for a free API key to try it). Today I’m going to solve another simple use-case using few other Python-based tools and the very same data and API. One of the heavily-influenced weather-dependent industries is Renewable Energy…
At the close of the summer of 2016, there was no more perfect metaphor for user acquisition than the mobile game Pokémon Go by Nintendo. Users and their devices spent hours, if not whole days, hunting and collecting Pokémon. If you are still unfamiliar with Pokémon Go, well…welcome back from your lengthy sojourn in…
We live in a brilliant time when doors open without keys and coffee brews itself. Refrigerators come with sensors and cameras to track what’s inside your fridge. We’ll have an incredible 500 devices per home by 2022, according to Gartner. But with so many devices running on different platforms, we risk ending up with a mess of separate walled gardens.
This report covers the mobile market, the role security plays within the market, the cost of data breaches, different mobile operating systems and their vulnerabilities, a look at app security for the Internet of Things, what developers can do to secure apps, and how whiteCryption can help.
“Mobile video traffic now accounts for more than half of all mobile data traffic at 55% in 2015. The top 20% of power users generated 59% of mobile data traffic. Download the report to read more…”
Download the Q2 2015 report. This quarter we cover mobile ad spend, which will see 430% growth between 2013 and 2016, when it is set to surpass $100 billion. However, can ad-technology keep up with the growth?
The National Institute of Standards and Technology (NIST) is an important part of of the U.S. Federal Government’s activities to support science and technology. Of course NIST’s efforts extend to the computing field as well and NIST is a key agency for leading the Federal Government’s activities in evaluating and adopting cutting edge computing techniques. So, of course we were honored when Intertrust’s Chief Technology Officer…
With the promise of any device being able to communicate with another device largely kept, the Internet is truly a world wonder. The Internet’s promise is now coming to a new mass market, the connected home. Yet, the way the connected home market is shaking out right now, it looks like we may end up not with an open Internet type of market but a walled garden type of market controlled by some familiar logos.
What the internet of things pushes forward is a reversal on the old paradigm that humans are the solution to the problem that technology creates. If we look closer at the human supply chain for the IoT, there are three key players: manufacturers, developers and end users. Here’s how they can advance the future with foresight (rather than the proverbial hindsight):
John Feland, CEO and founder of Argus Insights, an analytics firm specializing in consumer sentiment analysis, spoke on June 10th at Intertrust headquarters. Building on his earlier work at IDEO and Stanford, Feland founded Argus to use analytics from social data and product reviews to clarify consumer sentiment and help companies better understand market and product trends…..For this discussion, Feland shared some of Argus’ insights on the consumer smart home market. First, the good news (based on data from March 2015-2016) was that consumer sentiment around smart home products climbed more quickly than those around laptops and tablets (these two actually went down), smartphones, and wearables
Last week, we had the opportunity to participate at the Data by the Bay Conference, which is the first data grid conference matrix with six vertical application areas spanned by multiple horizontal data pipelines, platforms, and algorithms. Data by the Bay unifies data science and data engineering to examine what really works to run businesses at scale…
Even if you are just a casual observer of the technology industry, you’ve certainly heard about Moore’s Law, i.e. the number of transistors in an integrated circuit doubles every two years. Moore’s Law certainly has been a driver in the technology industry, but Intertrust’s Chief Technology Officer (CTO) and Bell Fellow David Maher recently gave a talk on another view on what drives innovation.
Tomorrow I will be giving an invited talk at the Human Genome Variation 2015 conference in San Francisco. The title of my talk is Impediments to Interoperability: Why Can’t We All Just Get Along? For ethical and scientific reasons — some of which I will briefly outline in my talk — data sharing is imperative in genomics. And yet, very little data sharing actually happens. Why?
Download the Q3 2015 report. The mobile ecosystem faces a problem: brands have been timid to enter the space with single digit allocations for mobile hovering at 8%. We dig deep to answer hard questions on why a budget adjustment to 16% is more appropriate considering time spent on this device.
The future of food – the future of biodiversity | The global impact of UK food consumption | #FutureofFood2015
Unprecedented access to data is transforming the food ecosystem. Making as much data as possible accessible helps make the food ecosystem efficient while keeping the environmental impact as low as possible. Responsible organizations must have complete sets of data available to make truly useful services. Ensuring that data is handled with appropriate concern for privacy and other rights of the data holders will be an important factor in making this happen.