Sign up for updates
Also known as The Lion City, The Garden City and the Little Red Dot, Singapore is famous for its significant achievements in innovation, favorable tax system, recognized universities and great life quality. However, Singapore also ranks at the very top of the world’s most densely populated independent territories right after Macau and Monaco. And with insignificant amount of natural resources of its own, the country needs a strong, forward-thinking take on energy and innovation in order to power its fast-growing community.
In a previous post, I’ve used Python Data Tools to fetch and visualize weather data using Datahub API (sign up for a free API key to try it). Today I’m going to solve another simple use-case using few other Python-based tools and the very same data and API. One of the heavily-influenced weather-dependent industries is Renewable Energy…
At the close of the summer of 2016, there was no more perfect metaphor for user acquisition than the mobile game Pokémon Go by Nintendo. Users and their devices spent hours, if not whole days, hunting and collecting Pokémon. If you are still unfamiliar with Pokémon Go, well…welcome back from your lengthy sojourn in…
We live in a brilliant time when doors open without keys and coffee brews itself. Refrigerators come with sensors and cameras to track what’s inside your fridge. We’ll have an incredible 500 devices per home by 2022, according to Gartner. But with so many devices running on different platforms, we risk ending up with a mess of separate walled gardens.
This report covers the mobile market, the role security plays within the market, the cost of data breaches, different mobile operating systems and their vulnerabilities, a look at app security for the Internet of Things, what developers can do to secure apps, and how whiteCryption can help.
The National Institute of Standards and Technology (NIST) is an important part of of the U.S. Federal Government’s activities to support science and technology. Of course NIST’s efforts extend to the computing field as well and NIST is a key agency for leading the Federal Government’s activities in evaluating and adopting cutting edge computing techniques. So, of course we were honored when Intertrust’s Chief Technology Officer…
With the promise of any device being able to communicate with another device largely kept, the Internet is truly a world wonder. The Internet’s promise is now coming to a new mass market, the connected home. Yet, the way the connected home market is shaking out right now, it looks like we may end up not with an open Internet type of market but a walled garden type of market controlled by some familiar logos.
What the internet of things pushes forward is a reversal on the old paradigm that humans are the solution to the problem that technology creates. If we look closer at the human supply chain for the IoT, there are three key players: manufacturers, developers and end users. Here’s how they can advance the future with foresight (rather than the proverbial hindsight):
John Feland, CEO and founder of Argus Insights, an analytics firm specializing in consumer sentiment analysis, spoke on June 10th at Intertrust headquarters. Building on his earlier work at IDEO and Stanford, Feland founded Argus to use analytics from social data and product reviews to clarify consumer sentiment and help companies better understand market and product trends…..For this discussion, Feland shared some of Argus’ insights on the consumer smart home market. First, the good news (based on data from March 2015-2016) was that consumer sentiment around smart home products climbed more quickly than those around laptops and tablets (these two actually went down), smartphones, and wearables
Last week, we had the opportunity to participate at the Data by the Bay Conference, which is the first data grid conference matrix with six vertical application areas spanned by multiple horizontal data pipelines, platforms, and algorithms. Data by the Bay unifies data science and data engineering to examine what really works to run businesses at scale…
Even if you are just a casual observer of the technology industry, you’ve certainly heard about Moore’s Law, i.e. the number of transistors in an integrated circuit doubles every two years. Moore’s Law certainly has been a driver in the technology industry, but Intertrust’s Chief Technology Officer (CTO) and Bell Fellow David Maher recently gave a talk on another view on what drives innovation.
Tomorrow I will be giving an invited talk at the Human Genome Variation 2015 conference in San Francisco. The title of my talk is Impediments to Interoperability: Why Can’t We All Just Get Along? For ethical and scientific reasons — some of which I will briefly outline in my talk — data sharing is imperative in genomics. And yet, very little data sharing actually happens. Why?
The future of food – the future of biodiversity | The global impact of UK food consumption | #FutureofFood2015
Unprecedented access to data is transforming the food ecosystem. Making as much data as possible accessible helps make the food ecosystem efficient while keeping the environmental impact as low as possible. Responsible organizations must have complete sets of data available to make truly useful services. Ensuring that data is handled with appropriate concern for privacy and other rights of the data holders will be an important factor in making this happen.
Technology disruption rear-ended Volkswagen in a most ironic way last week. While many have written about VW’s arrogant approach to emissions testing, few have noted a more serious issue that goes to the heart of all mainstream car makers’ modus operandi…
Data science has risen in popularity as one way to train a customer model to seek and duplicate based on predictions of who behaves like your best audience. This specific practice is called “lookalike modeling,” and although not new to the offline world, it requires special consideration – especially when new parties onboard from offline into the complex, mobile space.
While many techniques for protecting online privacy have been proposed, a variety of issues call into question their effectiveness for individuals and for the commercial entities that want to provide services to them.
This paper presents an overall approach to creating security and trust architecture for networked automotive vehicles and outlines basic principles for mitigating certain risks facing this new paradigm.
This paper describes necessary elements for a solution to the problem of governed information sharing, and discusses how new developments in trusted computing enable new applications for patient privacy, data security, and medical research.
Most DRMs that are in use today are based on DRM specific declarative rights expression languages and authorization mechanisms that have strong semantic coupling to the application in which they are employed. A notable exception to this approach can be found in the Octopus system described in this paper. Octopus employs several concepts from the trust management philosophy originally posited by Blaze, et al. in 1996, but perhaps its most striking similarity can be found in its clear separation of authorization mechanism from application semantics.
“Mobile video traffic now accounts for more than half of all mobile data traffic at 55% in 2015. The top 20% of power users generated 59% of mobile data traffic. Download the report to read more…”
Download the Q3 2015 report. The mobile ecosystem faces a problem: brands have been timid to enter the space with single digit allocations for mobile hovering at 8%. We dig deep to answer hard questions on why a budget adjustment to 16% is more appropriate considering time spent on this device.
Download the Q2 2015 report. This quarter we cover mobile ad spend, which will see 430% growth between 2013 and 2016, when it is set to surpass $100 billion. However, can ad-technology keep up with the growth?
2014 was an exciting year marking a significant increase in global data usage with some analysts predicting a 10x increase in mobile data by 2019.