AI Tech Update

AI Tech Update

The rightful way to make an employee unhappy

Management is a difficult art, management in big corporations is more difficult. Management in a corporation where the multicultural requirement is a need is even harder. We all know it and, to a certain extent, we have to deal with it. We can’t expect everything works well and right, and we have to show flexibility and we have to be open to change and embrace the new but… Let’s be real, no matter how much effort you put sometimes things are just not right. When the environment is too toxic probably is better to leave than hoping for a change. …

The IoT Files: Culture

The IoT Files: Culture   In the previous IoT flies tried to outline what are, from my point of view, some key factor that have to be taken into account when talking about IoT. The last, but not the least, point I would like to put some notes is culture. Since IoT is something that will shape out way of life on many aspect, we have to convene that culture is a key element in order to positively and safely embrace it. Culture refers to billions of things, from language structure to literature, from how we share information to how…

The fine art to make impossible what is possible. (Or why many projects fail)

I know there is always a great distance between reality and management, Sometimes it happens to me to bump into a real good manager, but it is mostly an exception to the general rule than the norm. I would say that my personal opinion is that because nowadays management mostly is all but dealing with reality, with the prevalent culture that has moved from production to finance, we moved from the real economy to a virtual representation that does not take into account many factors because focused only on few parameters. The result is quite interesting since, from one side,…

The IoT Files – Business Models

The IoT Files – Business Models Ok we talked about security, privacy and infrastructure in the last post Here we are. do we really think that IoT will work in the current business model environment? Well I have to tell you, probably it would not. The key factor of IoT will be if it will be able to generate revenue? the problem of revenue is related to the fact they should cover the infrastructure costs, in order to do so, since we already seen that infrastructure costs will be big, as well as security, privacy implication that have, also, a cost, selling devices will not be…

The IoT Files – Infrastructure

The IoT Files – Infrastructure IoT is a complex argument, we already know it. In my previous introductory post I tried to explain the privacy and security concerns that IoT is bringing to us (https://www.linkedin.com/pulse/iot-files-privacy-antonio-ieranò). Most of those concerns are intercnnected one to the other, but have also a strong relationship with the next point: the infrastructure needed. With Infrastructure I refer to a lot of things, that goes beyond the simply technical aspect, because a real IoT infrastructure goes way beyond the access protocol or the wireless. Wireless Outdoorsindoors Connections But since we named Access protocols and wireless stuffs,…

The IoT Files – Privacy

In the previous post “The IoT Files – intro and security” I started to talk about Security issues related to the IoT world. Security imply a wide range of elements, one of them is Privacy. But since the nature of this topic is particularly sensitive I will talk about it separately. Privacy in the Internet of Things assume a different taste than we used to think. We should think again what IoT means. A lot of objects that are able to communicate and process data,  equipped with sensors that make them aware of the neighborhood. Those sensors will be able to…

The IoT Files – intro and security

The IoT Files – intro and security I will start a series of posts on the IoT (Internet o Things) since it seems me that most of the talking about IoT are missing some key aspects. I will start with a general introduction, taken from a webinar I delivered recently. There is a lot of rumors around IoT lately. It seems the new holy grail of the technology industry, the panacea that will solve every business pain and will drive us to the next point. All those talking are interesting, but somehow a little bit apologetic, since there is a…

Privacy Impact Assessment

Privacy Impact Assessment Privacy impact assessments (PIAs) are tools which can help organizations identify the most effective way to comply with their data protection obligations and meet individuals’ expectations of privacy. An effective PIA will allow organizations to identify and fix problems at an early stage, reducing the associated costs and damage to reputation which might otherwise occur. PIAs are an integral part of taking privacy by design approach. Key points: A PIA is a process which assists organizations in identifying and minimizing the privacy risks of new projects or policies. Conducting a PIA involves working with people within the…

Global Cooperation in Cyberspace Initiative

Dear Colleagues,   The EastWest Institute is leading a Global Cooperation in Cyberspace Initiative to help make cyberspace more secure and predictable. As part of that initiative, EWI has established a “breakthrough group” that is working to enhance cybersecurity for governments and enterprises globally by enabling the availability and use of more secure information and communication technology (ICT) products and services.   For providers in the ICT supply chain, the group is promoting the use of recognized and proven international standards and best practices that improve product and service integrity. For buyers of ICT, the group is working to foster the use of procurement…

ransomware again, really?

Some days ago a friend of mine reported me that his company has been affected by a ransomware cryptoloker style. I keep hearing people infected by this kind of infection and I am starting to wonder if people has really understood what a cryptomalware really is and how it works.   here from Wikipedia: ” Ransomware is a type of malware that restricts access to a computer system that it infects in some way, and demands that the user pay a ransom to the operators of the malware to remove the restriction. Some forms of ransomware systematically encrypt files on…

Posts navigation