recentpopularlog in

jonerp : not   7

How Edge Computing Will Deliver on the Promise of 5G
"That’s because it’s not meant for us. Like most technological advancements, industry will come first. The promise of 5G is in swarms of drones and fleets of autonomous vehicles. It’s in lightweight industrial wearables that process crucial information rapidly. It’s in robots. And, yes, it’s in the augmented reality game we’ve all been waiting for, “Harry Potter: Wizards Unite.”

This promise of 5G will be most likely delivered on the edge, taking it from conference marketing to real-world feasibility. In fact, 4G can already deliver a 5G-like experience with edge computing."
That’s  because  it’s  not  meant  for  us.  Like  most  technological  advancements  industry  will  come  first.  The  promise  of  5G  is  in  swarms  drones  and  fleets  autonomous  vehicles.  lightweight  industrial  wearables  that  process  crucial  information  rapidly.  robots.  yes  augmented  reality  game  we’ve  all  been  waiting  “Harry  Potter:  Wizards  Unite.”  This  be  likely  delivered  on  edge  taking  it  from  conference  marketing  to  real-world  feasibility.  fact  4G  can  already  deliver  a  5G-like  experience  with  computing.edge  iot  events 
march 2019 by jonerp
How WhatsApp Destroyed A Village
"The Indian government, however, had been hoping for more: It had asked for WhatsApp to develop tools to help trace the origin of messages, ostensibly to help authorities hunt down the creators of the fake videos.

Carl Woog, a spokesperson for WhatsApp, provided the following statement to BuzzFeed News: “We believe that building ‘traceability’ into WhatsApp would undermine end-to-end encryption and the private nature of WhatsApp creating the potential for serious misuse. As we go forward, WhatsApp remains committed to working with others in society on the challenge of misinformation though we will not weaken the privacy protections we provide.”
"The  Indian  government  however  had  been  hoping  for  more:  It  asked  WhatsApp  to  develop  tools  help  trace  the  origin  of  messages  ostensibly  authorities  hunt  down  creators  fake  videos.  Carl  Woog  a  spokesperson  provided  following  statement  BuzzFeed  News:  “We  believe  that  building  ‘traceability’  into  would  undermine  end-to-end  encryption  and  private  nature  creating  potential  serious  misuse.  As  we  go  forward  remains  committed  working  with  others  in  society  on  challenge  misinformation  though  will  not  weaken  privacy  protections  provide.” 
september 2018 by jonerp
Monday’s Musings: Seven Common Failures Plague Board Room Strategy In Digital Transformation
"Laggard market perception cascades failure and customer disillusionment. Declining brands and organizations in laggard industries stripped of brand equity enter an era of negative market perception. Instead of redefining the mission and purpose with new business models, orgs often take a short cut of branding without substance. Seen as devoid of innovation with a commoditized non-differentiated offering, every stakeholder from employee, customer, partner, supplier, and investor lowers expectations of success. The result – leaders who focus on short term gain, declining employee morale, lack of interest by investors, and lower quality from suppliers. Partners lose interest in creating co-innovation and co-creation ecosystems with laggards. Customers no longer find an affinity for a brand that has sold its soul and will not pay for premium pricing when they no longer see value."
"Laggard  market  perception  cascades  failure  and  customer  disillusionment.  Declining  brands  organizations  in  laggard  industries  stripped  of  brand  equity  enter  an  era  negative  perception.  Instead  redefining  the  mission  purpose  with  new  business  models  orgs  often  take  a  short  cut  branding  without  substance.  Seen  as  devoid  innovation  commoditized  non-differentiated  offering  every  stakeholder  from  employee  partner  supplier  investor  lowers  expectations  success.  result    leaders  who  focus  on  term  gain  morale  lack  interest  by  investors  lower  quality  suppliers.  Partners  lose  creating  co-innovation  co-creation  ecosystems  laggards.  Customers  no  longer  find  affinity  for  that  has  sold  its  soul  will  not  pay  premium  pricing  when  they  see  value.2018  apps  strategy  best  practices  board  room  boardroom  priorities  promises  transformation  c-suite  cdo  ceo 
may 2018 by jonerp
Researchers Found Two Major Security Flaws In Processors That Affect Most Of The World's Computers
"In a blog post responding to the research, Intel said the flaws described had "the potential to improperly gather sensitive data from computing devices that are operating as designed," but that the company "believes these exploits do not have the potential to corrupt, modify or delete data."
In  a  blog  post  responding  to  the  research  Intel  said  flaws  described  had  "the  potential  improperly  gather  sensitive  data  from  computing  devices  that  are  operating  as  designed  "  but  company  "believes  these  exploits  do  not  have  corrupt  modify  or  delete  data." 
january 2018 by jonerp
Shop.org live – how Carhartt turns visitors into customers with user-generated content - by @jonerp
"No brand would object to generating more user-generated content - but it's not that easy. At Shop.org 2017, Carhartt shared how they upped their UGC game, and why it matters."
"No  brand  would  object  to  generating  more  user-generated  content  -  but  it's  not  that  easy.  At  Shop.org  2017  Carhartt  shared  how  they  upped  their  UGC  game  and  why  it  matters.content  marketing  e-commerce  retail  the  omni-channel  use  cases 
september 2017 by jonerp
Cisco warns of DeOS attacks
"The use of the Internet of Things (IoT) by hackers has been well documented. A significant part of the problem is the lack of security in too many Internet connected devices. Enterprise IT departments often have no say in the purchase of many of these devices. Security cameras, fridges, televisions and other goods are often purchased by different departments. Few of them have any security training."
homepage  slider  latest  news  security  cisco  cyber  ddos  deos  iot  not  petya  nyetya  ransomware 
july 2017 by jonerp
A Closer Look at the ‘Learning’ Aspect of Machine Learning
"Each algorithm is designed to either predict or classify data. For example, logistic regression is used to find out a boolean value that results in a true or false. linear regression, as we have seen, is used in scenarios where the prediction is a number. Other algorithms like Support Vector Machine and K Nearest Neighbor are used for classification. Irrespective of the algorithm, the goal is to use existing data to find accurate parameters to evolve the final model."
technology  top  stories  tutorials  artificial  intelligence  coefficient  of  determination  cost  functions  development  linear  regression  machine  learning  is  not  magic  python  supervised 
april 2017 by jonerp

Copy this bookmark:





to read