The Future of Online Shopping (Infographic)

ecommerce_future_infographic

Source: The Chat Shop Blog

Posted in Digitization | Tagged , | Leave a comment

Data Science and Measuring Happiness

GNHIs it possible to measure happiness? Can we compare countries on the basis of a universal yardstick for collective happiness similar to Gross National Product (GNP), the accepted measure for a country’s material well-being?  How could data science contribute to practical applications of happiness analysis?

The Kingdom of Bhutan, a 770,000-strong nation landlocked between China and India at the eastern end of the Himalayas, has been developing what it calls Gross National Happiness (GNH) and applying it to government policies for more than 40 years. Influenced by Buddhism, happiness as measured by GNH is different from the way it is perceived in the West in two ways. It is “multidimensional – not measured only by subjective well-being,” according to the Short Guide to GNH. Furthermore, it is “not focused narrowly on happiness that begins and ends with oneself and is concerned for and with oneself.”

A new data science workshop, to take place November 6th to 11th in Bhutan, will discuss and debate questions related to the measurement of happiness  with experts in data science, Buddhist leadership and Gross National Happiness. The Data Happy conference and workshop will involve a high level of participatory process, collaboratively exploring ways by which individuals can contribute to the measurement of Gross National Happiness on a daily basis.

Troy Sadkowsky, the lead organizer of the event and the founder of Data Scientists Pty Ltd and creator of DataScientists.Net, says: “Developing a more holistic and accurate measure of wealth that includes more than just financial aspects would benefit us all. This could be a powerful tool for monitoring a healthy global growth in sustainable prosperity. Data Science is purpose-built for exploring this new terrain.”

The multiple dimensions of happiness and its collective or community orientation are reflected in the 9 domains that comprise the GNH index: psychological wellbeing, time use, community vitality, cultural diversity, ecological resilience, living standards, health, education, and good governance. These are in turn comprised of 33 clustered indicators, each one of which is composed of several variables, for a total of 124 variables.

The government of Bhutan administers every four years a survey based on the GNH index and respondents rate themselves on each of the variables. The 2010 survey found that 10.4% of the population is ‘unhappy’ (defined as achieving sufficiency in 50% or less of the weighted indicators), 48.7% were found to be ‘narrowly happy, ’ 32.6% were ‘extensively happy,’ and  8.3% of the population was identified as ‘deeply happy’ (showing sufficiency in 77% or more of the weighted indicators).

At the Data Happy conference, participants will discuss a proposed system for going beyond the periodical paper-based survey to an online process that will run continuously and will be integrated into other services in Bhutan. Says Sadkowsky: “We will be looking to introduce as much new technology as feasible to help increase accessibility and usability.  A major goal is to convert attitudes around the GNH measurement tools from something that people feel they have to do, like mandatory census surveys, to something that they want to do.“

Sadkowsky hopes that participants in the Data Happy conference will contribute to designing a tool for measuring Gross Individual Happiness that can be integrated into the daily lives of the people of Bhutan. Find out more about the program and registration here.

Originally published on Forbes.com

Posted in Data Science | Tagged | Leave a comment

The Internet of Things (IoT) Comes to the NFL

nfl_tech_infographic-100612792-large.idge

CIO.com:

…each player will be equipped with a set of RFID sensors about the size of a quarter embedded in his shoulder pads, each emitting unique radio frequencies. Gillette Stadium (and every other stadium used by the NFL) has been equipped with 20 receivers to pick up those radio frequencies and pinpoint every player’s field position, speed, distance traveled and acceleration in real time.

By using two sensors for each player — one embedded in the left shoulder pad and one on the right — the system will also be able to identify the facing of each player.

The NFL plans to use the data generated to power the NFL 2015 app for Xbox One and Windows 10, allowing for things like “Next Gen Replay” that will allow fans to call up stats for each player tied into highlight clips posted on the app. But that’s just the beginning. The data will be fed to broadcasters, leveraged for in-stadium displays and provided to coaching staff and players.

Posted in Internet of Things | Tagged | Leave a comment

The global UAV drones market to grow 32% annually to reach $5.59 billion by 2020

The $599.99 IRIS+ from 3D Robotics, "a robot that will automatically fly itself where you tell it to go, while keeping a camera dead steady"

The $599.99 IRIS+ from 3D Robotics, “a robot that will automatically fly itself where you tell it to go, while keeping a camera dead steady”

MarketsAndMarkets:

Before 2014, the use of UAV drones for commercial applications was highly regulated in countries such as the United States. Post 2014, the Federal Aviation Administration (FAA) has relaxed the norms for the use of UAV drones for commercial applications, and also FAA has started giving exemptions to companies to make commercial use of drones under Section 333 with some restrictions. As of September 2, 2015, FAA has granted 1,439 exemptions for the commercial use of drones. The global UAV drones market is expected to reach $5.59 billion by 2020, and it is expected to grow at a CAGR of 32.22% between 2015 and 2020. Among all the commercial applications, precision agriculture application is expected to grow at the highest CAGR of 42.25% during the forecast period.

The rotary blade drones market held the largest market share in 2014, and it is expected to reach $4.93 billion by 2020, growing at a CAGR of 31.42% between 2015 and 2020. Rotary blade drones are widely preferred by the professionals from the media and entertainment industry for video shooting and photography.

The UAV drones market is dominated by the key players such as DJI (China), Parrot S.A. (France), 3D Robotics Inc. (U.S.), and PrecisionHawk (U.S.), among others.

Posted in Robotics | Tagged | Leave a comment

2 Solutions to Demand for Tech Skills: Coding Bootcamps and Computer Science Education Starting in Elementary Schools

CodingBootcamps

LinkedIn Official Blog:

Technical talent is in high demand. As of publishing this post, a LinkedIn job search for “Software Engineers” in the US reveals more than 100,000 open jobs. Adding a couple more tech-related roles (“User Designer,” “Data Scientist”) increases the total to more than 200,000 job openings. Job seekers looking to meet job requirements can enroll in a Master’s degree program, but that comes with a 2-year opportunity cost. Now, a shorter path is emerging: fully immersive coding bootcamps.

Coding bootcamps typically last 6-12 weeks and require participants to show up to a class in person. Bootcamps are a relatively new model, but they’re a growing trend that could help close the skills gap. Tapping into the Economic Graph, we compiled aggregated data on over 150 bootcamp programs and more than 25,000 LinkedIn members who have indicated they are attending or have attended bootcamps to identify emerging trends.

In 2011, fewer than one hundred LinkedIn members indicated they had graduated from bootcamp programs. In 2014, more than 8,000 members completed coding bootcamps and added them to their profiles, reflecting a rise in acceptance of the bootcamp model. The number of bootcamp graduates in the first six months of 2015 has nearly surpassed all of 2014. At this rate, we can expect to see more than 16,000 graduates by the end of 2015 — more than double the total number of 2014 graduates.

An Open Letter from the Nation’s Tech and Business Leaders: Why Computer Science for All is good for all

Yesterday morning, Mayor Bill de Blasio took to the stage to announce the nation’s most ambitious and far-reaching technology education effort to date: New York City will deliver computer science education to every student in each of the City’s public elementary, middle, and high schools by 2025 through its new Computer Science for All initiative.

The impact of this investment cannot be overstated.

One in five New York City businesses employs tech talent, fueling the growth of a tech sector that today represents nearly 300,000 jobs and $30 billion in annual wages. Between 2007 and 2014, tech employment in the City grew 57 percent, nearly six times faster than overall citywide employment. And by the year 2020, the U.S. Bureau of Labor projects there to be more than 1.4 million computer specialist job openings nationwide.

Posted in Misc | Tagged , | Leave a comment

Steve Papa: Data volume is cumulative, analyses possibilities are combinatoric (video)

[youtube https://www.youtube.com/watch?v=YgKSCFBZzlM?rel=0]

Steve Papa is an active founder and venture capitalist. As founder of Parallel Wireless he is making the deployment of the carrier-grade LTE RAN as easy as deploying enterprise Wi-Fi. As investor, he is active both as a founding investor and a board partner for Andreessen Horowitz.

Previously he founded and led the big data database company Endeca until it was Oracle’s largest private company acquisition, reported at $1.1 billion when announced in 2011. Endeca launched at Demo 2001 and pioneered the now ubiquitous faceted search and query. He got his high-tech career started at Inktomi where he created the company’s carrier class caching business and then helped launch Akamai. Steve studied at Princeton and Harvard where is an advisor to both their respective entrepreneurship programs.

Posted in Big Data Analytics, Data Growth | Tagged , | Leave a comment

The Virtual Reality Landscape (Infographic)

VirtualReality

Phil Orr and Max Wessel, Sapphire Ventures:

..we believe three characteristics of VR will help it carve out its position in the world of computing. These characteristics hint at Neal Stephenson’s metaverse. Namely, they are presence, scale, and interaction design.

  • Presence is an Oculus-coined term that effectively translates to a sense of being there. With presence, comes focus and attention. It’s impossible to ignore a piece of content when it’s your reality. It’s also proven that presence changes the way people internalize information and react emotionally to stimulus. That level of intellectual involvement will impact what we can do with software.
  • Scale is something we all understand. It’s difficult to imagine what the interior of a house will look like from a diagram on the screen of an iPhone. It’s easy for an architect to help you imagine how the interior of a house might look when you can walk around inside of it.
  • Interaction design changes fundamentally when your body becomes the controller. Today, when you use a computer for training or simulation, you interact with it using a mouse or a keyboard. It can inform you about different environments, but it does little to teach you how to execute tasks physically in the real world. VR changes that. When a system is designed to monitor movement on hundreds of different points on your body, it can help train you to do everything from perform surgical motions to throwing a football.
Posted in Misc | Leave a comment

Startups Disrupting Apple (Infographic)

CBInsights_ios

CB Insights:

…we used CB Insights data and analysis to dig in and see which startups have been peeling away at some of the categories served by default iOS apps… We found dozens of investor-backed private companies developing apps that would like to displace Apple’s stock apps and knock them off the home screen. In all, we identified 44 startups attacking iOS, with music, messaging, and health seeming to be the three most contested categories.

Posted in startups | Tagged , | Leave a comment

Looking at the Dark Side of the Net

Etay Maor, IBM

Etay Maor, IBM

Wired recently reported that hackers posted a “data dump, 9.7 gigabytes in size… to the dark web using an Onion address accessible only through the Tor browser.” The data included names, passwords, addresses, profile descriptions and several years of credit card data for 32 million users of Ashley Madison, a social network billing itself as the premier site for married individuals seeking partners for affairs.

“I want to show you the dark side of the net,” Etay Maor told me when we met last month at the IBM offices in Cambridge, Massachusetts. He then proceeded to give me a tour of the Internet’s underground, where cyber criminals and hackers exchange data, swap tips, and offer free and for-fee services. “Information sharing is a given on the dark side,” said Maor, “but for the good guys, it’s not that easy.”

Maor is a senior fraud prevention strategist at IBM and has watched the dark side of the Web at RSA, where he led the cyber threats research lab, and later at Trusteer, a cybersecurity startup which IBM has acquired in 2013 for a reported $1 billion. His focus is cybercrime intelligence, specifically malware—understanding how it is developed and the networks over which it is distributed. Maor is an expert on how cyber criminals think and act and shares his knowledge with IBM’s customers and also with the world at large by speaking at conferences and blogging at securityintelligence.com.

The Web is like an iceberg divided into three segments, each with its own cluster of hangouts for cyber criminals and their digital breadcrumbs. The tip of the iceberg is the “Clear Web” (also called the Surface Web), indexed by Google and other search engines. The very large body of the iceberg, submerged under the virtual water, is the “Deep Web”—anything on the Web that’s not accessible to the search engines (e.g., your bank account). Within the Deep Web lies the “Dark Web,” a region of the iceberg that is difficult to access and can be reached only via specialized networks.

Maor first demonstrated to me how much cybercrime-related information is available on the Clear Web. Simply by searching for spreadsheets with the word “password” in them, you can get the default password list for many types of devices and other things and places of interest to criminals. There is easily accessible information that may have been posted to the Web innocently or by mistake. But there is also a lot of compromised information (e.g., stolen email addresses and their passwords) available on legitimate websites that provide a Web location for dumping data.

Then there are forums for criminals, some masquerading as a benign “hacking community” or “security research forum,” promoting themselves like any other business and/or community, including a Facebook page, and covering their costs or even making some money by displaying ads. One such forum had 1,200 other people accessing it when Maor showed it to me, demonstrating how, with a few clicks of the mouse, you can find lists of stolen credit card numbers including all the requisite information about the card holder.

Maor proceeded to introduce me to Tor, the most popular specialized network providing anonymity for its users, including participants in the underground economy of the Dark Web.  It was developed in the 1990s with the purpose of protecting U.S. intelligence communications online by researchers at the US Naval Research Lab which released the code in 2004 under a free license. It has 2.5 million daily users, some with legitimate reasons to protect their identities, and others who are engaged in criminal activities.

Tor is based on Onion routing, where messages are encapsulated in layers of encryption. The encrypted data is transmitted through a series of network nodes called onion routers, each of which “peels” away a single layer, uncovering the data’s next destination. The sender remains anonymous because each intermediary knows only the location of the immediately preceding and following nodes. The final node in the chain, the “exit node,” decrypts the final layer and delivers the message to the recipient.

While Tor is used by people with legitimate reasons to hide their identity, it (and similar networks) also facilitates a thriving underground economy. This is where you can buy firearms, drugs, fake documents, prescription drugs or engage in pedophilia networks, human trafficking, and organ trafficking. Maor paraphrases Oscar Wilde: “Give a man a mask and he will show his true face.”

Tor is also home to rapidly growing “startups,” offering fraud-as-a-service. A decade ago, says Maor, cybercrime “was one-man operation.  Today, it’s teamwork.”  Furthermore, the whole process, from coding the malware to distributing it to working with money mules, can be easily outsourced.  Everything a cybercriminal might need is now available on the underground forums, some components of the process as a free download, others as a for-fee service, including cloud-based services with guaranteed service level agreements (SLAs). The menu of cybercrime options has grown beyond financial fraud tools, to include advanced targeting tools, Remote Access Tools (RATs), and health care and insurance fraud tools and services.

The explosion of data about us, our lives and our workplaces on the Clear Web has helped the denizens of the Dark Web circumvent traditional online defenses such as passwords. “Fifteen years ago,” says Maor, “it took a lot of work to breach a company. Today, I can go on Linkedin and find out exactly what is the structure of the company I’m interested in.” Knowledge of the reporting structure of a specific company helps criminals’ “social engineering” efforts, manipulating people into performing certain compromising actions or divulging confidential information. Once criminals get to know their targets (e.g., by connecting on Linkedin), the victims may open an email or attachment that will infect their computer and provide the desired access to the company’s IT infrastructure.

Cyber criminals are taking advantage of the abundance of data on the Web and its success at connecting and networking over 2 billion people around the world. 80% of cyber attacks are driven by highly organized crime rings in which data, tools and expertise are widely shared, according to a UN study on organized crime, generating $445 billion in illegal profits and brokering one billion-plus pieces of personally identifiable information annually.

Data and networking—aren’t they also great tools in the fight against cybercrime? Not so much. Corporations and security firms have been reluctant to share cybersecurity intelligence. Only 15% of respondents to a recent survey said that “participating in knowledge sharing” is a spending priority.

There have been some efforts to change that, such as the establishment of industry-specific Information Sharing and Analysis Centers (ISACs) and the cross-industry National Council of ISACs.  The Department of Homeland Security and other government agencies are working to promote specific, standardized message and communication formats to facilitate the sharing of cyber intelligence in real time. The Cybersecurity Information Sharing Act (CISA), a bill creating a framework for companies and federal agencies to coordinate against cyberattacks, is being debated in Congress.

Alejandro Mayorkas, the Deputy Secretary of Homeland Security recently said: “Today’s threats require the engagement of our entire society. This shared responsibility means that we have to work with each other in ways that are often new for the government and the private sector. This means that we also have to trust each other and share information.”

IBM has taken a big step towards greater engagement and information sharing when it launched in April the IBM X-Force Exchange. It is a threat intelligence sharing platform where registered users can mine IBM’s data to research security threats, aggregate cyber intelligence, and collaborate with their peers. IBM says the exchange has quickly grown to 7,500 registered users, identifying in real-time sophisticated cybercrime campaigns. “I’m a fan,” security guru Bruce Schneier responded when I asked him about X-Force Exchange.

“The security industry must share information, all the time, in real time,” says Maor. “It’s a change of mindset, but it has to be done if we want to have some sort of edge against the criminals.”

Originally published on Forbes.com

Posted in Misc | Leave a comment

Startups Disrupting Education with New Technologies

CBInsights_Smart-VC-BSG

CB Insights:

Venture capital funding to education technology startups passed $1.6B last year, across 217 deals. With ed tech startup investing becoming so competitive and crowded, it’s important to know where top VCs are placing their bets…

Accel Partners, Felicis Ventures, and New Enterprise Associates are the most active smart VCs in ed tech, with more than 10 unique portfolio companies each in the area. The least active investors are Index Ventures and Battery Ventures. Two startups had the most unique smart VC investors, with 5 each: classroom-based community tool Edmodo and online learning content platform Knewton.

We identified six different ed tech markets that smart VCs are moving into.

  • Online language learning: Companies providing online and mobile software to learn foreign languages or English as a second language. Firms in this category that have received smart money VC deals include Mindsnacks, Duolingo, and Open English
  • Teacher-student collaboration & communication: These companies connect students and teachers through online and mobile software to share content, manage assignments, and communicate both in and out of the classroom. Firms that have received smart money investments include Piazza, Instructure, Remind, and Edmodo.
  • Education data and analytics: Companies providing data analytics software and solutions in and around the education industry and student performance. This category encompasses a few firms that have received smart money funding, including Civitas Learning and Declara.
  • Coding and programming education: Companies offering digital offerings aimed at coding, programming, or engineering skills and techniques. Companies with smart money VC backing include Codecademy, One Month, and Bloc.
  • MOOCs & online classrooms – Companies offering free or accredited online courses or tutorials in assorted subject areas. Two companies in this area with smart money VC funding are Udemy and Coursera.
  • Tutoring and Test Prep: Companies offering tutors, textbooks, notes, or study materials for specific standardized tests. Smart money VC companies include WyZantand Desire2Learn.
Posted in startups | Leave a comment