[slideshare id=49605993&doc=mewa16z-150619153942-lva1-app6892]
Joi Ito on Open Hardware and Why Bio is the New Digital
[youtube https://www.youtube.com/watch?v=pnHD8gvccpI?rel=0]
Facebook is in a category all by itself (#dataviz)
Findings in a new report released by Verto Analytics: 222 million U.S. Facebook users tend to spend 14 hours per month in the company’s app. (That’s 335,000 years worth of time, by the way.) Google reaches 228 million U.S. users, but they spend a little less than four hours a month using the company’s services. Add in the company’s video giant YouTube, which captures about five hours of its users’ attention monthly, and Google still only has a little less than nine — five hours less. Which means in a user-and-time chart, Facebook is all by itself. This matters mostly because in a world of free services in which we — the great device-using unwashed — are the product, and ad dollars drive innovation and competition, reach times engagement equals revenue. In short: Attention winners become financial winners.
Stopping Data Breaches is Everybody’s Job
The 2015 Data Breach Investigations Report, released in April by Verizon, estimated that there were 2,122 confirmed data breaches in 2014, generating $400 million in losses. This week we learned that one attack that was not included in this count happened in June 2014, targeting CareFirst BlueCross Blue Shield, serving 3.4 million customers in Maryland, Virginia and the District of Columbia. CareFirst only recently discovered the breach—names, birthdates, and email addresses of 1.1. million members—after putting in place new security measures.
In April, hackers redirected traffic from the Federal Reserve Bank of St. Louis’ research website to rogue pages. In its notice to users, the St. Louis Fed warned them that they may have been exposed to “phishing, malware and access to user names and passwords.” And Australian telecoms group Telstra said hackers gained access to the network of its Asian subsidiary Pacnet, and that it “was made aware of the breach” when its purchase of Pacnet was finalized on April 16.
To prevent the continuing loss of money, reputation, and customers, companies must make stopping cybercrime a team effort, internally and externally. Collaboration is the essence of preventing data breaches and responding to them effectively.
I came to this conclusion after listening to a presentation by Jason Malo, a Research Director in CEB TowerGroup’s Retail Banking practice, at the 2015 CEB Financial Services Technology Summit. Malo pointed out that security should not be considered only the job responsibility of the Chief Information Security Officer (CISO). On-going collaboration across multiple internal teams and their leaders is crucial.
While the CISO plays a leadership role in discovery, mitigation and analysis of a data breach and is in charge of management and monitoring across all business lines, other teams and their respective leaders should be involved in a variety of roles in different stages of a response to a data breach. These include the CIO and CTO providing technical support and the Chief Compliance Officer, the communications team, and line of business executives taking a lead role in the disclosure stage and in enabling customers.
The last stage of the response to a data breach—empowering customers—is also the first step towards preventing more data breaches in the future. Collaborating with your customers, like collaborating internally, is crucial for minimizing the impact of a data breach and lessening the probability of being hacked again.
Malo suggests that contrary to the trend towards a “frictionless” customer experience—the idea that fraud should be detected and corrected without customer involvement—it is better to empower customers. This includes customers who are looking to take a more active role in protecting their data and those that need to be nudged to do so.
The response to a data breach should be honest, prompt, compassionate, informative, and interactive. Answering the question “what should I do?” the interactive part of the response should include a menu of security options, recognizing that different customers have different risk-sensitivity profiles.
In his presentation, Malo pointed out to an Associated Press–GfK Poll that found that consumers do little in response to a breach—only 41% checked their credit reports, 31% changed passwords for online retailers, 18% signed up for credit monitoring. But he also pointed out that consumers are typically not being offered adequate tools to manage their data.
Companies should invest more in educating their customers (and potential customers) in security best-practices and what to do in case of a data breach, even before one occurs. Collaborating with customers, making sure they make it more difficult for criminals to steal their data if and when a breach occurs, is an important investment in the company’s reputation and customer relations.
It’s not getting easier and it may get much more serious, with the potential to severely impact business performance. A recent Ponemon Institute Survey found that 83 percent of companies in the Financial Services sector and 44 percent of Retail firms experienced more than 50 attacks per month. Earlier this year, Juniper Research estimated that the annual cost incurred from malicious data breaches worldwide will exceed $2 trillion in 2019. Juniper noted that this is 2.2% of the IMF’s forecast for global GDP that year. They also noted that US breaches account for over 90% of the global cost of data breaches. Even if the US will account for “only” 80% of the global cost in 2019, the impact on the US economy will be $1.6 trillion. Given that the IMF’s forecast for US GDP in 2019 is $21 trillion, we could see the cost of data breaches reaching 7.6% of the US economy over the next four years.
Originally published on Forbes.com
Collaborative Robotics Market to Grow 10x to $1 Billion by 2020
Advancements in robotic and control technology now make it possible for industrial robots to expand beyond their traditional manufacturing and automation roles, to support whole new classes of applications, and by extension, new markets. Perhaps the best example of this trend is the development and use of collaborative robots, systems designed to work safely in close proximity and cooperatively with human coworkers, especially in manufacturing environments.
The collaborative robotics segment is growing rapidly as new suppliers, technologies, and investors enter the market. As is common with other hot technology sectors, this has resulted in a great deal of “noise” in the robotics community, as well as in the business and investment press. This results in increased risk, missed opportunities, and confusion among all members of the collaborative robotics value chain.
The collaborative robotics sector is expected to increase roughly tenfold between 2015 and 2020, reaching over $1 billion from approximately $95 million in 2015, according to a new study published by ABI Research entitled Collaborative Robotics: State of the Market / State of the Art. The growth will be fueled by three key markets: electronics manufacturers and electronics manufacturing services companies, small-to-medium manufacturers, and manufacturers seeking robotic solutions optimized to support agile production methodologies.
According to Dan Kara, Practice Director, Robotics at ABI Research, “Collaborative robotic systems, such as ABB’s YuMi and Gomtec / Roberta platforms, Rethink Robotics’ Baxter and Sawyer, Universal Robots (Teradyne) UR family of robots, KUKA’s LBR iiwa and Kawada Industries’ Nextage, were developed in response to a number of pressing social drivers and businesses imperatives, and aided by ongoing technological innovation and dropping prices for powerful enabling technology. The sector is very dynamic and is expanding rapidly with new product offerings being released into the market from both established companies and smaller, emerging firms. Larger firms are actively acquiring smaller companies with proven technology.”
Steve Jobs on how people hate streaming music (video)
[youtube https://www.youtube.com/watch?v=Avt7GEpHYtI?rel=0]
Steve Jobs in 2003: “People have told us over and over and over again–they don’t want to rent their music.”
Algorithms Are the Art World’s Newest Collecting Trend
In March, Daniel Benitez, a cinema executive in Miami, paid $2,500 for a necktie. It wasn’t just any strip of designer neckwear. Imprinted on the blue silk were six lines of computer code that once brought the motion picture industry to its knees.
To the unschooled eye, the algorithm script on the tie, known formally as “qrpff,” looks like a lengthy typographical error.
But to Mr. Benitez and other computer cognoscenti, the algorithm it encodes is an artifact of rare beauty that embodies a kind of performance art. He framed it.
The algorithm sets out a procedure for what copyright holders once deemed a criminal act: picking the software lock on the digital scrambling system that Hollywood uses to protect its DVDs. At the turn of the century, hackers encoded it in many ways and distributed them freely—as programs, lines of poetry, lyrics in a rock song, and a square dance routine. They printed it on T-shirts and ties, like the item Mr. Benitez purchased. They proclaimed it free speech. No matter how many times the entertainment industry sued, their lawyers found the algorithm as hard to eradicate as kudzu.
Now it is exhibit A in the art world’s newest collecting trend.
Dealers in digital art are amassing algorithms, the computerized formulas that automate processes from stock-market sales to social networks.
In March, the online art brokerage Artsy and a digital code gallery called Ruse Laboratories held the world’s first algorithm art auction in New York. The Cooper Hewitt, Smithsonian Design Museum, where the auction was held as a fundraiser, is assembling a collection of computer code. In April, the Museum of Modern Art convened a gathering of computer experts and digital artists to discuss algorithms and design…
To give collectors something to show for their money, people who sell digital art strive for creative ways to make an algorithm tangible.
When Mr. Benitez, chief technology officer of Bardan Cinema, purchased the computer program qrpff, he actually got the tie, a commemorative tablet, and a password to access the code at an online software repository.
Another collector at the Artsy auction bought the compatibility calculator used by the online dating site OkCupid. He received two mathematical interpretations of the algorithm drawn on paper and autographed by the four company founders, but no legal right to use or see actual working code.
Indeed, no one yet is really sure what collectors ought to receive when they acquire an algorithm for art’s sake—source code, memorabilia, intellectual property rights, or a right to the output of the procedure. It varies depending on the legal status of the algorithm.
“Software is eating the world,” said digital designer Chris Maury at Pittsburgh-based Conversant Labs, who recently sold a computer vision algorithm at the auction. “The art world is the next part to be eaten.”
Internet of Things Startup Landscape (Infographic)
Source: CB Insights
Tom Davenport on Managing Data Scientists (Video)
[youtube https://www.youtube.com/watch?v=VK4-ASEUmgE?rel=0]






