
Our smartphones are a tool for democracy
Our smartphones are a tool for democracy, even as we fear the privacy invasions that come with a device we have within arms-reach 23 hours of every day.
Arthur C. Clarke said it best, “Any sufficiently advanced technology is indistinguishable from magic.” As we watch today’s emerging technologies, we’re seeing this quote come to life. This is where we get to revel in the magic!
Our smartphones are a tool for democracy, even as we fear the privacy invasions that come with a device we have within arms-reach 23 hours of every day.
The technology for autonomous vehicles is rolling into reality. Level 1 is the most common level with the longest heritage while Level 5 is more conceptual.
IT is concerned that IoT projects will compromise their security, incident management, disaster recovery and network performance.
Anthropomorphism is an important part of a design, but a design that is too life-like transforms a machine from adorable to menacing.
Offering different and flexible security levels matched to the needs of the service delivered by a network slice will be a ‘monetizing’ opportunity.
The third step is to define the best technical architecture to implement the use case stories described in the functional view.
Ownership and control of AI and machine learning represent a level of geopolitical power that will reshape virtually every domain of human activity.
Among the problems with facial recognition software is that it’s an imperfect science that often tends to have glaring race-based problems.
The third key to successful IoT implementation is to define the best technical architecture to implement the use case stories.
Deepfake uses AI, machine learning, facial mapping and other advanced technologies to seamlessly integrate or superimpose images into videos.
Since the days of Star Trek, we’ve always wanted to talk to computers. Recent advancements in voice technology, AI and IoT have now made that a reality.
The second key to successful IoT implementation is to define the functional requirements needed to address the business challenges.
This is an non-necessary category.