AiiA November roundup on: Industry
Thought provoking pieces on what affects you
Stay up to date on technology’s role in industry with this November recap which covers automotive, cyber security, FinTech, defence, and pharma.
Ever since electric cars first appeared in the mid-19th century, the performance, particularly the torque delivery, of the electric motor (eMotor) has impressed the motoring fraternity. After delivering examples of extraordinary brands and accomplishments in the market, this guide covers:
- What happens in a future where EVs are no longer the news?
- Which eMotor architecture will manufacturers choose to power their EVs into the future?
- Increasing performance and cutting cost of the permanent magnet traction motor
- Are cost effective, lighter, faster and more powerful next-generation eMotors just around the corner?
As fully autonomous vehicles edge closer to real-world deployment, operating safety becomes more critical.
Whether you are developing an entire vehicle or one component, simulation is relevant to your engineering challenges. ANSYS offers a single, configurable platform to validate vehicle performance against safety requirements. Its open nature integrates autonomous vehicle design into an ecosystem that includes, but is not limited to, high-fidelity physics studies, diverse sensor models, vehicle dynamics, world scenarios, embedded software code development, connectivity optimization, data analytics and functional safety analysis.
In this webinar ANSYS presents why simulation is the bedrock for the development of autonomous vehicles and shows with examples you can solve your engineering challenges.
Watch this on-demand webinar to learn how:
Multiphysics software from ANSYS enables companies to replace years of physical testing with simulations that replicate every aspect of autonomous vehicle performance under thousands of operating scenarios — all in a risk-free virtual environment
Physics-based simulation is mandatory to ensure the safety of autonomous systems
Embedded software code that meets the safety standards is critical for success in developing autonomous vehicles
Data is a key building block of a successful digital transformation strategy.
It is a vital enabler to either optimize efficiency of manufacturers’ value chains or to develop new data-driven business models.
The big potential of data comes from applying intelligence to it, by leveraging big data analytics, advanced analytics, artificial intelligence and more to transform data into insights.
Manufacturers today can monetize data to both increase efficiencies in their value chains and to drive service innovation and new data-driven business models.
Join this webinar to learn the answers to the following key questions:
- Why is data monetization important for manufacturers?
- How do you identify and collect relevant data?
- How can you monetize this data across value chains?
The very nature of development is shifting from a manufacturing mindset to a software one.
This brings challenges, as hardware teams need to collaborate with software teams. And it changes the way hardware teams work.
For instance, hardware and software teams need to collaborate on and share source code, hardware files, binaries, and design assets. But achieving this is a massive challenge for many OEMs and Tier 1 suppliers.
To remain competitive, these OEMs and Tier 1 suppliers will need to deliver innovative technology at unprecedented speed.
Download the whitepaper now to learn all about:
- Big shifts in the automotive industry
- What successful teams do to get ahead
- Four big challenges that still face hardware and software teams
- How to shift ahead of the competition with the right tools
To keep pace with customer demands on software functionality as well as time-to-market expectations, software developers must develop efficient, high-quality code faster.
As a result, Agile development has become more common and necessary practice. However, to fully realize the benefits of Agile development, software development teams must implement a reliable process for ensuring that their code is free of defects and security vulnerabilities.
In How Static Analysis Automates Agile Development, our software development experts examine how static analysis can enhance Agile development and empower teams. What’s more, you’ll also learn:
- How to keep pace with demands on software functionality
- A repeatable process to meet time-to-market expectations
- Methods to ensure code is free of defects and security vulnerabilities
- The roadmap to achieve in-phase bug containment while fully realizing Agile core principles
The Specialty Equipment Market Association show, better known by its acronym SEMA, recently took place at the Las Vegas Convention Center.
The annual event is open only to trade visitors, and presents an annual excuse for the world’s top aftermarket and tuning firms to show off their skills, with seemingly unlimited creativity funded by similarly unrestricted budgets. But what does this have to do with the future of the car? This article explains.
Players in the automotive industry must be prepared for external factors that will have a long-lasting effect on supply chain infrastructure. Automotive manufacturers need to optimize value at every step of the supply chain to stay on top of the game.
In this industry paper, discover:
- The limitations of legacy systems commonly used in the industry
- How visualization of the actual planning process in a system — including visibility on all relevant planning knowledge, rules and assumptions — leads to more efficiency
- How scenario planning helps to make better decisions
This report is a must-read for executives, security leaders, advisors and the supplier/service provider ecosystem to benchmark and prioritize critical security trends. Key topics addressed include:
- The Market Sentiment For Enterprise Cyber Security
- Interpreting Threat Vector Criticality
- Identifying The Most Serious Attack & Cause Of Most Attacks
- Budget Allocation Alignment With Threat Vectors And Attacks
- Strategies To Overcome Shadow IT
- Managing Anxiety With The Onset Of CCPA
- Ways To Win The War On Security Skills And Talent
- Adoption Trends Of Industry Standard Frameworks
- The Biggest Security Solution Priorities For 2020
- Cyber Security Investment Priorities For 2020
- Lessons Learned From Cyber Security Attacks And Breaches
Cyber criminals are increasingly targeting people for their attacks, largely via email, rather than systems and infrastructure. And nearly 100% of these attacks require a human to click. Security teams are spending an inordinate amount of time responding to phishing attacks.
Cyber Security Hub hosted a webinar on email security trends with Nikki Cosgrove and Matt Cooke from Proofpoint that examined email security strategies to prevent, defend and respond against modern day threats along with steps that enterprises can take to protect the digital workforce from email-based targeted attacks. This article summarizes their insights.
The scale at which threats have escalated has driven growth for an ecosystem of malware detection and analysis tools to mitigate the risk for enterprise organizations. The demand for malware detection and countermeasures is so great that industry research firm MarketsandMarkets expects the sale and license of malware analysis tools to reach $3 billion in 2019.
This article discusses the diversification of malware analysis tools to address the scale of new cyber attacks.
Authentication is the means of verifying an individual is who they claim to be. It’s so important that user authentication is a cornerstone of modern cyber security. The traditional method for user authentication credentials has been usernames and passwords. As the use of passwords grew due to the popularity of websites and internet services, cyber attackers leveraged weak and redundant use of passwords across multiple sites to gain unauthorized access to systems and data. This article covers:
- The Evolving MFA Landscape
- Establishing Comprehensive Enterprise Data Protection
- Mitigating Risks Associated With MFA Attacks
- Healthy Suspicion Remains Best Course Of Defense
The large volume of exposed endpoint devices has been met with high levels of enterprise spend to minimize the potential vulnerabilities. Unfortunately, this had the side effect of creating a hyper-focus on containing unauthorized access and data breach incidents in the present.
At the same time, cyber threats are continuing to become more sophisticated. A large volume of security alerts and event notifications within the organization create a need for robust and efficient security-based solutions. This article discusses:
- Right-sizing The SIEM Platform For The Enterprise Need
- SIEM Market Drivers such as:
- Improved usability
- Additional security intelligence integration
- New compliance regulations
- Cloud as integral SIEM vector
‘Digital Transformation’ is a buzzword used by business leaders, journalists and marketers alike to allude to an ever-changing benchmark of technological optimisation.
The phrase refers to businesses’ attempts to harness emerging technologies to their maximum potential, but is heavily bound with the need to better serve customers and workforces facing outdated and inefficient systems. A growing discord between the efficiency of personal technology and that of workspace desktops — marred by slow, inefficient legacy systems that fail to live up to modern UI/UX standards — has made it clear that enterprises must rise to new expectations. As its title says, this article is about how to equip your enterprise for continuous innovation.
The agility of the fintech startup world has been an enviable example of how digital transformation can work. Mass adoption of digital only products are proving new models that were only being talked about a short while ago. The cycle of innovation, funding and scale never stops. As record breaking funding rounds continue to make headlines someone else is building the next app future customers will not do without.
R3 is an enterprise blockchain software firm working with a global ecosystem of more than 300 participants across multiple industries from both the private and public sectors to develop on Corda, its open-source blockchain platform, and Corda Enterprise, a commercial version of Corda for enterprise usage.
This article outlines a discussion with their Chief Technology Officer, Richard Gendal Brown to get his take on the blockchain market, business uses and R3’s open source blockchain platform, Corda.
- FinTech Connects… with Edoardo Volta, Vice President and Head of Fintech for Mastercard UK & Ireland
Edoardo Volta is the Vice President and Head of Fintech for Mastercard UK & Ireland. Edoardo’s role involves driving growth with Mastercard’s fintech accounts, pushing forward the next generation of payments in the UK & Ireland.
A household name in the payment sphere, Mastercard have been at the top of the payments food chain for generations, and are still leading innovation within the sector. A partner of FinTech Connect 2019, Mastercard are taking part in the PayTech Connect and Blockchain Connect tracks of the event.
This article catches up with Edoardo and covers consumer trends, Mastercard Accelerate and fintech-bank collaboration.
Fintechs and challenger banks have put a dent in the financial services universe. By developing compelling new products, services and experiences, these companies have set a new standard and raised customers’ expectations. While traditional banks work to meet these raised expectations, the challenge for new market entrants is turning their beachheads into sustainable, profitable businesses. FICO facilitates this transformation with our industry-leading analytics capabilities by: enabling:
More insight, more speed. Make analytics deliver operational benefits sooner.
Higher ROI. Empower analytic teams to make even greater contributions.
Organization-wide benefits. Extend tools across credit lifecycle decisioning.
This article catches up with Julie Armstrong, Chief Commercial Officer at ChartIQ.
Julie will be delivering a keynote at this year’s FinTech Connect on December 3rd, entitled ‘The pain and power of pioneering’. She will also be taking part in a very special panel discussion on December 4th entitled ‘How can fintech be used as a force for good?’
In the build up to these sessions, this article contains her thoughts on where the industry is headed.
Alex is CEO of paytech startup, Weavr, an open collaboration platform for developers, innovators, payments vendors and financial institutions.
In this article, Alex discusses digital commerce, the evolving payments market and how he’s maintained a zeal for launching businesses after 15 years in the industry.
Defence iQ’s global defence events, digital platform and publications provide prime contractors, traditional and non-traditional defence companies, SMEs and start-ups with another vital touchpoint from to educate and inform the global network of military end users and government about their strategic vision, new concepts, and technological developments.
Our 2020 Digital Partnership Pack outlines some of the opportunities available for industry in 2020, including online branding, membership engagement, publication leadership, and consultations for long-term partnerships.
The rise of global megacities and the increasing fragility of metropolitan spaces due to environmental and geopolitical crises suggests that the likelihood of future conflict taking place in the urban environment is increasing. Recognizing this, land forces are modernizing their capability portfolios to enable them to fight and win in urban operations, and Unmanned Ground Vehicles (UGVs) will play a critical role in enabling manoeuvre advantage.
In lieu of Defence iQ’s Unmanned Ground Vehicles forum in January 2020, as part of their annual International Armoured Vehicles conference, they published this paper on UGVs in the urban environment and the future of armoured manoeuvre.
At this year’s DSEI, Chief of the General Staff General Sir Mark Carleton-Smith opened his keynote by describing the reality that very much underpins contemporary military thought: ‘The tech revolution is driving a revolution in how war on land is waged’. This article covers:
- Prototype Warfare
- STEM and the Next-Generation Land Force
- Investing in the Future Force
Katie Arrington, Chief Information Security Officer of the Office of the Undersecretary of Defense for Acquisition and Sustainment, spoke to reporters in October 2019 about the new cybersecurity guidelines being drawn up for U.S. Department of Defense (DOD) contractors. Ms Arrington explained that the increasing threat of IP theft required a “change of culture” in the defence acquisition community, but admitted that the process is “going to take time, it’s going to be painful, and it’s going to cost money.”
This report, led by Marcus Kenny, who worked with DOD intelligence and acquisition communities on their cybersecurity strategy, examines the IP protection paradigm and offers guidance to government, academia and industry as to how inter and intra-agency culture, business practice and software can adapt to threats in the Information Age and safeguard data more effectively.
Ahead of Defence iQ's annual International Military Helicopter conference, Defence iQ interviewed one of the key commanders who oversaw the Colombian Army’s helicopter missions against insurgent groups.
In this 'In Conversation With', Major General Emiro Barrios (Ret) reflects on his time as Commander of Colombian Army Aviation and shares insight into the most difficult challenges he and his units - some of these were about the lack of resources, some were technological.
General Barrios also emphasizes the need for Colombia’s international partners and allies to learn from their experience in battling insurgent groups, and highlighted the enduring importance of helicopters, particularly as the world’s populations become increasingly urbanized.
There is a growing trend in pharma of locating smaller more agile facilities closer to customer markets is pushing manufactures towards facilities that make extensive use of mobile, single use equipment that can be easily reconfigured to support the manufacture of multiple products. Additionally, manufacturers are looking for repeatable and scalable solutions that can be developed in one location and thereafter deployed in other locations minimizing capex and reducing time to market. This is what is known as a Facility of the Future.
There is also a growing focus on how the Internet of Things, or ‘Industry 4.0’, could further increase throughput, quality and competitiveness in the global manufacturing market. This article covers:
- Key benefits of single use facilities
- What is holding back adoption?
- Is human error now the biggest risk to facilities?
- Rockwell Automation's augmented reality solution
- Why it’s time for a new solution
What is undocumented, has not been done. This certainly applies to the discipline of regulatory compliance. Nevertheless, organizations still miss opportunities if they fixate on documents and hereby lose sight of the data – and maybe of quality. How do they take the step towards ‘data-based quality’?
Companies should be prepared to implement several changes in how they execute quality. Many of these changes relate to a 'digitalization of quality'. These include:
- Focus on data
- Digitalize processes
- Improve data quality
- Monitor data integrity
- Invest in technology
- Create a quality culture