AiiA October roundup on: Industry
Thought provoking pieces on what affects you
AiiA October roundup on: Industry
Stay up to date on technology’s role in industry with these top articles from October. Covered this month is auto, cyber security, FinTech, defence, and pharma.
Even the humble black, round tire is not immune from the connected technology revolution sweeping the automotive industry.
The Internet of Things (IoT) and cloud services are transforming the way tire manufacturers conceive their products and the future of their businesses, with Tire Pressure Management Systems (TPMS) in particular. This article touches on:
- The industry’s rapid change
- The two types of TPMS
- New tech & services
- Bridgestone Tirematics
By now, you may be familiar with the recently updated chart published by the US Society of Automotive Engineers. It helpfully categorizes the autonomous capability of a vehicle from level 0 – the very beginnings of ADAS technology – to the holy grail of level 5, which requires no input from a driver whatsoever.
This link contains the information in an infographic form. It’s by no means an exhaustive list, to keep things readable and understandable, but gives an idea of the intentions of OEMs when it comes to potential roll-out dates for different levels of self-driving technology.
Development of all kinds of next-generation radars, cameras, ultrasonic systems and LiDAR sensors is happening at unprecedented speed. But while developing the best new sensors is a key priority, creating ways of allowing them to function together in a system that ends up greater than the sum of its parts is arguably the even-greater challenge.
Sensor fusion is, therefore, an essential piece of the autonomy puzzle. But what is it exactly, and what are the challenges to overcome? This article covers:
- An explanation of sensor fusion
- The current challenge of tying sensors together
- How far along we are with AV sensor fusion
- The problem with multimodal data
Safety-critical functions such as steering present a huge challenge to the automotive industry as it moves towards autonomous driving. Such systems must incorporate fail-operational redundancy.
The normal operation of the steering system in an autonomous environment, in which the vehicle operates on its own without the driver’s control, is a requirement directly related to passenger safety. Even if the system runs into an unexpected problem while driving, the system must be able to detect and mitigate the problem by itself and continue to control the steering wheel normally. This is an essential requirement for autonomous driving to be made possible.
The automotive industry is undergoing a major transformation with the evolution to electric, connected, autonomous vehicles (ECAV). This shift has introduced a significant influx of innovative startups including many from outside of the traditional automaker community.
We gathered over 250 survey responses from manufacturing and engineering services firms, and took a closer look at approximately 100 of them in the automotive industry. This eBook contain the results of a survey conducted to find out how automotive manufacturers are approaching the cloud PIP opportunity.
The Tesla FSC is now installed in every new Tesla and will be retrofitted to cars already on the market where owners have paid for the firm’s Full Self-driving package. Designed for the advancement of Tesla’s self-driving goals, the FSC is actually two chips specifically created to prioritize the AI processing and decision making required to make full autonomy safe and reliable.
But while the Tesla chip is doubtless an impressive achievement, NVIDIA issued a check on Musk’s claims when comparing his company’s chip with the outgoing silicon. Read this article to learn more about how they stack up.
Global defense industries are transforming their operations and capabilities through significant investments in disruptive technologies and platforms that are driving changes in military cyber security requirements. Demand in public sector and military is being driven by the need to increase awareness of new vulnerabilities and complying with national standards for critical infrastructure protection. Included in this article:
- Market drivers offset by insufficient funding and challenges reducing reliance on foreign suppliers
- Governments embracing emerging technology to scale cyber efforts
Cyberattacks are one of the top 10 global risks of highest concern in the next decade, according to a new report from the World Economic Forum (WEF), with an estimated price tag of $90 trillion if cyber security efforts do not keep pace with technological change.
The WEF’s Centre for Cybersecurity outlined 10 tenets that describe how cyber resilience in the digital age can be formed through effective leadership and design. This article details them all.
Only so much can taught about cyber hygiene through annual security training in the organization’s break room. As part of Cyber Security Awareness Month, we have collected tips and best practices from security leaders. More importantly, these are the insights that make a difference in having the workforce be part of your security posture.
Organizations are widely adopting IT solutions that digitize and connect data. This connectivity has created efficiencies within business operations and a new level of risk to be managed.
This report highlights the success of centralized security information management and the opportunities for proactive incident detection from automatic control configuration changes. Readers will gain insight on the growing SIEM use cases including regulatory compliance reporting and data privacy risk management.
Security concerns in industrial manufacturing are increasing. Robotics systems are connected to other robots, to enterprise IT systems and to the cloud, which enables access to internal systems and data servers. The data collected by robots is used by manufacturers to maximize the production efficiency and improve product quality. This article covers:
- The need for increased cyber security in the industrial robotics market
- North America’s lead in robotics cyber investment
The sophistication, speed, and scale of cyber-attacks are all increasing rapidly. As a result, the task of responding to these attacks in real time has exceeded what human professionals can tackle alone. At the same time, the introduction of new attack vectors — including cloud services and IoT devices — has created security blind spots and made merely detecting threats more difficult than ever before.
To offset these risks, artificial intelligence (AI) has become an indispensable tool for security teams across every industry. This report details seven case studies of attacks - including insider threats, ransomware and IoT attacks - that were intercepted and neutralized by AI autonomous response technology.
Data is creating new value for enterprise organizations. Historical sales information is used to predict prospective clients and repeat customers. Reporting is increasingly automated and customized to the needs of the manager. And knowledge workers are empowered with data to make informed business decisions. But at what cost does this digital landgrab potentially push employees beyond their limits and create new, unforeseen risks for the business?
What happens when data loss prevention efforts fail? Watch this free, on-demand webinar that discusses the market drivers behind the business need for real time detection and response for a growing inside threat: departing employees.
For the third consecutive year, small and medium-sized businesses (SMBs) with a workforce between 100 and 1,000 employees have reported a significant increase in targeted cyber security breaches. A global survey conducted by the Ponemon Institute found that attacks against U.S., U.K. and European businesses are growing in both frequency and sophistication.
Of greater concern is that nearly half of the survey’s respondents described their organization's IT security posture as ineffective and 1-in-3 reported their organizations lack an incident response plan. This article talks about:
- Attack sophistication and data loss’s increase since 2016
- Emerging technologies that bring new cyber security risks
- United States highlights
Data loss protection starts with defining the types of information deemed sensitive to the organization. Identifying partners and internal stakeholders alleviates the situation where security is viewed as the Big Bad Wolf policing data leakage. Effective communications with the workforce and restricting access to data helps mitigate the risk to the organization and reminds everyone to “don’t be a creeper.”
This article will help you ensure your organization’s data remains when employees leave the business.
Fintech forms the spirit of the challenger bank, the disruptor and the startup, and is the driving force which enables incumbents to keep pace with them. The trailblazing fintechs in this article represent some of the best examples taken from the new crop. The FinTech Connect class of ’19. They include:
Ecommerce is changing. Purchasing products can be done at the touch of a button (or two, hello SCA) from the comfort of your own home. Ease of access is king.
But as convenience becomes the key to a successful online payment transaction, companies are left weighing frictionless purchasing and simple checkout conversion against the risk of ever more sophisticated fraud and nefarious threats.
We asked NS8 CEO Adam Rogas how the eCommerce space was shaping up, and in what ways NS8 was solving problems in that sphere.
We have had the pleasure to connect with Brooke Navarro, Head of Business Development & Capital Markets, at tZERO. tZERO is the global leader in blockchain innovation for capital markets. Their focus is enabling the market to tokenize and trade digital assets through blockchain technology.
Ross Sleight is renowned as one of the UK’s leading thought leaders in digital transformation. In his role as Chief Strategy Officer at Somo, he is part of a team that designs, builds and delivers digital products and experiences. He will be delivering a presentation at FinTech Connect entitled 'zig when others zag to create significant product differentiation’ on December 3rd at the London ExCeL Centre. This article is a preview of some of the insights he will give.
It was clear at this year’s Disruptive Technology for Defence Transformation conference that the Royal Navy has fully embraced the tenets of innovation and transformation. This article covers:
- The wholescale digitization of the Naval Service
- User-focused capability development
- Readying for future disruption
How do you create the conditions for innovative thinking to flourish? Is it possible to create a culture of innovation, or to teach it? How can an organisation become comfortable with risk, or even failure?
These are some of the questions that permeated throughout discussions at the annual Disruptive Technology for Defence Transformation conference this September. From that, this article explores:
- The UK MOD’s innovation strategy
- Why inertia trumps will
- Innovation enablers
Matthew Moyer, Director of Clinical Supply Technology at Merck, shares how patient-facing technology can help reduce the participation burden and increase the quality and frequency of data collection. He answers the following questions:
- What is the benefit of using patient-facing technology within a clinical trial?
- How do you move forward with a patient-facing technology implementation?
- How do you address pushback from stakeholders when introducing new technology to a trial?
- What excites you most about the ongoing use of patient facing technology within clinical trials?
Ian Greenberg, Ketan Patel and Rick Finch share strategies on selecting the right AI use case, derisking technology and securing executive support for your next initiative. Together, in this free, on-demand webinar, they shared how artificial intelligence is set to change the drug lifecycle, with a particular focus on the impact to business development and licensing and regulatory affairs.
The panel then offered answers to the most pressing questions surrounding AI implementation, covering:
- Finding the right use case for an AI solution
- Preparing data to be used in an AI tool
- Strategies to secure buy-in from senior leadership for an AI initiative
- The risks of exploring AI and how to mitigate these
- Critical success factors for an AI implementation
Paula de Matos, UXLS Project Manager at The Pistoia Alliance shares why good user experience is the foundation for effective science and collaboration. He explains:
- The difference of design
- Developing the right experience
- The benefits of a collaborative approach
Murtuza Vasowalla of Dassault Systèmes sheds light on four steps to take to improve the quality and accuracy of your data. This article goes in depth on all four, which are:
- Focus on people
- Embrace a digital quality system
- Strive for digitally connecting the dots
- Ensure the right culture
Steve Bradley, Group Managing Director, Cegedim UK, outlines how data holds the key to better patient care. He goes in depth on:
- The value of patient data
- New opportunities with new data
- Trust in data
- Taking the longitudinal view