Reports and coverage AM

Big data analytics: How far will businesses go to uncover their customers’ desires?

To deliver products and services that people want, businesses must learn to think like them to better understand buyer perception and bridge a relationship with their respective market. The concept of collecting data for analysis has been around for years - capturing data that streams into businesses, and then analyzing the findings to obtain valuable customer information. But only in today's rapidly evolving realm of big data analytics, we are seeing organizations capitalizing on the ability to tap into millions of consumer feelings and interactions through information provided by the likes of social media platforms.

Future house: home automation

Imagine the alarm clock ringing on a typical Monday morning, except this time the curtains draw themselves back, the bathroom lights switch on automatically and you smell fresh coffee brewing. The concept goes as far back as the 1934 World's Fair in Chicago where the home of the future was unveiled, since then the automated home has morphed into the smart home; it can do more than turn on our heating and our lights, it can actually think for us.

It’s only a matter of time before hackers detect smart city vulnerabilities

The prospect of smart cities is exciting; urban developments with integrated ICT and IoT solutions delivered in a secure fashion to manage a city's assets. These assets include local departments' information systems, schools, libraries, transportation systems, hospitals, power plants, water supply networks, waste management, law enforcement, and so on. In short, smart cities are envisioned to improve quality of life by using technology to improve efficiency and services to meet residents' needs. But where there's connectivity, there will be hackers, and according to cybersecurity experts, it's only a matter of time before vulnerabilities are exposed in smart city infrastructure.

Industry experts claim cybercrime threatens connected and autonomous vehicles

It's risky getting into a vehicle, navigating treacherous highways and trusting that other drivers are competent enough to keep you safe on the road. But as society enters the Internet of Things era, new threats will emerge in the form of cybercrime. As vehicles become more connected and more reliant upon internet connectivity, security researchers are discovering a number of security holes in technology that power connected and autonomous vehicles.

Page 21 of 21