Smart Cities Using XR/AR

What are Smart Cities?

In recent years, we see more and more smart cities emerging and governments competing over building the next great smart city. In turn, the country behind the city gains immense publicity, popularity and potential tourism revenue in part due to its enormous benefits to infrastructure, public health, and technological bounds.

It is essential to understand the meaning of “Smart City” because many people use the term interchangeably, which challenges its actual meaning. A smart city uses digital technologies to make cities more resilient, sustainable, adaptive and environmentally inclusive.
However, it is crucial to understand that a smart city is not merely the use of digital technologies; instead, it is an entirely new concept that transforms urban landscapes completely.

This article will explore augmented reality (AR) and extended reality (XR) technology in smart cities to understand how these technologies improve the smart city’s functions from transportation, infrastructure, building systems and more. In addition, these technologies enhance the city’s administrative management to make citizens’ lives smarter.

Read More »

OKRs Role in Strategic Management

Organizational goals and objectives are often divided by a thin line of what they want to achieve and what they can actually accomplish given their resources. Apart from effective communication and micromanagement techniques, companies have to set goals to motivate their workforce and other stakeholders to work towards that common objective. Companies struggle to develop a measurable, consistent, and predictable business model, which impacts their decision-making in one way or another. This is where OKRs, an acronym that stands for Objectives and Key Results, come in handy to help managers enhance their teams’ performance and productivity.

We see this becoming more and more apparent post-covid 19 outbreak (20′, 21′) and the transition from workplace management to remote management and an increased necessity in employee trust, transparency and measuring KPIs that matter.

OKRs is increasingly becoming a powerful strategic management tool for businesses. Several reputable international companies have adopted it, including Google, Intel, BMW, Oracle, Twitter, Disney, Facebook, and Dropbox (Post 2019, par 51). Although OKRs are not the sole reason for these organizations’ success, they have been of significant value and helped to redefine organizational management. Thus these companies continue to implement OKRs up to today despite having thousands of workers. OKRs have several benefits as they help provide a clear direction, effective communication strategy, accountability, and strategic alignment and enable managers to track their objectives and outcomes. This paper will examine how Objectives and Key Results support strategic management, thereby improving an organization’s effectiveness and performance.

Read More »

What is Azure Governance? Let’s look at the fundamentals

In this blog post, we will discuss the management and operational principles which underpin enterprise governance in Azure which is a necessity for successful cloud adoption and one of the first rails to enable a culture that facilitates digital innovation.

The core components of Azure management are the challenges of Enterprise Cloud Adoption and the components which make up the full set of governance capabilities in Microsoft Azure.

The Azure governance principles are a continuum of tasks, projects and initiatives, therein you build natively in Cloud and also migrate workloads into Azure, securing and protecting those workloads so that they are robust and resilient. You then proceed to monitoring these workloads, so that you can pick up any problems and ensure that they are consuming resources in a manner which is both performant and cost-effective.

Next, you invest in automated configuration to ensure that any changes to your workloads are holistic but also auditable and immutable. Governance ensures that your workloads and the platform on which they run are compliant with your company’s policies and regulatory obligations. This, in turn, creates a more robust enterprise platform, ready to receive new workloads and in turn, a becomes a hub for innovation with the necessary guard rails in place.

Read More »

Hyperscale Cloud in China? Microsoft? Mooncake? Alibaba Cloud? Gotchas, pitfalls and directions to successfully navigate it

When Westerners think of hyperscale cloud providers, the usual suspects that come to mind are named Amazon Web Services, Microsoft Azure, Google Cloud Platform, Oracle, and IBM Cloud. Seldom do you hear another name, which tends to be odd since it is already the world’s third-biggest cloud service provider according to the numbers: Alibaba Cloud. And with yearly revenue growth between 60 and 140%, they sure are catching up fast.

 

Blog_AWS-vs-GCP-vs-Azure-vs-Alibaba

 

However, to operate a cloud within China there are some hoops you need to jump and you have to collaborate with the regional administration. Provisioning and relocation times, thus, are fundamentally increased, in no little part since tasks must be directed by the local partners. The truth of the matter is that, while it is conceivable, receiving a cloud foundation that does not have a physical presence in China places organizations that operate in China at a colossal detriment.

Read More »

Smart Contracts, are we getting rid of lawyers? And what do we mean by ‘Code is Law’

A smart contract, also knоwn as a crypto contract (a code соntrасt on the blockchain), іѕ code thаt directly соntrоlѕ thе transfer оf dіgіtаl сurrеnсіеѕ or аѕѕеtѕ bеtwееn parties undеr сеrtаіn соndіtіоnѕ.

A smart contract nоt оnlу dеfіnеѕ the rulеѕ and penalties around аn аgrееmеnt іn thе same wау thаt a trаdіtіоnаl соntrасt dоеѕ, but іt саn also аutоmаtісаllу еnfоrсе thоѕе оblіgаtіоnѕ. It does this by tаkіng іn іnfоrmаtіоn аѕ input, аѕѕіgnіng vаluе to that іnрut thrоugh thе rulеѕ ѕеt out in the соntrасt, еxесutіng the асtіоnѕ rеԛuіrеd by those contractual clauses – for example, dеtеrmіnіng whеthеr аn аѕѕеt should go tо оnе реrѕоn or rеturnеd tо thе оthеr person frоm whom thе аѕѕеt оrіgіnаtеd. These соntrасtѕ аrе ѕtоrеd оn blосkсhаіn technology, a dесеntrаlіzеd ledger thаt also underpins bіtсоіn аnd оthеr сrурtосurrеnсіеѕ.

Read More »

Five Things You Probably Didn’t Know About Cybersecurity On The Blockchain

Blockchain technology, or distributed ledger technology (DLT), as it is alternatively often called, is one of the hottest topics in the technology sector as of now. A blockchain is a specific type of distributed ledger that stores data in blocks that are linked together via a cryptographic signature function.

This, in short, works by always using the signature of the last block plus the data of the current block to sign the current block. Given enough computing power behind creating the hash signatures for new blocks, a process that is known as mining (PoW), the resulting public ledger is virtually unmodifiable for malicious actors, commending itself for applications that rely on mutual trust where trust cannot be easily applied.

Read More »

A look at how Blockchain is driving innovation in four unique areas

Blockchain technology is gradually revolutionizing the way business is being transacted on in the digital realm. Blockchain technology exploits decentralisation and one-way cryptographic hashes to ensure the integrity of data and P2P transaction across the internet. Cryptocurrencies have been the main driver of Blockchain technologies and although the world may have slowed down in terms of its appetite for these currencies, the technology behind Bitcoin and EOS is finding relevance and applications in diverse areas. This because unlike other technologies that focus on solving specific problems or automating processes where security becomes an afterthought, Blockchain in many ways cooperates security by design in its architecture. It eliminates the need for third-party layering of security elements (TNO 2019). This article explores areas where Blockchain technology is finding novel applications. These include identity management, creative content copywriting, tokenization of products and data integrity management.

Read More »

Are you a decisionmaker contemplating a migration to the cloud? This is what you need to consider and understand

Information security aspects when moving operations from on-premise

So if you are reading this I will make some basic assumptions that you know about Microsoft Azure, Amazon Web Services and perhaps even Alibaba Cloud, these are renowned hyperscale cloud vendors. Last few years cloud computing have been among the IT industries hottest topics. The term refers to on-demand access to computing resources provisioned by another provider. 2019 has been dubbed the year of migrations by several vendors and a pronounced advantage of cloud computing is that they tend to be highly available and easily scalable. For fast-growing business, cloud-computing has revolutionized the way they can work. Organizations typically lease cloud-based resources from outside the organization. Of course, it is also possible (but not as common) to host cloud-based services internally.

While cloud computing can be very cost-efficient and offer fast scaling, it’s challenged by the fact that resources will most likely be hosted outside of the business’ data centre and therefore, outside of the direct control of that business, increasing the complexity to manage risk and handle governance.

Read More »

Quantum cryptography and cryptography in a post-quantum world

So in my previous article on quantum computing, we talked about where we are today, and where we are headed in regards to breakthroughs in the technology as well as touching on some basics of “what is quantum computing“. In this article, I explore what quantum cryptography and cryptography is like in a post-quantum world.

So, a refresher: quantum computing is set to transform cryptography due to the revolutionary, non-deterministic way of operating.

How will they affect existing cryptography algorithms and which options do we know today for doing cryptography in a post-quantum world?

Read More »

Quantum computing and cybersecurity: A quantum of solace or a massive threat?

For as long as it has been in development inside the science labs of the universities, corporations and government agencies, quantum computing has been considered the next frontier in cybersecurity. Quantum computers are machines that do not work with classical electrical on and off-states but instead rely on quantum states that can be in several states at once, a circumstance known as „superposition(1)“. While they are still in their very infancy, their capabilities have been mystified over and over and it’s probably fair to say that quantum computing is one of the most misunderstood technological advancements of our day and age.

12.jpg

Read More »