Five ways work will change in the future

As part of our report on how work is changing, we take a peek into a world where your boss is tracking you, your neighbour is a robot, and it’s cool to be old… employment, but not as we know it

Sourced through Scoop.it from: www.theguardian.com

Killian Fox and Joanne O’Connor: new structures, AI, Human Cloud, Workplace monitoring, end of retirement,

See on Scoop.itThe New way of Work

Advertisements

Are Identity Silos Slowing Your Cloud Adoption? – BlueMix Dev

Are your identities scattered across multiple places? How can you leverage your existing identity infrastructure for Cloud? The 2 C approach ‘Consolidate and Consume’ is the right solution. In this article, the author describes the challenges due to silos of identities and how to solve them.

Sourced through Scoop.it from: developer.ibm.com

By Rksaxena on IBM Bluemix. Better ROI, rapid deployment, performance, scalability and extensibility are typically the key outcomes to strive for when creating the authentication infrastructure on Cloud. By following this 2C approach “Consolidate and Consume”, you can rapidly create an authentication framework fulfilling these requirements without interrupting your on-premise IT setup.

Li-Fi Probably Won’t Be The New Wi-Fi For Most People

Long restricted to the academic domain, Li-Fi, a light-based data delivery method is suddenly getting all sorts of attention. An Estonian startup Velmenni recently tested an commercial implementation and found it to be superior to Wi-Fi in almost every way – except as something you and I will probably ever use.

Sourced through Scoop.it from: techcrunch.com

By Nitish Klukarni. While it’s attractive to envision a network of connected lightbulbs all being used to transmit data between nodes, it’s not clear if the benefits of faster wireless communication will outweigh the costs of constantly-on LED lights, as well as the cost of optical detectors requiring clear line-of-sight.

Statistical Models That Support Design Thinking: Driver Analysis vs. Partial Correlation Networks

We have been talking about design thinking in marketing since Tim Brown’s Harvard Business Review article in 2008. It might be easy for the data scientist to dismiss the approach as merely a type of brainstorming for new products or services. 

Sourced through Scoop.it from: www.r-bloggers.com

By Joel Cadwell. The discussion ends with the identification of “the most important” in a driver analysis. The network, on the other hand, invites creative thought.Isn’t this the point of data science? What can we learn from the data? The answer is a good deal more than can be revealed by the largest coefficient in a single regression equation.

IoT: A Fog Cloud Computing Model – OpenMind

Internet of Things (IoT) represents a remarkable transformation of the way in which our world will soon interact. Much like the World Wide Web connected computers to networks, and the next evolution connected people to the Internet and other people, IoT looks poised to interconnect devices, people, environments, virtual objects and machines in ways that only science fiction writers could have imagined.

Sourced through Scoop.it from: www.bbvaopenmind.com

By Ahmed Banafa. The term fog computing is also referred to as “edge computing,” which essentially means that rather than hosting and working from a centralized cloud, fog systems operate on network ends. That concentration means that data can be processed locally in smart devices rather than being sent to the cloud for processing. It’s one approach to dealing with the Internet of Things (IoT).

See on Scoop.itAbout leadership

Myths and realities behind security analytics – JAXenter

Security software vendors tend to exaggerate the potential of their tools – to put it mildy. Using real-world attack examples, Niara’s Karthik Krishnan explains why so many enterprise systems are being breached and what cyber security technology is really capable of.

Sourced through Scoop.it from: jaxenter.com

By Karthik Krishnan. Security analytics is not just about discovering the most insidious threats, but also about using machine learning to assist analysts – whether that be in support of their incident investigations, alert prioritization or compromised user discovery needs.

After Robots Take Our Jobs, What Will We Buy in a Society Without Money? | Big Think

Could we redesign shopping as a system of “catch-and-release,” so that, like sport fishing, it’s the adventure and not the prize that becomes central?

Sourced through Scoop.it from: bigthink.com

By Stephen T. Asma. If the wealthy bully on the block takes the footballs and baseballs away from us, we can either cry at his door, or play a different game altogether. 

See on Scoop.itThe New way of Work