Share this post: From powering our smartphones, enabling electric vehicles to break into the mainstream, or massively improving renewable energy storage, lithium-ion battery technology is transforming consumers’ lives. Battery technology is making our cities greener while allowing the devices we rely on each moment of the day to operate more efficiently. Yet there is a […]
Privacy in blockchain collaboration with zero knowledge proofs
Share this post: Consider a new applicant for a credit card who needs to convince the credit company that they have maintained sufficient average balance in their bank account over the last three months. The traditional way of doing this is for the applicant to share the bank statements over that period. But, this reveals […]
Azure Data Explorer plugin for Grafana dashboards
Are you using Azure Data Explorer to query vast amounts of data? Are you following business metrics and KPIs with Grafana dashboards? Creating a Grafana data source with Azure Data Explorer has never been easier. Grafana is a leading open source software designed for visualizing time series analytics. It is an analytics and metrics platform […]
IoT heralds a new era for the high street
Matt Sebek, vice president of Digital at WWT, explores how carefully implemented IoT technology can be crucial to transforming the retail experience and preventing further high-street casualties. As retailers around the world count the cost of digital disruption, the Internet of Things (IoT) is growing in importance. In fact, it could transform the sector and […]
Microsoft Azure obtains Korea-Information Security Management System (K-ISMS) certification
Microsoft helps organizations all over the world comply with national, regional, and industry-specific regulatory requirements. These requirements are aimed at securing and protecting the data of individuals, establishments, and critical technology infrastructures. Azure meets the broadest set of international and industry-specific compliance standards, and we’ve added another country-specific compliance offering to our extensive portfolio with […]
Azure Marketplace new offers – Volume 29
Elasticsearch 5 Alpine Container with Antivirus: Deploy an enterprise-ready container for Elasticsearch 5 on Alpine. Elasticsearch is a search engine based on the Lucene library. Gosu Secured Ubuntu Container with Antivirus: Deploy an enterprise-ready container for Gosu on Ubuntu. Gosu is a general-purpose programming language built on top of a Java virtual machine. Gosu’s syntax […]
Securing the Smart Lighting Industry
The facilities industry is making it clear to us at Arm that they are increasingly focused on their assets, which are the inhabitants and objects located inside their buildings. Importance is being placed on the use cases that are making people happier, more productive, secure, and more comfortable. Smart lighting has been an exciting topic […]
What Does Big Data Say About Religion?
For many years, people believed that technological breakthroughs were incompatible with religious ideologies. According to recent observations from both data scientists and leaders in religious communities, big data and religion are starting to finally merge. How will this affect our knowledge of religion? Big data and religion intersect in strange ways Although many people are […]
How Big Data Makes Traditional Branding More Effective Than Ever
Data is being produced in massive volume in 2019. It serves a variety of purposes in many industries. The digital marketing industry is among the sectors that is most dependent on big data. However, marketers often overlook the benefits of using big data in traditional branding strategies, although they can be just as beneficial. You […]
Smart building security flaws leave schools, hospitals at risk
Security professionals are typically charged with ensuring the integrity of data security on equipment stored in the cloud, or on premises—less so with ensuring the integrity of the physical premises itself. As a result, building automation systems often go untested, if not outright ignored. These systems may constitute shadow IT in certain organizations, as leased […]