Instrumented Interconnecteds Intelligent
Big Data

By Steve Hamm

Alexandra Mojsilovic, IBM Fellow

Alexandra Mojsilovic, IBM Fellow

Aleksandra “Saska” Mojsilovic grew up in the former Yugoslavia before it splintered into nine nations, and, by the time she graduated with a PhD in  electrical engineering from the University of Belgrade in 1997, “The world I knew didn’t exist anymore,” she says. Today, as a scientist at the IBM Research lab in Yorktown Heights, N.Y., she’s making it possible for people to understand how the world works much more deeply than every before–so they can transcend traditional boundaries and make better decisions in their private and professional lives. Continue Reading »

Bookmark and Share

Notre Dame High School 10th Graders, Filsan Nur and Erica Tan, in front of their mobile app: Burger Party, in Ottawa, March 27, 2014.

Notre Dame High School 10th Graders, Filsan Nur and Erica Tan, in front of their mobile app, Burger Party, in Ottawa, March 27, 2014.

By Rob White

What do Healthy Splash, Dance Penguin Style, Dino Boy, Burger Party, and Ziggy Bones all have in common?

They’re all mobile applications and they were all developed by a group of 3rd and 10th grade students in Ottawa, Canada, taking part in the TechU.me program this week.

This pioneering program encourages the development of critical thinking, creativity, collaboration and communication skills in young people. Specifically, it links primary students with high-schoolers and private-sector industry mentors to collaborate on mobile educational games and app development. Continue Reading »

Bookmark and Share

John Armstrong, Partner, IBM Interactive Experience

John Armstrong, Partner, IBM Interactive Experience

By John Armstrong

The current tech narrative is rife with examples of how data analytics has reshaped our world and the industries that play in it. Healthcare providers are able to analyze vast pools of data to improve patient care through greater understanding of an individual’s medical history or determine which treatment is likely to be most effective, for example. Retailers can keep tabs on their customer’s purchases to make product recommendations that are most inclined to catch their interest.

Buoyed by these successes, the industry is pushing data into new, unexpected corners. Recently, we’ve seen individual companies begin to experiment with how data can inform design, from a company’s products to the experiences they offer. It’s about taking something that was once largely art and enriching it through science.

For example, Nike experimented with what it calls “smart data,” using the right data and scenario planning to come up with more sustainable designs for its products, such as a dyeing technique that doesn’t need water. Continue Reading »

Bookmark and Share

Dan Ricci, IBM Big Data & Analytics Industry

Dan Ricci, IBM Big Data & Analytics Industry

By Dan Ricci

Remember when car dealers pushed tinted windows, rust proofing, and keyless entry to sell cars? That’s ancient history for automakers. Today’s new competitive edge is centered around the Connected Car – and using real-time insights from big data inside and outside of vehicles to improve safety, enhance vehicle quality and enrich the driving and service experience.

Cars are rolling gold mines of information, gathering data about the driver, the driving environment and the car itself, as well as any connected devices. In fact, up to 25 gigabytes of data is generated from a single plug-in hybrid vehicle in just an hour.

And although auto manufacturers have been capturing telematics information for years, something different, more sophisticated is going on now and it has everything to do with big data and analytics. Continue Reading »

Bookmark and Share
March 27th, 2014
11:30
 

Ron Ambrosio, Distinguished Engineer & CTO, Smarter Energy Research, IBM

Ron Ambrosio, Distinguished Engineer & CTO, Smarter Energy Research, IBM

By Ron Ambrosio

Machines have been connecting to the Internet for many years. To the point that, in today’s Internet of Things, more “Things” are connected to the Internet than people. This evolution now has industrial equipment branching out of their closed control networks to connect to enterprise networks, and in some cases to the Internet, too. But it’s created a challenge in how that data is understood and used. So, we joined AT&T, Cisco, GE, and Intel to establish the Industrial Internet Consortium (IIC) to help influence the global standards development process for how industrial equipment – like transformers in the grid – connect and communicate.

In the same way you connect to the Internet, whether over wifi or a mobile network, no matter where you go or what device you use, proprietary industrial equipment needs a standard way to communicate, too. Continue Reading »

Bookmark and Share

James Spohrer, Director, IBM Global University Programs

James Spohrer, Director, IBM Global University Programs

By Jim Spohrer

Moore’s Law describes the phenomenon that drives rapid progress in the electronics industry.  Taking advantage of the laws of physics, engineers have been able to pack transistors ever more densely onto semiconductor chips, doubling their capacity every 18-24 months. The effect of this so-called “scaling” phenomenon is the ability to do more with less space, continuously increasing the capabilities and lowering the cost of computing. Rapid progress is built into the system.

Society’s efforts to scale higher education have not been so successful. Sure, the world’s developed economies handle an immense quantity of university students. In the United States alone, nearly 5,000 institutions of higher education serve more than 20 million students. Yet the way we have scaled up to produce the number of knowledge workers required by modern society is ineffective and unsustainable. In the US, the cost of higher education has increased by 1,120% over the past 35 years, four times the increase in the consumer price index.  And stasis, rather than progress, is built into the system. Continue Reading »

Bookmark and Share

Kala Fleming, Water Research Scientist, IBM Research - Africa

Kala Fleming, Water Research Scientist, IBM Research – Africa

By Kala Fleming

On the tiny island of Antigua where I grew up we always had enough water. We never had to call a water truck and to our knowledge, no one ever got sick from drinking the water in its natural state. The ‘natural’ state of water on Antigua is straight to the downpipe from the roof and into a concrete tank in the ground under each house. Community ponds also captured extra rainfall that others used for watering animals and washing cars.

Rainwater harvesting in the Caribbean provides a more reliable source of supply than piped systems and the geology of the region limits the availability of ground water. In the Virgin Islands, building regulations even require all new houses to harvest rainwater. So, in places such as urban Africa where ensuring water security has become increasingly tricky, why has this approach not caught on? Continue Reading »

Bookmark and Share

Sean McKenna, Senior Manager at the IBM Smarter Cities Technology Centre, Dublin, Ireland

Sean McKenna, PhD., Senior Manager at the IBM Smarter Cities Technology Centre, Dublin, Ireland

By Sean McKenna, PhD. 

In heavily populated regions of the world, the available water is fully subscribed. That is, claims have been made on all the available water for different uses including recreation, drinking water supply, industry, agriculture, and energy production.

As global energy consumption continues to rise (estimated 56 percent growth between 2010 and 2040 – US Energy Information Administration, 2013), additional water will be needed to increase energy production.

Finding water that is not already claimed is becoming difficult. However additional efficiencies can be obtained through improved management of the existing water resource. Generating energy through less water intensive means is another approach, but even Solar PV and wind turbines require water to mine and manufacture the materials that comprise them. Continue Reading »

Bookmark and Share

Theresa Payton, Founder, Fortalice, LLC; Author

Theresa Payton, Founder, Fortalice, LLC; Author

From 2006-2008, Theresa Payton served as the White House CIO for the Bush administration. In 2008 she founded Fortalice, a security consulting firm focused on fraud issues related to consumer protection. She spoke today at IBM’s Counter Fraud Summit in New York. A Smarter Planet caught up with her to get her perspectives.  Here’s a snapshot of that conversation.

Smarter Planet: What types of fraud do you believe businesses should brace themselves for in 2014 and beyond?
Theresa Payton: There are multiple types of fraud consistently reported by businesses around the globe. They include the back office type, such as asset misappropriation, accounting fraud and procurement fraud. There are also fraud and financial crimes related to money laundering, and false claims. And then there’s also cybercrime. With all the digital smokescreens now available, I believe you will see these types of fraud continue. But you will also see cybercrime as a percentage of overall fraud numbers climb as the entry point to fraudulent activity. Continue Reading »

Bookmark and Share

Robert Griffin, Vice President, Industry Solutions, IBM

Robert Griffin, Vice President, Counter Fraud Solutions, IBM

By Robert Griffin

“Fraud is a normal cost of doing business.”

Any organization that subscribes to this long-standing mantra needs to rethink their priorities. With 2.5 billion gigabytes of data created every day, fraud is taking on a new face in the Big Data world.

According to the Association of Certified Fraud Examiners (ACFE), organizations forfeit five percent of annual revenue to fraud, which by conservative estimates amounts to more than $3.5 trillion lost each year to global fraud and financial crimes. Fraudulent activity has grown in scope, volume and complexity, with the brash sophistication of recent attacks — and magnitude of damage, both to the brand and bottom line — elevating the anti-fraud conversation from acceptable loss to C-Suite imperative.

Today’s generation of organized and digitally-savvy criminals are using the same technologies that deliver efficiency to business and convenience to consumers — such as mobile devices, social networks and cloud platforms — to constantly probe for vulnerabilities and weaknesses. The pace of this threat continues to accelerate. Identity fraud impacted more than 12 million individuals in 2012, resulting in theft of nearly $21 billion, and each day the U.S. healthcare industry loses $650 million due to fraudulent claims and payments. Continue Reading »

Bookmark and Share

Subscribe to this category Subscribe to Big Data