Blockchain will become a foundational layer for everything says the FedEx exec

Like the internet, blockchain has started to underpin new business models.

BOSTON – Blockchain may never be a panacea for all company transactions issues, but in the end, it will become an industry based technology leading to fresh company models. However, in advance, it will be necessary to operate proprietary blockchains and be substituted by open software and industrial norms which allow distributed books to interact across competing companies and border boundaries, according to Dale Chrystie, a FedEx company fellow and blockchain strategist.

"I believe that some years ago it is under all a fundamental layer," said Chrystie at this week's Blockchain Enterprise Summit. "You put the word ' internet' on it all 20 years ago and now you don't. Today we put the word ' blockchain' before all and I don't believe we'll do it in the future, it's just the way it will work." In essence, blockchain could be an open, transparent digital booklet that can remove the intermediary – a central bank or a corporate supply chain database – and essentially alter the way companies deal, Chrystie said.

Along with artificial intelligence and IoT sensors, a blockchain tracking device can trace the roots of products and ensure that everything, from products to flat components, is genuinely authentic. While tiny numbers of companies are able to introduce proprietary blockchains and attain a semblance of transactional effectiveness from business to business by their own "tax highway," Chrystie argues that only an open-source leader based on industrial norms will be widely adopted.

We think the future of this is open source, and we believe when this comes to being established, that all sorts of individuals can add value in addition, "Chrystie said." It's going to take a global village to construct that. "Since 2017, $18 billion was spent in blockchain, either in venture capital financing of starter companies, original offerings of coins and commercial implementation for distributed leader technologies according to Kyle Ellicott, Chief Labor Officer, Food and Healthcare Management, for the first time.

Just over 550 businesses, from hedge funds to accelerators, incubators, consortium organizations, and media, participate in the blockchain. More than 275 companies provide on-site or in the cloud for blockchain platforms, and 20 working groups or consortia have different blockchains. Enterprises move beyond pilots and collaborations and implement the technology to not only track goods but to enable clients to buy products with digital currencies based on blockchain systems. ' This is not a slow trend in Q2, ' says Ellicott, rattling off a roster of businesses, including Accenture, Apple, Bank of America, JP Morgan Case, MasterCard, and Samsung. ' ' In the end, 50 enterprises are moving forward using customer oriented technologies.

By monitoring components during transfers, Blockchain can document suppliers ' contribution to the manufacturing process. The technology does not necessarily stop the implementation of unsafe raw materials but it allows to identify who brought these materials. Another capacity of blockchain is to prevent an unauthorized party from passing on the intellectual property used in production. "The supply chain is a great danger of intellectual property leaving out –particularly for businesses. How can we ensure that our technology is not used elsewhere when we lend our technology to someone else to produce a product for us?" Judd said. "So, we can safely pass on patented data, confidential information, safe data with blockchain, knowing that business is being lent by us for its intended purpose.


Google I/O 2019: How to watch and keep up with the biggest developments

I / O — Google's annual conference developer — starts next week, and we look forward to hearing what's in store for the search giant. For 2019, we hope Google I / O will be packaged with all the details of Google's streaming services from new midrange Pixel phones to more.

We anticipate that most of the major announcements will be made (we're looking at you, Android Q), and we'll cover it live and synthesize the key events, but if you want to watch live the revelations as they happen, what about them? It's easy to do that, don't worry. Here's how you can watch Google I / O 2019 from watching the keynote to watching closely the schedule.

When is it?

Google I / O 2019 is an event that runs from May 7 to May 9 for several days. Everything begins at 10 a.m. with the keynote. PST will continue for at least an hour, if not more, on May 7, and is expected. We expect Google to emphasize a lot, so be ready for a few large ads.

After the keynote is finished, a series of sessions running over the three days will continue for Google I / O. On Google's I / O website and on the Google I / O app you can find the complete schedule. They're mostly designed for developers, but some will be fashionable about things which we didn't see before and a deeper dive into announcements at the keynote will still be interesting.

How to Watch it?

If there are examples from last years, it will be easy to tun into Google's keynote. Google's I / O keynote speech will be broadcast live on the YouTube channel of Google Developers, where all major announcements are issued. It begins at 10:00 a.m. P.S.T. on Tuesday 7 May and our article "What to Expect" will also be integrated into the live stream at the top of the page. In our Google I / O 2019 hub, we will also post time and date reminders, so keep an eye on it.

You will also be able to receive the latest news and information from our team on the ground if you want a more personal approach. Follow the latest developments by Mobile Editor Julian Chokkattu and Juliana Jara from DT Espanol, while new developments are highlighted in Digital Trend and DTMobile Twitter.


Best Hardware Review: Cisco 8865 IP Phone Review

The Cisco 8865 IP Phone is the latest California-based multi-national tool available to increase further the ability of discerning business users to communicate and cooperate. With annual revenue of around $49,24 billion, one of the world's leading telco developers (in 2016), Cisco is very expected, but how does the 8865 IP Phone meet these expectations? To find out what it offers, what advantages it can offer businesses and which companies can benefit most from investing in it, we have decided to write a detailed review.

Appearance

With stunning, rear lights, high-resolution color view, 8865 comes in an attractive, ergonomic design, with a choice of black and silver or silver and silver.

Key Features

  • Cisco Smart Proximity means that you can work with your desk and your mobile phones
  • The 8865 has five line keys that can be programmed. You can adjust keys to either support multiple directory numbers or call functions like speed dial
  • The 8865 has a VGA backlit widescreen display with a 5-inch high resolution (800 x 480). Local language support to meet the requirements of global users, including right-to-right screen text
  • A five-way browser cluster allows users to easily move through the menus
  • Acoustic keys that are backlit provide flexibility for audio path choice and switching
  • The phone offers a built-in Gigabit Ethernet switch for both network connection and your PC connection
  • The phone also supports locations with 802.11a/b/g/n/ac wireless LAN (WLAN) enabled
  • Comes as standard with 2 USB ports so you can charge other devices
  • Can be wall-mounted if needed with the addition of the optional wall-mount kit
  • Expand physical keys and display features with the 8800 series Key Expansion Module range
  • Expand physical keys and display features with the 8800 series Key Expansion Module range

Who is it for

To the discerning business user who wants ' always reliability ' with his mobile device's additional telephony integration bonus.

EHT Opinion

With the 8865 IP Phone from Cisco, users are able to operate more freely. They can communicate both internally and externally at a much more advanced level and implement it in the infrastructure of a company that already uses telephones from the 8800 series. Did you have any experiences you want to share with the 8865 IP phone? Do you feel that it lives up to the international reputation of Cisco? Please feel free to submit them to our comment & review section below if you have any thoughts that you want to share.


New Tech Update: Siemens integrates analysis software SAS in IoT platform

The SAS open source software for streaming analysis will be included by Siemens in the MindSphere Internet of Things Platform (IoT). Analysis access is available for use by IoT cloud-based users, which can speed up the introduction of machine education and artificial intelligence in the IoT environment according to both parties. These solutions are expected to be available later this year. Siemens and SAS will collaborate to engage new and existing customers and enable almost real-time integrated IoT peripherals, beginning with streaming analysis. Companies focus on manufacturing, health care, energy suppliers and transport organizations, as well as in the field of intelligent towns.

Mindsphere

MindSphere is Siemens ' open, cloud-based IoT operating system connected to the digital world by objects (' things '). The open platform as a service (PaaS) forms the basis for new business models such as preventive maintenance, management of energy data and the optimization of resources. MindSphere, therefore, forms the basis, according to Siemens, for new business models such as those for manufacturers who use their specific machine-and process knowledge, and to develop innovative customer-oriented applications, solutions, and services. For example, this enables them to monitor machines at various locations. Machine parks, for example, need to have limited downtime.


Old tech reveals personal data of past owner

Did you wipe all your data properly before getting rid of your computer hardware?

In order to discover how well businesses wipe data on end of life devices, Researcher Josh Frantz from Rapid7 purchased 85 used IT hardware including computers, flash drives, phones, and hard drives from businesses. In total, he paid $600.

Astonishingly, only two devices were wiped properly, and three devices were encrypted. He was able to retrieve 214,019 images, 3,406 documents, and 148,903 email messages from all the devices he purchased.

In an attempt to sift through all these data for potentially private information, he used Python script and PowerShell to identify social security numbers, dates of birth, credit card numbers, and phone numbers. He ended up collecting 611 email addresses, 50 dates of birth, 41 Social Security numbers, 19 credit-card numbers, 6 driver’s license numbers, and 2 passport numbers.

So, how much do these data worth?

To research further about the black market value of the data, Frantz was surprised to learn how cheap it is to buy people's information on the Darknet. Social security number cost around $1 apiece, while full documents cost around $3. It is obvious to say that data leakage is so common that it has driven down the cost of the data itself.

How to safely dispose of your IT hardware?

From this experiment, we learned the importance of wipe your data properly before dispose of your hardware.  At Easy Hardware Trading, we offer IT hardware a second life so it has always been our priority to have professionals wipe out all the data in the devices when we receive used hardware.


Solution for cyber attack

"It has already happened, it is happening now and if we do not change it it will happen in the future"

Dutch cybersecurity scientist Volkan Kaya stated that the x.509 standard PKI which determines the format of digital certificates is weak. With years of experiences working in the banking industry and graduated from Cyber Security Academy, he can easily shut down the entire Internet. In The Netherlands, the vulnerability of the Internet had also shown by the DigiNotar attack.

 

Certification protocols should be exist based on the 'truth' instead of 'trust'. 

X.509 issue digital certificates through e-mail. The e-mail message protocol (smtp) is not a secure protocol and can be intercepted by attackers.

The x.509 issues multiple certificates by using different key pairs at the same time for a specific domain name. Kaya: "The flexibility of having multiple valid certificates for the same host computer at the same time makes it possible to issue false valid certificates without knowledge of the host computer itself."

 

Kaya came up with new PKI certificate so-called ConsensusPKI. 

The certificates authorities in ConsensusPKI are collectively responsible for the identity of the normal computers and also the identity of all certificate authorities. Only the most recently issued certificate is a valid certificate. The certificate issuance process requires authentication of the CVRs by multiple CAs. All verifications performed during the certificate issuance must be broadcast to other CAs so that the verified CVRs can be saved to the related certificate blockchain. They can in turn issue a verified certificate.

For the interpretation of the certificates, CAs have to interrogate their database by client systems. The CAs must retain all blocking data that represent all certificates in the ecosystem that are stored in the CA infrastructure. The CAs must protect the blocking data that they store so that they can respond fairly to the incoming questions.

Finally, the certificates in the ConsensusPKI do not carry signatures of the issuing CAs. ConsensusPKI requires CAs to be honest during the use and issuance of certificates. The PKQuery and fetch processes of the ConsensusPKI ensure that the core of ConsensusPKI is maintained.

 


How to recycle computer equipment

What normal company does

  • Donate to non-profits
  • Return products to the manufacturer
  • Take to professional disposal waste
  • Resell to the original seller

What Eht does

  • Buy used/obsolete computer equipment
  • Sell refurbished computer to other company

 

What are the benefits of choosing EHT?

  • Reduce waste and save the environment 
  • Optional Data Wiping: We offer an option to wipe out all your data
  • Cost Effectiveness: Stretch your budget further by buying certified pre-owned hardware, giving you all the functionality and capabilities of a new system, for a fraction of the price.
  • Shorter Lead Times: With an extensive multi-million-pound stock holding, Easy Hardware Trading can get you the part or system you need, when you need it.
  • Time-Efficiency: In order to make IT managers time efficient, we look for fair hardware prices on the market

 


Cloud Makes Video Surveilance Smart

Programming for the investigation of video pictures and man-made consciousness (computerized reasoning, ai) decide the eventual fate of camera reconnaissance. Dean Drako, the co-founder of Barracuda Systems, points with his Eagle-Eye Systems for a future in which cameras work cleverly as well as assume control over a great deal of work. "At that point less protects will be required."

According to Dean Drako of Eagle Eye Networks, the new ai-driven cloud applications bring safety to the workplace, in stores and factories, to a higher level. Security is largely automated. The monitoring and giving of alarms are automatic. According to Dean Drako of Eagle Eye Systems, the new ai-driven cloud applications convey wellbeing to the working environment, in stores and industrial facilities, to a more elevated amount. Security is to a great extent computerized. The checking and giving of alerts are programmed.

Camera frameworks serve security as well as help enhance business forms. As of now, just a single in every hundred cameras has an unexpected capacity in comparison to wellbeing. Yet, that is moving. "40% of the cameras will add to business insight," predicts Drako.


New Sony patent on PlayStation 5

Sony is at the stage of development of a new patent, which will be compatible with PlayStation 5. The patent will have all of the consoles from previous versions of PlayStation. In fact, fans of PlayStation should love this idea!

Theoretically, PlayStation 5 might run software from the legacy devices like PlayStation 4, PlayStation 3, PlayStation 2,  and PSone. The idea is that the patent will be tricking the legacy software that it runs on the original device. It will imitate the behavior of the previous version of PlayStation in order for the new hardware to function with the old one. The PlayStation 5 will have the console with 8-core Ryzen CPU and a custom GPU based on AMD's Navi architecture.

 

 


Google and Maurithuis collaborate on the project

Google and Maurithuis stepped into the project in order to incorporate famous works of the painter Johannes Vermeer into a virtual environment. With the project "Meet Vermeer",  visitors will experience what a virtual museum is. They can physically walk in the virtual museum through the augmented reality and view 36 paintings by zooming them in. In past, Google already worked with Maurithuis on the French project " Arts & Culture". This is the second time that Google and Maurithuis will collaborate on the same project from Paris.

However, five developers from Google will create the virtual exhibition with paintings of Vermeer for "Arts & Culture" project, so that people all around the world can view masterpieces of the painter. The most interesting element for the creation of the virtual museum is visitor's contribution. People can build the museum themselves. For that purpose, they can use a tour creator by Google, Poly Tours. The tour creator allows using formats ar and vr. To view paintings, visitors should have ARCore (Android) or ARKit (iOS) platforms downloaded on their phones. They can also use normal vr mode on phones.

Furthermore, Google developed the Art Camera two years ago. This robot camera is used for providing people with a virtual view of the paintings of Vermeer. More than that, the camera scan and take a photo of a painting on a distance in 1 meter and uses laser and sonar for a good focus. Therefore, it is possible to zoom in the paintings to view them better. However, paintings can be zoomed only outside of the ar platform.

The "Meet Vermeer" project is a brilliant idea to view and enjoy masterpieces of the great painter Johannes Vermeer!