Labs blog
VINT updates

CSI: Cyber and Bitcoin

Following a bitcoin robbery, the CSI team uses a digital trail to track the thief, however – they are shocked at what they find.

How immersive can a world be?

Importance of Bibles

In my last article, I introduced ‘Transmedia storytelling’ (TS) and the way bible-sunset-2it can use new technologies to achieve its goals. Now, we’ll inspect, in depth, the fundamentals of TS.

One of the main pillars of TS is the capacity of its diverse literary and creative works to converge into a single, well identified experience. This is the ‘immersive world’. What is important to understand here is that ‘immersive’ does not refer to any specific engagement, but a mix of correlated things. Usually, we speak about the latest things, but now it’s time to investigate the prior.

Achieving that goal is not simple. First of all, an author cannot obtain an immersive world by himself/herself. We know that nature is not ‘monochromatic.’ When a writer creates something, he/she etches the history in his/her own style. The people in the story is a reflection of how he/she visualizes things. Therefore, the total experience of this world is not converging, it’s flat! So, TS makes  the need for contributors, the prosumers, quite obvious. The stories, having different creators, offer a kind of 3D vision of that world. More contributors lead to more depth. [Read more…]

Connect-Talk-Think-Act – IoT and IIoT for Grumpies

JB_18052015_1Although many grumpies will remain skeptical, the Internet of Things (IoT) and the Industrial Internet (of Things: IIoT) are “two of a kind” and have started to transform the ways in which enterprises operate, collaborate and engage with their customers. Today, a final “Internet of Anything” or just “Anything Internet” phase is playing out, marrying the consumer side and the industrial side of the Internet of Things through a myriad of connected services from within and beyond company boundaries. This lays the foundation of product as well as service innovation, intensified customer engagement, and even new business models and revenue streams.

[Read more…]

Data Mining: How to use business data to improve business processes?

Yet another usage of data mining (YAUDM)

Image credit:

Image credit:

The term ‘Big Data’ has been hyped in the recent years and Data Mining techniques are now being used in many areas. This leads to a growing demand for Data Scientists, who can turn data into value. Data Science aims to use the different available data sources to answer four questions:

  • What happened? -> Report
  • Why did it happen? -> Diagnose
  • What will happen? -> Predict
  • What is the best that can happen? -> Recommend

These four questions are key to understand and improve business processes. Data mining techniques applied to business process analysis (aka process mining) aims to discover, monitor and improve real processes by extracting knowledge from data readily available in today’s information systems. The goal is not to analyze data, but to improve processes for your business. [Read more…]

Persona Synthetics: The New Generation of Humans

Closer to humans than ever before… Experience the new generation Synthetic Human:

Cloud Security is a Shared Responsibility

cloud-securityThe great benefits of the Cloud are its flexibility, on-demand availability, cost effectiveness, scalability and the way it enables a more agile approach to working. When you’re considering your cloud security strategy, you need to ensure that it reflects these characteristics to be truly effective. Maintaining security in the Cloud also necessitates a shared responsibility between Cloud Service Providers and their clients. As it’s impossible for clients to simply walk into a supplier’s datacentre to implement security measures; you need to use tools such as guest operating system firewalls, Virtual Network Gateway configuration, and Virtual Private Networks to secure your estate.  Only by working together can you ensure that your applications and data are protected, the required compliance regulations are met and maximum levels of business continuity are achieved. It’s essential to take each of the different aspects of Cloud deployment, physical infrastructure, network infrastructure, virtualization layer, operating system, applications and data to determine which security measures fall within the remit of the providers and which need to be dealt with directly by the client. [Read more…]

Introducing the Lily Camera

The Lily Camera lets anyone create cinematic footage previously reserved for professional filmmakers. The Lily Camera is waterproof, ultra-portable, and works right out of the box. Read more about this drone.

Coming Up: My Webinar on “Cybersecurity Kill Chain” theory


I will speak on “The Cybersecurity Kill Chain – Myth or Threat” on Monday, June 1 from 5:00 – 6:00 PM (Paris time).

About what?

Putting things back into perspective by describing rapidly the current Cybersecurity landscape, I will take you through the Cybersecurity Kill Chain Theory to:

–               Put ourselves a little bit in the shoes of attackers

–               Try to define, from what we hear in the news, what is Myth or what comprises real threats

–               See if the Cat and Mouse game is still on

In addition to that, I’ll try to see how, through a gamification process, several organizations tried to use the Cybersecurity Kill Chain principle to educate their staff to Cybersecurity issues.

Information Security Fundamentals such as the CIA concept or the IT Security Risk management concepts are still of critical importance. However, keeping-up with new trends, and adopting sometime an attack posture can bring to light new threats and thus lead to the implementation of new defense mechanism.

How to join [Read more…]

GE’s Industrial Internet (of Things and Services that is)

JB13052015Adapted from “Integrated Vehicle Health Management – Connecting You with Your Aircraft,” General Electric 2010

General Electric, famously co-founded by Thomas Edison, was one of the first companies to grasp the enormous innovation potential that an instrumented, connected and intelligent world would offer, and is acting decisively on the opportunities. GE’s Predix predictive maintenance platform belongs to today’s main hallmarks of what “connected things and services” can do in ecosystems of manufacturers, business partners, and customers throughout the economy – as GE operates through these seven segments: Power and Water, Oil and Gas, Energy Management, Aviation, Healthcare, Transportation, and Capital.

[Read more…]

How is an Architect’s role changing in the Digital Transformation era?

Software ArchitectWe are in the age of Digital Transformation. The concept is everywhere, in all discussions… but why ? Mainly because all companies need to innovate, transform their business model to stay in the competition in a rapidly changing world, fostered by fast-changing technologies. Companies need to provide more and more business value for a Business to Business to Customer/Consumer(B2B2C) ecosystem!

But in this situation, what is the role of an architect? Has it changed? Yes, for sure! Now, the architect’s role needs to adapt to this new model, with respect to business, organization and governance. The architect should no longer be responsible only for defining how to use one or another technology to build solutions. The architect’s role, in the digital transformation era, is to define WHAT solution to build and WHY, and HOW will that specific solution offer business value to the whole ecosystem of the company, for the given business model. [Read more…]

The Defender: Smart Personal Protection

The Defender is a product for those concerned about personal protection and peace of mind. The Defender integrates elements of products and services found separately and elegantly combines them into one compact personal accessory.

1) Self-Defense Tool
2) Mobile Medical Alert Device
3) 24/7 Monitoring Service

This is achieved by leveraging the communication technology of a smartphone coupled with a digital camera to capture & forward an attackers picture to law enforcement, flashing light and audible alarm to attract attention, plus the highest concentration of pepper spray available to law enforcement. The Defender includes a 24/7 response for safety and medical alerts, when you maintain your service agreement and every Defender that is sent to contributors will include one year of service (12 months).

Read more about on IndieGoGo.

Inverting the supermarket


What if we put the milk up front? Every day, we’re talking about designing technology around the user, taking the user point of view and ruthlessly following his or her preferences and needs. When we build apps or websites, the user-adoption is so important that we try to completely understand the users through personas and scenarios. Why then, when we go to a supermarket, is the milk still put in the back corner (and not upfront) making the ‘user’ cross the entire store to buy this most needed commodity? Is that for the benefit of the customer, or for the benefit of the store?

It’s common knowledge that this is done to generate business, to lure the customer deep into the store to make him or her buy more things. But what would happen if we really design a supermarket to optimize user experience? Recognizing there are different kinds of shopping trips and trying to offer the ‘shortest path to checkout’ for all of them? [Read more…]

A Connected Service eXperience (CSX) Is What Customers Want and Expect


Dealer-FX Group belongs to the fastest growing companies in North America. A trusted name in automotive retail software development and service solutions, they empower dealer and OEM clients to “Drive the Customer Experience” with their remarkably well executed product service, digital retention and relationship management strategies. Since 2013, Dealer-FX’s Connected Service eXperience (CSX) is based on AutoSoft’s critically acclaimed Dealer Management System. In business now for 26 years, AutoSoft proudly calls itself “A Startup with a History.” [Read more…]

How certifications give your career an edge

CertificationsI’m not here to talk about the value of certifications for companies, but rather to talk about the value these bring to you, individually.

I have often heard people say: “Why do I need to get this certification? I have enough experience.” Yes… that is true, a certification on a piece of paper does not replace a real experience on a product in the field; but can we state that it brings no value at all?

In my point of view, at a higher level, there are some strong reasons to justify the value of obtaining certifications: [Read more…]

da Vinci Robot Stitches a Grape Back Together

The da Vinci Surgical System is used to stitch a grape back together. The same technology that can be used to suture a tiny grape is designed to help perform delicate, minimally invasive surgery.

How CESCE reinvented itself: A Digital Transformation success story

Digital 1Last month, I attended the The Open Group Summit and Member Meeting in Madrid. I was on a mission to see how things stand with Forums such as Architecture (TOGAF), IT4IT and Open Platform 3.0. It was an interesting week. However, the absolute high of the event for me was the presentation on Day 2 by Mariano Arnaiz, CIO of Grupo CESCE. CESCE is a globally operating company based in Spain that provides credit risk insurance to companies.

The year 2008 was not a good year for CESCE, as you can imagine. Surprisingly, the year 2009 was an excellent year for them. They are the only company in their line of work that did not need government support. How did they manage that? [Read more…]

Scan yourself into virtual worlds with Seene

Seene has created a pipeline for high-resolution 3D face scanning on standard mobile devices. All processing is performed on the device without specialized hardware, so anyone can scan their face and see the result in seconds. The raw scan data is then fitted to a canonical base mesh and uploaded to our cloud platform, ready to be applied into virtual experiences and products. Read here more about Seene.

The Internet of Addictions

Image credit:

Image credit:

The Internet of Things is growing rapidly, and with it… its potential to change our lives. Although this is mostly for the better, privacy and security concerns have already been raised (read this article). A bigger concern, however, is the addictiveness of where we interact with the Internet of Things – devices and apps.

Received a message? Get your fix!

Our devices and apps are as addictive as drugs. Addictive drugs mainly target your brain’s pleasure center, which reacts to produce dopamine. Also, if you do something pleasurable, your brain produces dopamine. This is what happens when you play games, see something enjoyable on TV, or when you have sex. But it also happens in more subtle ways when you receive notifications or information. You are compelled to look at your devices because of how your brain is wired. No wonder people keep their smartphones at arms length, even when they’re in a meeting or in a restaurant. [Read more…]

Bitcoin is the world’s most dangerous idea

bitcoin_matrixA symbol for ‘nothing’ doesn’t seem to mean very much, but the biography of the number ‘zero’ shows what a dangerous idea it has been since its very first creation. The Sumerians of ancient Babylon invented it about 5,000 years ago, the Greeks banned it, the Hindus worshiped it, and the Church branded it as demonic figure that implied the negation of God.

Rehabilitation started in northern Italy in the 13th century. Zero became the most important tool in mathematics. It enabled the merchants of Venice to create modern finance: they invented the double-entry bookkeeping system. In her book ‘Double Entry’ author Jane Gleeson-White states that double-entry bookkeeping is ‘one of the greatest advances in the history of business and commerce’. She argues that ‘the process of recording profit and loss was nothing short of revolutionary: it fuelled the Renaissance, enabled capitalism to flourish, and created the global economy.’

Jacob Soll, the author of ‘The Reckoning’, states that basic accounting tools not only form the basis of modern capitalism but also of ‘the nation-state’. Our present is the outcome of this innovative system of accounting.

The acceptance of the double-entry bookkeeping system didn’t happen overnight. One of the main obstacles was the Church. Pope Leo the Great forbade charging interest on loans by canon law. In his eyes banking was sinful. It was prohibited to profit from money ‘without working’. Soon various ways around the prohibition were devised. Christianity and Judaism generally ban usury, but allowed usury towards heretics. Thus Christians could lend to Jews and vice versa.

[Read more…]

Digital Usability (Part 1): Discard Standard Systems, Adopt Portal Approach

Lately, it has struck me that despite all the chatter (over the last 10 years) about digital usability and making IT usage easy and supportive, it has not got any better. I rather feel that it has become worse!

This series of blog posts will be my reflection on the reality, as I perceive it today.

I see it in several dimensions. Four of them are on my radar now:

  • Standard systems
  • Portal as concept
  • Business Process Management
  • Digital environment vs Digital workplace

Standard systems

FrustationIt is not a secret that standard systems usually complicate things for the digital workers. I remember, 15 years ago, my mother worked at a finance department of a company that had just installed a new finance system. Their old legacy one was replaced with a standard one. She was really frustrated with the system, because a simple booking procedure required her to walk through four screens instead of one. Each booking took three times longer than usual. In my role as a consultant, I’ve faced such situations many times in the last few years; and I am really surprised that people are accepting the new complicated reality, in times when we really should expect IT to simplify things for us. [Read more…]