The smartphone has already usurped the role of the computer in a number of ways, thanks to the former’s increasing processing power. In fact, some scientists are using the CPU capacity to replicate an “old” idea that use idle distributed computer power to execute complex processing, taking advantage of the huge number of such resources; and have extended this idea to smartphones and tablets as well. [Read more…]
Posts by Philippe André
More and more business sectors are using big data analytics to do better business, to gain market share or retain/acquire customers. Here are some examples of such powerful algorithms based on big data analysis: [Read more…]
Posted Under: Big Data and Analytics
Last September 9th, the new iPhone and the Apple Watch drew the attention during the Apple’s CEO keynotes. But none of them were a revolution: the new iPhone is an incremental innovation and the Apple Watch will find its usefulness only with the applications we will develop for it.
No, the real “revolution”, or at least the most interesting novelty was elsewhere: in the launching of the Apple Pay service and the systematic integration of a NFC chip in all Apple devices that allows everybody to pay without contact with his smartphone. [Read more…]
The recent blogpost “this piece of data is lying!” (part 1 and 2) showed that the devil hides in the details and what we observe from data (i.e. correlation) could be false. In this new series of articles, I would like to elaborate on that and give some more examples of statistical bias we must be all aware of in order to not be fooled with big data statistical results. The content of this series is inspired by a data science course of Washington University in the USA (Bill Howe, Data science, autumn 2012). [Read more…]
Posted Under: Big Data and Analytics
Do you want to capture free Wi-fi connection in the middle of Siberia or in any free internet access area? This could become a reality in 2015 thanks to the “Outernet” launched by an association of New York Media Development Investment Fund (MDIF). [Read more…]
Posted Under: The Web
But things are changing, thanks to Big Data and artificial intelligence which are producing ultra-accurate forecasts that will make it feasible to integrate much more renewable energy into the grid. [Read more…]
With the advent of the Internet of Things, potentially billions of devices will report data about themselves, making it possible to create new applications in areas as diverse as factory optimization, car maintenance, transport optimization, real time energy consumption measure and optimization or simply keeping track of your stuff online.
However, doing this today requires programming knowledge. There are now companies, which are trying to make it as easy to create an Internet of Things application, as it is to put a file into Dropbox. [Read more…]
Automated systems routinely make decisions required to trade securities, detect fraud and place ads on Web pages. But when it comes to developing these kinds of technology, the hottest decision-making system is not technological at all. It is about a product development strategy.
Today, technology risk—the chance that a company cannot build what it sets out to build—is not the problem anymore. Market risk, on the other hand, is a killer concern.
The problem is that businesses often conceptualize, design, and produce a product before they correctly gauge a market reaction. If you are wrong about your idea’s acceptance by users, you can lose a lot of money.
It is why today, some companies, developing software for their users or partners, use a new approach to product development called lean startup. [Read more…]
Posted Under: Software Development
- you have just entered the mall center and pass an advertising panel when its picture changes and presents advertisement of product you could like,
- or your smart phone buzzes to propose you to buy some materials as you pass by your favorite shop.
Science fiction? No, just reality. [Read more…]
Posted Under: Uncategorized
The current cryptographic protocols like RSA which are used in multiple use cases are highly secured, but not perfectly secured. The security level of such a system relies on one key remaining secret, and its secrecy depends on the length of the key itself, in order to be quite impossible to discover by today’s computing systems. But it is a question of time: as the power of the computer increases, the length of cryptographic keys will increase.
So, one of the dreams for security experts is the creation of a quantum internet that allows perfectly secure communication based on the powerful laws of quantum mechanics. [Read more…]