www.technowize.com
1 / Technowize Magazine / February 2016
MAKE SURE HE NEVER RUNS OUT OF BOOKS TO READ WWW.TRAVELINGSTORIES.ORG
$10= BOOKS 3 TO A KID IN NEED
TWITTER.COM/TRVLINGSTORIES
INSTAGRAM.COM/TRAVELINGSTORIES
OUTSMARTING POVERTY ONE BOOK AT A TIME
FACEBOOK.COM/TRAVELINGSTORIES
Editor’s Note February 2016
In recent months, the market is filled with launches, announcements, and acquisitions of payment technology products that promise convenience, lower fees, and increased security and privacy. The adoption and proliferation of digital payment technologies, begs the question: Who will ultimately win the war? There is no clear winner, but the landscape looks chaotic. Key for us, however, is studying these technologies that are exerting influence over the payments ecosystem. That’s why, we are delighted to bring to you, an analysis of the ‘Digital Payments Technologies’ that is fast filling the already chaotic ecosystem of mobile technology, wireless devices, banking, and others. In Haute Money, page 10, we talk about security fears over 5G network infrastructure, advance machine learning and deep neural networks, headphone advertising that is changing the traditional brand experience, and many more interesting stories. For tech connoisseurs, we bring to you the flashiest and the hottest payment startups vying for a market share in sectors ranging from bitcoin applications, crowdfunding, data analytics, and mobile payments and online lending, to virtual banking. Plunge in! 3 / Technowize Magazine / February 2016
Have you ever met a ‘Chief Marketing Technologist’? In the rapid slump of workplace silos, what does it mean when one person able to seamlessly bring results for two antithetical groups? Read Trendspotting, page 42. Elsewhere, this issue, we delve into a brief history of hardware, page 64. Futurist, page 76, explores the gene-editing technique ‘CRISPRCas9’ that would ultimately lead us into a future of Transhumanism. For the upcoming Presidential elections of 2016, we have a surprise too! Enjoy our February issue…
Like always, we welcome your comments (facebook.com/Technowize, @technowize on Twitter). You may reach us at editor@technowize.com or Editor - Technowize, The Fastest Media, 3651 Lindell Road, Suite 320D, Las Vegas, NV 89103.
4 / Technowize Magazine / February 2016
5 / Technowize Magazine / February 2016
K
Content Features 48
The New Age Concept of Hybrid Job Roles
82
Cut, Snip, Snap! Genome Modification gives power to people, unpredictable power.
6 / Technowize Magazine / February 2016
56
The Future of Digital Payment Technologies
010
Haute Money
030
Technopolis
044
Trendspotting
056
Cover Story
068
Hardware Inc.
082
Futurist
094
The Nerdist
098
App Labs
114
Tech Ed
120
Tech Events & Conferences 7 / Technowize Magazine / February 2016
The Team Editorial Anna Domanska, Editor-in-Chief Christy Gren, Sub-Editor Riana Petanjek, Sub-Editor Priyansha Mistry, Sub-Editor Aubrey Chang, Associate Editor
Design Kevin Paul Sr. Graphic Designer
Project Management Tony Raval Project Director Jay Raol Project Director
8 / Technowize Magazine / February 2016
Marketing Jason Miller, Sr. Project Director
Advertising Richard Dean, Advertising Manager
96
Technology John Hancock, Head-Web Department Le Manh Coung, Sr Sofrware Coordinator Julia Hunt, Magazine Production
Finance Control R R Baratiya
114
9 / Technowize Magazine / February 2016
10 / Technowize Magazine / February 2016
Haute Money Bringing you the latest cult coverage straight from the tech world - find out about people and companies defining the cutting edge of technology and shaping leaders of the future: entrepreneurs coming from situations set against the backdrop of humble environments.
11 / Technowize Magazine / February 2016
Haute Money Will 5G Ensure Better Security Along With Privacy?
12 / Technowize Magazine / February 2016
The security design for 5G network will possibly have to be allencompassing to offer enough security for the world where everything is connected. The system for 5G network structure will be service-oriented, focusing on the need for a broader emphasis on privacy and security from various angles. The surprising fact about 5G network is, it will not be restrained to a particular set of customers. This technology is not simply about having richer smartphone functions or a faster mobile network, it is way beyond. It will provide its service to vertical industries, which will eventually help in the origination of new services. The vertical industries like the Internet of Things, virtual and augmented reality, automated and connected vehicles, are thriving. They demand a ubiquitous and faster access to the network, with the implementation of 5G, this issue can be solved to a great extent. The decisions regarding privacy and security principles for 5G networks are clear, although there are many other feature aspects about the network that remains uncertain. The rise of new technologies, latest business, and new architectures through 5G network will bring significant challenges regarding privacy and security protection. The security-related demands of vertical industries could prove to be a huge subject of variation among services. The current security which is based on a security approach, also known as ‘hop-byhop’ may not prove sufficient enough to establish end-to-end differentiated security for different services demanded by vertical industries. The privacy and security for such a huge, global system cannot be established properly on top of the other already designed systems; they require a system to be designed right from the beginning. The basic questions circulating around the security and protection criteria for 5G network are: 1. Whether to focus on augmented protection of location and identity privacy towards active attackers. 2. The role of end-to-end protection methods from previous generations should be extended? 3. 5G privacy and security solutions will shield the service layer along with the access layer? 13 / Technowize Magazine / February 2016
Haute Money
14 / Technowize Magazine / February 2016
Single Platform Many Services: Adaptive Security Architecture The complexities of the algorithmic economy and the digital business merged with an evolving ‘Hacker Industry’ increases the threat surface significantly for an organization. Depending on perimeter defense and security based on a set of rules is no longer enough, especially as enterprises are exploiting more open APIs and services based on cloud computing platforms for partners and customers to integrate with systems offered by the companies. According to Gartner, information and technology leaders must concentrate on analyzing and acknowledging the risks, along with preventive measures like traditional blocking among various other methods to prevent attacks. Entity behavior and self-protection application analytics will aid in fulfilling the architecture of adaptive security. The four elements in the core architecture systems that are the integration of prediction, prevention, detection, and acknowledgement to threats, can be considered as various levels corresponding to the manner an individual must approach security given their knowledge about the threat landscape currently. The aspect of this architecture showcases the ongoing evolution in the system of security technologies. When individuals encounter a security framework like this, mapping their current stack of security technology to the abilities they would like to achieve is the natural tendency. For instance, vulnerability scanning fits under prediction, network forensic tools, access control technologies map and policy enforcement to prevention, and IPS/IDS map to detect can be efficiently leveraged in the case of an incident response capacity. It is a single platform, providing a large spectrum of abilities under the same roof, which is integrated naturally. Architecture has value if it can be effectively applied under various relevant scenarios that are beyond the initially conceived ones. Perhaps, it is high-time when we start thinking our security approaches. 15 / Technowize Magazine / February 2016
Haute Money
The Logic behind the Logic of “Information of Everything� Technology is constantly getting mature and evolving itself into the biggest thing in existence in the entire universe. It has transformed from an undefined entity in its nascent phase to one, which is whole-heartedly accepted and transformed in to such a commonplace that we keep wondering if we can ever survive functioning without it. The most prominent instances of this journey are two broader platforms, Cloud and Mobile. From individuals to businesses, each and every person and thing is connected everywhere, at every time, and with everyone. In a digital mesh, everything is responsible for generating, using, and transmitting data and information. This data is way beyond video, audio, and textual data to include contextual and sensory data. The information for everything is responsible for addressing this influx with technologies and strategies to link information from various data sources. 16 / Technowize Magazine / February 2016
Everything surrounding us is solely responsible for establishing a communication medium with information in virtually immeasurable volume. Corporations and organizations are required to have knowledge on how to access data from various data sources, how to figure out the data that helps in providing strategic volume, and exploring the logic behind how algorithms manage to leverage the idea of Information of Everything in order to fuel latest business models, industrial prototypes, and business designs. Always, the information has been regarded to exist everywhere, but has been left often unavailable, isolated, unintelligible, or incomplete. Advancements that have been made in semantic tools like graph databases along with various other emerging information analysis and data classification techniques will transform the entire technology of information systems. These advancements will further bring meaning to the more often helter-skelter flood of information. 17 / Technowize Magazine / February 2016
Haute Money
18 / Technowize Magazine / February 2016
The Smarter Age of Autonomous Beings The age of advanced machine learning has given a rise to a broader gamut of smart machine implementations that includes autonomous vehicles, smart advisors, robots, and virtual personal assistants. These implementations are known to act in a semi-autonomous or fully-autonomous manner, as a matter of fact. Usually, this caters into the ambient consumer experience where an autonomous agent is known to transform itself into the main consumer interface. In this system, instead of communicating with forms, buttons, and menus on a smartphone, the consumer establishes a direct communication with an application that is absolutely a quick-witted and an ingenious agent. Immersive surroundings deliver virtual and augmented reality holding a significant potential for only a single aspect of user experience, while catering an ambient consumer experience involves preserving consistency across the realms of space, time, and mesh. Seamlessly, the experience flows across a set of shifting devices and communicating channels that blends electronic, virtual, and physical environment according to the user needs. While advancements made in the physical form of smart machines like robots manage to grab a larger volume of eyeballs, the smart machines based on software are known to have a broader and a larger near-term impact. Virtual private assistants such as Cortana, Siri, and Google Now are becoming more intelligent and smarter day by day, and are pioneers to autonomous agents. In upcoming five years, humans will evolve into a world of postapplication with intelligent agents like VPAs delivering contextual and dynamic interfaces and actions. The IT leaders must start exploring how they can utilize autonomous agents and things to free people from the manual tasks and augment the activity of humans. However, the leaders of information and technology will have to recognize and understand that smart things and agents are a phenomenon based on a long-term purpose, which will continue to expand and evolve their use in the next 20 years.
19 / Technowize Magazine / February 2016
Haute Money Exploring Deep Neural Nets: Advanced Machine Learning Advanced machine learning is the phenomenon responsible for making smart machines and devices ‘intelligent’ by providing them with capabilities to understand the concepts of environment and learn new things. A smart machine can transform its future behavior via machine learning. This aspect of artificial intelligence is evolving hastily, and enterprises must identify for possible theories on how they can apply the technology of advanced machine learning to gain a competitive edge. Even after such advancements in this technology, there is a lot of programming works still left unfinished, which are required for computers to be capable enough to program themselves. Computers along with their applications are being re-designed for adaptability and change. Programmers, nowadays, demand their applications to respond way beyond the intentional input. They want their applications to respond to crowd sourced activities, external stimuli, and big data along with other legions of sources. The burgeoning complexity of data and the explosion of data sources makes manual analysis and classification uneconomic and infeasible. Deep neural nets automate such operations and make it possible to understand and address key challenges that are related to the trend of information about everything. The deep neural nets, in the theory of advanced machine learning, travel beyond information administration and classic computing to establish systems, which can learn to perceive the surroundings of the world autonomously by themselves. The deep neural nets are machine learning’s more advanced forms that are particularly applicable to complex and larger forms of datasets. These basically transforms the devices into its smartest forms.
20 / Technowize Magazine / February 2016
21 / Technowize Magazine / February 2016
Haute Money
22 / Technowize Magazine / February 2016
Ultra-EfficientNeuromorphic: Advanced System of Architecture The smart machines and the digital mesh of networks require a robust computing architecture requirement to transform them into more viable substances for enterprises. They get the much needed additional boost from architectures that are ultra-efficientneuromorphic. The computing systems that are established on graphics processing units and field programmable gate arrays will operate more like that of a human brain, which is particularly suited to be used in deep learning along with various other algorithms based on pattern-matching, which smart machines use. The architecture, based on FPGA allows distribution of less power into the smallest endpoints of the Internet of Things, such as cars, human beings, wrist watches, and homes. The delivery of services and apps for the dynamic and flexible environment of the mesh is enabled by the service architecture and mesh app. The requirements of users will be served by the advanced architecture as they continue to vary over time. It efficiently brings together many devices, services, information sources, micro services, and applications into an architecture that is flexible in which applications expands across numerous endpoint devices. It can easily coordinate with each other to generate a consistent digital experience. Monoliths and linear app designs such as the 3-tier architecture are providing a path towards a loose and coupled collaborative approach. This approach powered by software-defined app services enable agility, web-scale performance, and flexibility. The architecture of micro service is a nascent pattern for developing distributed apps that support scalable deployment and agile delivery, both in the cloud and on-premises. 23 / Technowize Magazine / February 2016
Haute Money
The Conjunctional Era of Platforms for Internet of Things It is highly tempting to figure out analogy when it comes to platforms for mobile phone. Initially, Apple used to be the dominant in the market of IoT platform, but gone are the good old days of the reign. Now, Apple enjoys an extremely influential and lucrative minority position against its nemesis Android. So far, the adoption of IoT platforms in the market hasn’t been smoother as it was expected. For instance, the mobile phones channeled the behavior of Facebook on a desktop into the high convenience of everywhere availability of Facebook on a mobile application. The sudden jump from the light switch to an application on a mobile phone sounds much dramatic, but pretty satisfactory and refined use of technology. So, the organizations that wish to participate in the development of IoT platform in the market of home automation will have to create items, which will operate compellingly in seclusion and alongside the products from rivals. The internet of things platform complements the architecture of mesh service and application. The security, administration, and integration along with various other technological standards and factors of the IoT platform are the basic set of abilities for establishing,
24 / Technowize Magazine / February 2016
25 / Technowize Magazine / February 2016
Haute Money
administrating, and securing various elements on the internet of things. The IoT platforms combine the work information technology performed behind the scenes from a technical and architectural standpoint to transform the vision of ‘Everywhere IoT’ into a concept of reality rather than limiting up to a certain object. It is a significant part of the ambient user experience and the system of digital mesh. The dynamic and burgeoning world of IoT platforms makes the aforementioned subjects possible. According to the Gartner’s research, any enterprise willing to embrace the internet of things will have to draft a strategy for IoT platform, and standardization can turn difficult by 2018 due to an incomplete set of opposing vendor approaches. While there are several small platforms for IoT that are positioning themselves at the real links, it seems that there will be a heated four-way tiff between Intel for IoTivity, Qualcomm for AllJoyn, and two other mainstream IoT platforms from tech giants, Apple for Apple HomeKit and Google for Google Brillo. The latter corporations have a fairer advantage of full integration stores such as the Google Play and the App Store, and of course, a heavy benefit of brand reorganization, as compared to the former duos.
26 / Technowize Magazine / February 2016
27 / Technowize Magazine / February 2016
Haute Money Headphone Advertising is the New-Age Digital Disruption in Traditional Business Everyone was left in a huge state of shock when Microsoft CEO Satya Nadella announced the acquisition of Mojang, the makers of Minecraft, for a whopping $2.5 billion in May 2015. Tech critics, analysts, and enthusiasts were wondering the possible reasons behind this huge takeover. What was the possible reason that a tech behemoth specializing in consoles, business software, and operating systems bought the makers of a hit and highly-popular children’s sandbox game? Markus Persson, Creator of the famous game, certainly assisted in accelerating the bargain, but Microsoft already had something huge in its arsenal, which was perfectly suited to its strategy: HoloLens. While the full gaming experience for Microsoft’s Minecraft HoloLens still remains for a long time off, the video games have already established itself as a moneymaker for the tech Goliath. For the quarter following the acquisition, the video game remained a bright spot for the company on a contrarily downtrodden finance report of the Xbox division. The main reason highlighted by James McQuivey from Forrester Research,
28 / Technowize Magazine / February 2016
who happens to be a tech analyst that tracks the traditional business digital disruption is, envisaging highly effective and latest advertising opportunities in video games like Minecraft. For instance, an automaker could create a setting for Minecraft where consumers can design their cars on their own with addition of absolute fun elements like celebrities and cats, or experience cars designed by other users virtually. James McQuivey explained how in a game setting method similar to this, advertisers can potentially establish a brand experience and prospective customers could be presented with it whose preferences for playing games make them most potential targeted customers for sales. Currently, in the industry of marketing and advertising, companies undergo various environments like television advertising, movie theatres, and billboards, but this acquisition could be a possible disruption in the advertising industry by the introduction of gaming platforms. Merging advertising in the field and environment of gaming has a huge potential of making a larger volume of audience interaction with advertisements and mass media. While playing games, a person can easily go through the advertisement that is being played on his headphone without the necessity of skipping the content due to disturbance in gaming. The initiative will not only be interesting and effective, but by all means it will prove as a transformative one. A viewer will no longer play a part of passive spectator when it comes to advertisement, instead he will be an active part of it by designing, creating, and taking part with his own content over the advertising platform.
29 / Technowize Magazine / February 2016
Technopolis
Will 2016 bring the end of cash?
30 / Technowize Magazine / February 2016
31 / Technowize Magazine / February 2016
Technopolis The Gold Rush in Payment startups get even bigger in 2016 as promising innovators tap digital market. “It was the best of times, it was the worst of times...� This quote from Charles Dickens strikes our mind when we need to sum up the current payment market. On the brighter side, the way we pay for products and services is changing as everyone migrates to Smartphone apps as a replacement of cash and cards. This creates a demand for mobile payment services. But, some start-ups have skidded in the gold rush to become the de facto standard for mobile payment. Such evolution is the outcome of omnipresent mobile platforms and ever-connected Internet. The number of people using the mobile payment method for purchasing various products and services will continue to rise in 2016. According to a mobile payment forecast, the total number of mobile transactions will grow by 210% in the United States by the end of 2016. However, the digits may vary if we consider the emerging countries which have a larger population but lower number of Smartphone users. There are several Operating System based payment services like Apple Pay or Android Pay, who have an added advantage of being accessible to more users. Despite this, here are certain innovative start-ups that may lead the race in 2016. 32 / Technowize Magazine / February 2016
33 / Technowize Magazine / February 2016
Technopolis
34 / Technowize Magazine / February 2016
GoCardless GoCardless is a direct debit provider that can process your debit payments in a simpler and quicker way. It is based in the UK. What created it: In January 2011, when Tom Blomfield, Hiroki Takeuchi, and Matt Robinson came up with the idea of making payments among a group of friends, they gave it the name GroupPay. Further discussing the idea, they thought direct debit will be the best way to implement it. And thus, came up with the name GoCardless. Why it’s different: GoCardless is one of the leading direct debit providers of the United Kingdom. The company has come up with new strategies to enable businesses to simply and quickly start taking payments from anywhere around the world. The company works with a variety of organizations from growing companies to larger organizations like UK Government and the Guardian. GoCardless is used in various other countries that include Europe, France, and Germany. Further, it will continue to spread out in more countries and create a global network for recurring payments. During the initial stage, GoCardless was funded by Y Combinator. Later, Accel Partners, Balderton Capital and Passion Capital were included in the list of investors.
35 / Technowize Magazine / February 2016
Technopolis Venmo Venmo is a mobile payment service that can be used through its Smartphone app or a website (if you do not wish to download the app). Venmo is used strictly for transferring money to other users or to the bank account. You can save the details of your bank account, credit card, and debit card to your Venmo account. The origin: Two friends, Andrew Kortina, and Iqram MagdonIsmail came up with the idea of starting a money transfer service via text messages. This idea was generated as Magdon once forgot his wallet on a trip to visit Kortina. The procedure of settling their accounts was really annoying, which made them realize the need of sending money instantly. Later the prototype of transferring money was changed from text messages to a high-tech mobile app. What makes it stand out: Venmo allows users to send money to anyone with a Venmo account, that too for free. It also has a unique feature that will enable the user to mention the reason of the money sent. You can simply send your rent, split dinner or maybe send a birthday gift. Venmo also has a social aspect, which will show your transactions to your friends via your news feed. However, the user can also change the privacy settings to make private transactions. You can also transfer money from your Venmo account to your bank within a single day. Additionally, Venmo claims that it has bank grade security, so it is highly secure. Venmo was acquired by Braintree in 2012 for $26.2 million. While in 2013, PayPal acquired Braintree for $800 million.
36 / Technowize Magazine / February 2016
37 / Technowize Magazine / February 2016
Technopolis
38 / Technowize Magazine / February 2016
UltraCash UltraCash is a Smartphone app that allows users to make payment for goods and services without an Internet connection. It works on a sound-based proximity data transfer. The founders: UltraCash was founded by Umesh Singhal and Vishal Lal, students of IIT-BHU. Singhal and Lal had some experience in working with other startups and came up with the idea of making their own digital payment app. UltraCash is based in Bengaluru, India. Why it’s trending: With UltraCash installed in your Smartphone, all you need to have is a bank account. UltraCash eliminates the concept of mobile wallet and directly transfers money from one phone to another without requiring an active internet connection. UltraCash allows users to make payments, pay bills, and avail various offers and discounts directly from your bank account. It allows users to make payments to around 500 merchants using high-frequency sound-based technology. With UltraCash, any merchant with a Smartphone can take payment using its app and be a part of digital payment revolution. UltraCash uses a ‘Tap & Pay’ method which allows the user to place his Smartphone near merchant’s phone to make the payment. It will generate a bill with all the details regarding price and discount on the screen and will require user’s permission to proceed further. This app provides a win-win situation for customers as well as merchants for making payments as simple as it gets.
39 / Technowize Magazine / February 2016
Technopolis SnapScan SnapScan allows users to make payment, just by scanning a QR (Quick Response) code at a point of sale. Who created it: SnapScan is co-founded by Kobus Ehlers and created under FireID group in 2014. This digital payment system is based in South-Africa. What’s new: Every time one needs to make a payment, SnapScan will provide a SnapCode (QR code) that the user needs to scan through his Smartphone. After scanning, simply enter the amount to be paid and password. User’s accounts are directly linked to their bank accounts. Merchants who use it don’t even need a bank account, they can redeem their payments at Standard Bank ATMs or certain supermarkets. The SnapScan is completely free at user’s end while it charges a small amount to merchants. The company has 3 products. First - an “instant merchant product” for the retailers. Second - a “standard” product that works similar to a traditional POS (point of sale) unit. Third – “Enterprise solution” product for integration with already available POS units. SnapScan has partnered with the City of Cape Town in order to make the parking system cashless. It also partnered with WumDrop, a mobile-operated courier service, for providing an alternative option for payment. SnapScan has also announced the launch of SnapBeacons, which will enable users to pay via beacons that indicate their location.
40 / Technowize Magazine / February 2016
41 / Technowize Magazine / February 2016
Technopolis
Dwolla founder and chief executive Ben Milne
42 / Technowize Magazine / February 2016 2015
Dwolla Dwolla is the only e-commerce company in the United States that provides online payment system and mobile payment network. History: This Iowa-based company was founded by Ben Milne and Shane Neuerburg in 2008. Later, Dwolla was launched after receiving a funding of $1.31 million in December 2010. Why it’s Unique: Dwolla has created its own network from the scratch. Due to its own network, it can eliminate the hefty interchange fees charged by the credit card companies. Also, it can avoid the multi-day delay associated with the ACH, by providing an instantaneous transfer. Dwolla provides various features to customers from which they can make their customized payment solutions. Basic features are available for free while advanced features need a premium account. Dwolla includes various features like White label, MassPay, Recurring payments, Next day transfers and even Government payments. Dwolla has radically changed the digital payment services and is one of the most interesting startups when it comes to mobile payment services. It is a potential competitor for PayPal. So, do these startups indicate the end of cash? Maybe not. But it gives consumers more reasons than ever to ditch the physical wallet.
43 / Technowize Magazine / February 2016 2015
Trendsp otting
44 / Technowize Magazine / February 2016
Chief Marketing Technologist The Next Big Buzz in the Corporate World
45 / Technowize Magazine / February 2016
Trendsp otting Question: “Chief Marketing Technologists?” NAME: Blake Cahill POSITION: Global Head Digital Marketing COMPANY: Phillips He is unambiguous about the significance of understanding the current world of social and fast-paced mobile technologies. He says, being a marketer, if individuals are not able to comprehend those technologies and the way they are applied in use appropriately via suitable audiences, the lack of comprehension is going to make it incredibly difficult for them to perform their job well. And guess what? He’s right. It surely doesn’t surprise us anymore. As the world of technology is becoming more centralized to the role of marketing, many industries are now viewing it as a potential for a special profession, which can easily mend the gap between IT and marketing. Obviously, there are a number of people already applying the principles of technology in marketing for a variety of job descriptions such as digital strategy, growth hacking, marketing operations, conversion optimization, and so on. Perhaps, the concept is quite transparent that our age is witnessing the evolution of a hybrid breed amongst the category of professionals in marketing- The Marketing Technologists. It is very important that most businesses indulging into this latest trend underline the significance they tie to the job role by formally hiring a Chief Marketing Technologist. NAME: Scott Brinker POSITION: Co-Founder and CTO COMPANY: Ion Interactive Brinker has very wise thoughts to address this issue. According to him, a marketing technologist is a person with technical skills who designs and control solutions related to technology in the marketing service. The entire perception is not just about embedding services related IT sector with marketing. Great marketing technologists try to fathom the technological context. They are quite passionate about envisaging the potentials of marketing in the digital world. The CMTs help marketers from non-technical 46 / Technowize Magazine / February 2016
47 / Technowize Magazine / February 2016
K
Trendsp otting
48 / Technowize Magazine / February 2016
background craft better programs, customer experiences, and campaigns, which leverages data and software effectively. They help in the management of new variations in technical interfaces, which marketing has with service providers and agencies, mainly the sandwiched API layer. They are hybrids, who speak the language of both IT and marketing flawlessly and configure the bridge between these two quite naturally. Such profiles tend to facilitate change in the current world by emerging out of organizational silos. NAME: Jason Heller POSITION: Global Leader Digital Marketing Operations COMPANY: McKinsey Jason nods his head in agreement with Scott; he thinks Brinker’s words frame a great definition. He likes to consider a marketing technologist as an individual who holds the potential of mending a gap between marketing operations and consumer experiences. A person fit for the role of the CMT, according to Heller, is the one who can place a marketing technology that is effective by comprehending the ongoing variations in consumer market along with configuring the channels that experience growth and the reason behind it.
Tête–à–tête with Steve Hargrove Steve used to work in a marketing department of a multinational company. He was well-bred with immense knowledge of technology as he had a background in formal engineering followed by marketing as a major in post graduate studies. Life used to be simple for Steve. The company he used to work for had a marketing department for handling marketing and IT department for keeping a tab on information & technology. Suddenly Steve’s life took an unexpected 360-degree turn as his company chose to merge technology with marketing. Internal tech, External tech, and Product tech were entwined together. Following this collaboration, due to his exemplary skills, Steve was offered a position of CMT- Chief Marketing Technologist. This was a position he had never heard of before, so he began connecting the dots between marketing and technologies, “Was it a prince or a frog?” he wondered. But the end results pleased him, yes; the concept of technology and marketing are entwined, he concluded. Steve accepted his job role with utter delight and made three key missions to provide justice to his role. What were those missions? Well, it was to translate technology into strategy and vice versa, choreograph technological aspects and data across marketing 49 / Technowize Magazine / February 2016
Trendsp otting enterprise, fuse the DNA of tech into marketing concerning practices, culture, and people, and report to the CMO with brand new strategies. Technology now-a-days is the pillar of the latest era of marketing. Neither every technologist is a marketer, nor is every marketer a technologist. The position of chief marketing technologist requires a set of special skills, which Steve had in oodles. This set of skills involves social and mobile platforms, marketing software, digital advertising collaboration, website design, and data and analytics. So, the question arises, “What made Steve a perfect employee to fit the description of a Chief Marketing Strategist?” The answer is, first, he was well equipped with the knowledge of IT, marketing, and engineering skill set. So, his employers saw him fit for the hybrid position. Second, he was a pragmatist and an early adopter of the latest marketing and technology skills, and third, he could easily define markets, fascinate, acquire, and effectively retain clients. The person fulfilling the job role of a chief marketing technologist must develop an agile environment, which can rapidly respond towards variations of technology and ever-evolving demands of customers.
The New-Age Hybrid Uproar in ‘Tech-Mark’ It is fascinating now-a-days to watch these hybrid professions of marketing technologists originate from the digital star forge. It is a phenomenon, which we should anticipate more often in The Second Machine Age. While on the theoretical level it is a bit of thought-provoking concept, watching it transform into reality is rather a breathtaking phenomenon. The transformation reveals the amount of our dependency on the past patterns of marketing and technology to determine our belief in the future, which is, unfortunately, a misconception in such fast-evolving world. After going through the current marketing landscape, people often seem to ask, “How does it make a sense for marketers?” - They have a CMT to fill the role in their company. The hybrid role of a Chief Marketing Technologist is growing extremely popular. It is a part technologist, part strategist, part creative, and most above all of this, it is a job role equivalent to a CIO and a CTO. 81% of the gigantic enterprises with an annual turnover of no less than $500 million have a job role of CMT in their work culture, out of which 50 / Technowize Magazine / February 2016
51 / Technowize Magazine / February 2016
Trendsp otting
52 / Technowize Magazine / February 2016
71% just started hiring a year ago, and the remaining 8% are preparing for the addition of a hybrid role in their company within next two years. As the gossip around the latest roles ‘marketing technologists’, seems to have increased over the last few years, many individuals have been skeptical about it. This is mostly because they probably haven’t heard about such hybrid job roles before. Many times, recruiters would search the title or similar variations for chief marketing technologists on LinkedIn, would find a few or none, and declare that such candidates are so rare that the situation could be almost acknowledged as statistically unrecruitable. Individuals often ask, “How does Marketers fit into this type of technology equation?” the simple answer to the question is, EVERYWHERE. As the days are passing by, technology seems to have become inseparable from the dynamic world of marketing. Due to this, all marketers, including yourself, if you are one, must adapt this sudden boom by transforming into more customer-centric and data literate technologists. In a progressive manner, marketers understand, customize, and engage in brand experiences for potential clients through technology. Now, as the technology is advancing consistently, the silos between social, marketing automation, data, SEO, digital advertising, and email need to be torn down. If such situation occurs, a channel-based and a consolidated technology will appear, resulting in content stacks. These integrated stacks will be used by marketers to prioritize their clients, and offer the most unified and personalized possible brand experience. To take the reign in their dominant hands, marketing technologists need to transform themselves into an expert with capabilities on how to integrate and operate elements in these technologies. Along with becoming data-literate, marketers need to identify the track of metrics and larger marketing operations, since the data resides amid the technology stack, and most importantly, it is the language, which technologies use to communicate with each other.
Mythical Creatures ‘Marketing Technologists?’ Absolutely not, as there people available with such job titles now-a-days. The skill set, experience, and the talent, which recruiters are looking for in a marketing technologist, surely exists. The entire generations of web entrepreneurs and developers have developed commingled abilities out 53 / Technowize Magazine / February 2016
Trendsp otting of desire and necessities. Most often they have a background in formal engineering followed by marketing or business graduate studies or experiences. Most of these individuals, perhaps via a web development project, search engine optimization, or an interactive agency, have already percolated in marketing. For many, the opportunity to face the challenge and tether their imagination and intellect to turbo-charge and unify the landscape of an enterprises’ marketing technology will be an inspiring and compelling mission, the one, which will eventually kick-start a moral cycle of attracting a large amount of talent to such job roles. In upcoming several years, marketing CTOs and marketing technologists could emerge as the hottest job profiles in the industry, which is good news for everyone. For technology vendors and external agencies, it is even great.
The Next Big Thing? In this age, by any means, the corporate world cannot afford segments between IT and marketing any longer. The rapid and sudden collapse of such silos signifies the fact that an individual must be able to manage both groups seamlessly. While there are CMOs that are desperately trying to get their arms around the technological aspect, the natural evolution for this job role is that a CIO should improve their marketing skills if they wish to grow into the role of a chief marketing technologist. Chief Marketing Technologist is surely the next big thing in future. “If you don’t have a chief marketing technologist, consider the evidence above and strongly evaluate the benefits of creating the role; increasingly only exceptional cases will be able to argue that they don’t need one.”GARTNER
54 / Technowize Magazine / February 2016
55 / Technowize Magazine / February 2016
56 / Technowize Magazine / February 2016
COVE R S TO RY The Future of Digital Payment Technologies: In a digital payment ecosystem eschewing the traditional checkout process, its EMV, Selfie or Biometric Payment altering our conception of mobile payments and how we use it.
57 / Technowize Magazine / February 2016
58 / Technowize Magazine / February 2016
COVE R S TO RY Companies like In the 2002 Spielberg movie, “Minority Report” Tom Cruise’s character wanders through a future timeline where merchants know who he is and alter their advertising messages accordingly. Cruise’s character, John Anderton, pays for the good purchased using a payment system that uses facial recognition to link a customer with his or her bank account. While biometric technology is still in at a concept stage, the payments community has already started experimenting with it.
PayPal has
According to a 2014 TSYS online survey of 1,000 consumers who owned both a debit card and a credit card, 43 percent of Americans preferred debit card purchase, compared to 35 percent who chose credit card purchase, and just 9 percent chose the cash. With an increase in the current volume and composition of non-cash payments and the rise of mobile payment technology, finding an alternative security standard to replace the traditional passcode has never been higher.
computer chip
designed a range of biometric solutions, including ingestible technology, vein recognition, and tattoos that could potentially replace the password.
Companies like PayPal has designed a range of biometric solutions, including ingestible technology, vein recognition, and computer chip tattoos that could potentially replace the password. PayPal is just one industry expert among many focused on biometric security. In the digital payments sector, could secure authentication solutions involve brain implants, heartbeat monitors, vein recognition to assert our identity, be the latest innovation? Or, will it be ingestible authentication devices that could contain batteries powered by stomach acid, and silicon chips embedded under our skin or an edible verification system? Member companies of the FIDO Alliance, including Samsung and Qualcomm are building a secure protocol that can be used as authenticators to keep our data safe. It’s based around a single idea - all value is placed on the 59 / Technowize Magazine / February 2016
60 / Technowize Magazine / February 2016
COVE R S TO RY While fingerprint transaction that happens in the front end, where an individual asserts their presence through a biometric identifier so there is no backend system where hackers could tap into. Although there is no such 100% safe security practice, fingerprint scanning offers a much convenient approach to add to the security. Several lab tests have also shown copying of fingerprints off device to get access.
scanning has been used for years to provide secure access, biometric sensing is only just getting explored for digital payments
While fingerprint scanning has been used for years to provide secure access, biometric sensing is only just getting explored for digital payments via mobile devices. In just a few years, it will become as commonplace as fingerprint sensing.
via mobile devices.
In 2013, a Finland based company, Uniqui, created a payment system using military-grade algorithms where an individual would take their photo and within seconds the tablet at the check-out station would process their biometrical data to locate the customer’s account within the database that registered with all major credit cards. The system supposedly reduced payment transaction time from an average of 30 seconds to less than 5 seconds.
fingerprint sensing.
In just a few years, it will become as commonplace as
For the selfie generation, MasterCard tried out a new technology that lets shoppers authorize a transaction with a selfie. A two-month pilot program began in October last year, in which more than 200 employees of the First Tech Federal Credit Union in the U.S participated. For companies like Apple, Google, and Facebook, peer-to-peer payments are a way to get a bigger slice off the payments market. While, venture backed-startups such as Venmo, Stripe, and Square’s SquareCash are drawing more and more people with their products and encouraging them to leave their wallets at home. A combination of factors – structural in some 61 / Technowize Magazine / February 2016
62 / Technowize Magazine / February 2016
COVE R S TO RY measure, user experience in other – that is driving the next and a global digital wallet adoption. Today, investment is poured into fintech startups, where a majority of technology companies – Facebook, Google, Apple, Amazon, and Samsung- are entering into the consumer banking sector with digital payment apps. According to CB Insights, the investment in retail banking startups across the world rose to a whooping $6.8 billion in 2015. The amount is more than triple the $2.2 billion in 2014. A majority of financial institutions has started taking initiative to address the new reality in the global consumer banking sector. The Bank of America, BB&T, Capital One, JP Morgan & Chase, Wells Fargo, and U.S. Bank teamed up in 2015 to form a secure real-tile payments network called ‘ClearXchange’. It lets individuals make payments to anyone in realtime, making funds transferred instantly available in the recipients’ bank account. The unique technology has coalesced fraud, risk and authentication assets to ensure customers can send money securely in realtime via financial institutions.
For companies like Apple, Google, and Facebook, peer-to-peer payments are a way to get a bigger slice off the payments market.
“KILL ALL PASSWORDS” Jonathan LeBlanc, Global Head of Developer Advocacy, PayPal While the digital payments space is still fragmented without a definite market leader, the payment systems and currencies that we have now been either limited or universal. The payment industry is going to need to exterminate the limited usability, keep users engaged, as our infrastructure catches up with deep-rooted payment methods. The lack of universal technology standard, incongruent interests of stakeholders, and poor user experience has severely limited widespread adoption of mobile payments technologies. 63 / Technowize Magazine / February 2016
64 / Technowize Magazine / February 2016
COVE R S TO RY Google’s recent However, that is all to change. By 2017, we will have digital payments leaders in place. Digital payment systems are promising, they could help the government run efficiently and track down unaccounted for cash in the form of floats in registers and pockets. It would help economists and statisticians analyze the movement of money in real time, analyze patterns that show the causes of the next economic meltdown, bubbles, and even poverty. Governments could save money too. Each year, the U.S. Bureau of Engraving and Printing spends over $650 million printing new notes. The cost of minting coins as well as mining rises up to $2.9 billion. Moreover, $260 million is lost to counterfeiting of notes. In a digital payments world where cash is replaced by one’s and zero’s, the convenience is only expand and the crimes shall shrink.
moves with Softcard from AT&T, Verizon, T-Mobile, and Samsung’s purchase of Loop Pay suggest the future of digital payment technologies is arriving fast.
Google’s recent moves with Softcard from AT&T, Verizon, T-Mobile, and Samsung’s purchase of Loop Pay suggest the future of digital payment technologies is arriving fast. A perfect convergence of contextual realities has helped with rapid evolution of the digital payment technologies. The October 2015 deadline for retailers to upgrade to a much secure Europay Mastercard and Visa (EMV) enabled POS terminals, the all-pervasive presence of Near Field Communications (NFC), and several breaches in 2014-2015 led millions of business into driving towards a newer, safer payments systems. Today’s financial institutions want to remove seemingly vulnerable information out of the merchants hands and new EMV POS terminals that are compatible with NFC technology. Today, security and user experience have become one of the key deliverables in digital payment technologies. Apple Pay and Google Wallet have created a unique card number tokenization technology along with fingerprint biometrics as well as on-device storage. None of this methods involve 65 / Technowize Magazine / February 2016
66 / Technowize Magazine / February 2016
COVE R S TO RY In the years ahead, we’ll see several hardware, a replicate software, or integration. As a matter of fact, Apple has appealed to all major credit unions and banks by offering a very private, simply, secure, and fast way to pay. It is currently working with 11 credit card issues and represents 80% of the U.S. charge volume. In the years ahead, we’ll see several dominant players in the market straddling across the smart phone business, financial institutions, and mobile operating systems articulating and paving the way for next generation payment technologies. This could be the beginning of what we could call a ‘digital payments technologies’ war and not simple the end of antiquated payment systems. What other payment technologies have you heard about? How do you think consumers will respond to the latest digital payment technologies?
dominant players in the market straddling across the smart phone business, financial institutions, and mobile operating systems articulating and paving the way for next generation payment technologies.
67 / Technowize Magazine / February 2016
Hardware, inc.
The Hardware Revolution The modern world can also be regarded as the one with ‘Computer Revolution’, where, in developed countries, one can hardly find a single household without a PC. Such computing devices are now seen as a solution to every class, which an individual seeks nowadays. Was life much better before these various hardware systems marked their existence in our routine? Well, the answer is a subject to various
68 / Technowize Magazine / February 2016
contradictions, but we might add that these made our lives easier. Rapid advances in the field of technology have gradually decreased the price and size of hardware nowadays while increasing the capacity and performance significantly. The electronics industry is marketed with hundreds of innovative hardware and sold ensuring the ‘Innovative Hardware Boom’ in the upcoming years.
Evolution of Hardware
69 / Technowize Magazine / February 2016
Hardware, inc.
Evolution of the First of Hardware Several hardware systems better known as the analog computers were developed in ancient and medieval times to carry out astronomical calculations. The mechanism includes ancient Greece’s (150–100 BC) ‘The Astrolabe’ in and the ‘Antikythera’ that is known as the first computer hardware system. The complex computational hardware that included programmable
cart and automata were made by Hero of Alexandria (10–70 AD). Other earliest versions for hardware include ‘Planisphere’ by Abu Rayhan al-Biruni (AD 1000), ‘Latitude-Free Astrolabe’ and ‘Equatorium’ by Abu Ishaq Ibrahim al-Zarqali (AD 1015), and the Su Song’s ‘Clock Tower’ for astronomical calculations during the Song Dynasty (AD 1090).
History ‘N’ Mystery of Hardware Travels Long Back? The Millennium, 2400 BC The history of hardware travels a long way, from the developments of basic calculation devices such as ABACUS, which was discovered and used by the Babylon Empire in 2400 BC to modern day’s powerful computing platforms such as Apple MacBook Pro, Surface Pro, etc. Devices have been in a constant use since thousands of years to aid the computation, mostly
70 / Technowize Magazine / February 2016
via fingers. A frame of TALLY STICK was probably the earliest calculating device, which was used by our progenitors. Later the record evolved to calculi throughout the Fertile Crescent consisting of cones and clay spheres that represented counts of grains and livestock. COUNTING RODS are another example.
Blaise Pascal- The Inventor of PASCALINE
71 / Technowize Magazine / February 2016
Abacus
72 / Technowize Magazine / February 2016
Hardware, inc.
Before the dawn of the 20th century, manual work was done for almost all calculations. The first aids to such computing platforms were an absolute set of mechanical devices that required manpower to set up and manipulate the calculating device for carrying out a set of elementary operations involving arithmetic. The mechanical calculations consistently maintained its trend until the requirement of a more generalized and precise system was needed for complex calculation mechanisms.
This necessity brought an end to the era of basic computation and unveiled a fresh breakthrough of the series, namely the integrated circuits and miniature transistor computers, which ultimately caused analog computers to be replaced by the almighty digital computers. This gradually went on and on, until the price of such computing platforms became so low that PCs, tablets, and the smartphones became ubiquitous.
The 17th to 19th Century, ‘1614-1872’ Advancements in Hardware Invention Scottish physicist and mathematician John Napier invented the first ever hardware for logarithms known as ‘Napier’s bones’, which was a device like an abacus to simplify calculation to solve complex divisions and multiplication problems. The tradition was carried further transformed by Welsh mathematician, astronomers, and geometer Edmund Gunter. At the University of Oxford with a single log scale, Gunter invented a computational hardware that simplified
complex arithmetic calculation a level higher, including tough divisions and multiplications. In 1622, English mathematician William Oughtred invented the ‘Slide Rule’, following Napier’s ‘logarithms’ and Gunter’s ‘Logarithmic Scales’. Oughtred also invented the ‘Circular Slide Rule’ in 1630 and the ‘Modern Slide Rule’ a combination of both slider rules in the year 1632. The year 1623 also witnessed the invention of the mechanical calculating device
73 / Technowize Magazine / February 2016
Hardware, inc.
by a German Polymath, Wilhelm Schickard. Blaise Pascal started working on computational hardware in 1642, and over 50 prototypes and an effort of three years, he invented ‘Pascaline’, a mechanical calculator by which complex divisions and
multiplications could be solved by repetitions. Finally, after great decades of evolutions, the year 1872 marked the invention of the first ever contemporary analog computer hardware, by William Thomson and later Lord Kelvin. It was a ‘Tide-Predicting’ machine.
The 21st Century, ‘2016’ CES’s Whirlwind Romance with Hardware With more than 15,000 attendees and a floor space of 2.4 million sq. feet, CES 2016, the Consumer Electronics Show turned out as the largest CES in the history. The trade show is already known as the biggest on earth for launching and showcasing the greatest and the latest developments and products in the world of technology. This year at CES witnessed a plethora of hardware systems. We’ve all managed to see just about everything a perfect show for latest hardware launches could’ve possibly entertained us with.
74 / Technowize Magazine / February 2016
A huge volume of people from all over the world had an immense pleasure of coming across the Dodging Robots, ‘Everything Smart’ Home Automation, Ducking Drones, Cannonlake ‘N’ Icelake Processors, Curie, VR Headsets, and what not? This year, the companies left no stone unturned and unveiled the best of hardware systems in the world, leaving everyone struck with something or the other, which stood out in the ocean of sameness that Consumer Electronics Show can be.
75 / Technowize Magazine / February 2016
The Campus Network Room
76 / Technowize Magazine / February 2016
Oculus Rift VR Headset
Hardware, inc.
Next-Gen Hardware Models in Line Where Innovative Technology Powers the MovementHardware Intel Core M Compute Stick
rely only on PCs. With high precision and elegance, this chip has been designed to efficiently fit in any size of the wearable present, large or small. It utilizes an Intel Quark SE System of 32bit on SoC chip, and will be available for sale earlier in the first quarter of this year. The coin-sized chip module arrives with a complete packaging of the software platform, which includes IQ software kits by Intel to make the creation of applications faster and easier.
With Cannonlake Processor, the Chipzilla moved beyond the realms of the ‘quad-core’ technology. The company is trying to lure aficionados to purchase its latest motherboards powered by the latest Skylake 4+4e processor. The chip manufacturing giant’s itsy-bitsy PC-on-a-smallstick concept managed to grab the attention of millions of PC enthusiasts from all over the world. The two latest computing sticks, which can be plugged into monitors or TVs powered by sixth- Jaunt VR generation core processors-M3 and One of the most promising hardware, M5 beefed up with vPro. it is not a product for everyone to buy. Jaunt VR is a massive and a Intel Curie professional-grade virtual reality ‘Small, yet powerful’- This should camera for broadcast recording and serve as a tagline for this mini monster business of movie making. It arrives of technology driven by creativity. By with camera modules of 24 HD, each introducing the concept of the coinequipped with 1-inch sensors carrying sized chip, Intel Curie, the Chipzilla is HDR and global shutters. The global trying to prove that it no longer has to shutters in the VR gadget, record
77 / Technowize Magazine / February 2016
Hardware, inc.
entire scan lines at a single take, which results in distortion free effect while recording objects in swift-motion. This camera gives a yet another hint that the market of virtual reality is a serious business and it travels way beyond just gaming. So far the start-up campaign has managed to raise $100m.
Omni AiO A major trend that sparked through the CES 2016 was the concept of all-in-one PCs that includes liquid-cooling, potent performance, and full-blown desktop based graphics card. Curvaceous Omni AiO by Origin PC is well-equipped with a Titan X graphic card worth $1000 and a Haswell-E processor of core8. It is a customizable and the most powerful high-performing desktop in the world. Packed with liquid-cooling of Origin FROSTBYTE and expandable with NVIDIA GeForce GTX TITAN X (12GB) or another NVIDIA QUADRO Workstation GPU it is a hardware that is fully upgradable to the platform of Mini-ITX with Intel Core i7 5960X or an Intel XEON E5-2699 v3 processors. It adorns a stunning Curved Display of 34” 3440 x1440 QHD (21:9).
78 / Technowize Magazine / February 2016
HTC Vive Pre While donning the virtual reality headset, HTC Vive, it is easier to believe that you are actually underwater watching a shark swim by, but the tech giant has now decided to make it simpler to snap out of the world of virtual reality, without the need of taking off the headset equipment. HTC introduced the biggest feature into its VR headset, the Front-Facing Camera, which allows an individual to replace the virtual world with a “Chaperone mode” full view of the surroundings. The latest iteration comes with two VR motion controllers and two base stations-Lighthouse, in addition to the VR headset, which will be responsible for tracking your movement across the room. To top that, one might need compulsorily 15x15 foot area to get the full room experience of HTC Vive.
Tri-Band Router The Tri-Band router by TP-Link is a one of its kind product available in the market so far. Considering how networking is a significant element in the ecosystem of the PC nowadays, this particular router has caught our eyes. The Talon
Intel Curie- Small,Yet the most powerful chip of 21st century
79 / Technowize Magazine / February 2016
80 / Technowize Magazine / February 2016
Hardware, inc.
AD7200 has been the first ever tri-band hybrid router with operating frequencies of 2.5GHz, 5GHz, and 60GHz respectively. It comes with a massive bandwidth of 802.11ac/802.11ad. The huge bandwidth can be considered as a boon for streaming video from the entertainment center over home theater system’s one side to the other side of
a video projector. The WiGig tri-band router has a great speed of 7.2Gbps and the hub of this router features an array of 8 antennas equipped with high-powered amplifiers, which supercharges the signal of a Wi-Fi to ensure the connectivity of devices at all time.
Nitty-gritty for the Near Future The future of computing hardware looks highly fragile due to issues amid hardware and software engineers. The time is gradually coming when the software can no longer keep up with the hardware material, as the demand for material might be decreasing when the software is gaining priorities. One thing is for sure that the hardware can never be eliminated entirely, as the market will always demand a hardware that is more comprehensive, more coherent, faster, and lighter. Having said that,
we cannot deny the fact that, arguably, the hardware industry can never hire the amount of job roles that a software industry does currently due to the intense requirement and advancement in software technology, which is related to technology equipment. For all we know, the market of hardware is and will continue its mission of generating latest applications, which will eventually make a business thrive for more and lives easier.
81 / Technowize Magazine / February 2016
F uturist
Cut, Sni
Genome modification gives power to world of life-sciences, where research with god-like power, it brings bo 82 / Technowize Magazine / February 2016
p, Snap!
o people, unpredictable power. In the hers could conjure engineered humans oth excitement and trepidation. 83 / Technowize Magazine / February 2016
F uturist
84 / Technowize Magazine / February 2016
The unprecedented Asilomar Conference of 1975 in California’s Monterey Peninsula on Recombinant DNA Molecules opened floodgates for gene splicing and gene editing. Ironically, no such advancements into altering of human genes exist today that could have revolutionized the treatment of human diseases. Crispr/Cas9 is a molecular scissors that edits DNA. The unique tools has taken the world of biology, literally, by storm. Today, if not hundreds of labs use Crispr/Cas9 to create everything, from supermuscled pigs to creating transgenic monkeys to snipping HIV genes out of infected cells. A three-year old, highly-cited paper describing Crispr/Cas9 has created such a hype in the world of science that the unique tool is not the center of a bitter patent fight. All the furious hype and the patent war aside, what is genome-editing? How the protein Cas9 unzips a strand of DNA, how it slips in the particle that guides it to a target—lastly, how it goes clip cut on the DNA. The power of Crispr/Cas9 is its ability to do this all so precisely and dependably. In what capacity would you be able to consider something to be little as a protein in any case? For a considerable length of time, that has implied wheedling proteins to develop into crystalline forms. Researchers then shoot X-rays through the stone, and the diffraction design illustrates the protein’s structure. Today, interestingly, a study in Science drove by Crispr/Cas9 pioneer Jennifer Doudna uses that system to catch the structure of actuated Cas9, in the minute it’s prepared to cut DNA.
85 / Technowize Magazine / February 2016
F uturist
86 / Technowize Magazine / February 2016
Knowing how Cas9 functions in such brilliant sub-atomic way matters in light of the fact that while the framework is useful for editing genes, it is not great. It cuts the wrong extend of DNA. Once in a while it doesn’t cut the stretch it should. Bits of knowledge from the new study could prompt “more proficient configuration of Cas9 mutant with high specificity,” says Osamu Nureki, a biologist at the University of Tokyo who has also worked on the structure of Cas9. Indeed, even without knowing the structure of dynamic Cas9, researchers have as of now begun altering the protein. Such is the pace of Crispr/Cas9 research, which has blasted following the primary paper to demonstrate its DNA-altering potential in 2012. As researchers have rushed to utilize the framework to adjust pigs, mosquitoes, mice, and even in one case, nonviable human fetuses, others have been venturing at improving it—so great that it could one day be utilized to cure diseases in people. The huge hang up is specificity. Cas9 finds its objective with the assistance of an aide RNA, an atom whose letters pair up with the objective DNA succession. Rarely, however, the aide RNA sets up with arrangements it doesn’t coordinate impeccably—the off-target issue. In December, a team led by MIT and the Broad Institute’s Feng Zhang, another Crispr pioneer, changed the particles in a groove of Cas9 that holds DNA to enhance specificity 25-fold for specific sites. Zhang and fellow Broad researcher George Church have ventured into creating a strategy to battle off-target mutations, as well. Cas9 is regularly compared with a pair of scissors, yet it’s really two sets of
87 / Technowize Magazine / February 2016
F uturist
88 / Technowize Magazine / February 2016
scissors intertwined, each of which cuts one of DNA’s two strands. Zhang and Church have transformed Cas9 to limit one of those scissors, so it just cuts one strand. Presently you require a second Cas9 with second guide RNA to cut the second strand, because with redundancy comes less bloopers. The drawback is that these single-scissor Cas9s can at present scratch DNA independently and cause potential mutations. So yet another team led by Harvard’s Keith Joung have intertwined the guide RNA-tying a portion of Cas9 to the scissors of another a DNA-cutting protein called FokI. Not just do you require two FokI-Cas9 to cut an entire bit of DNA, however the two individual cross breed proteins need to consolidate into one super protein before either will cut DNA, so you don’t get any abrasion either. In any case, what happens on the off chance that you limit both of Cas9’s scissors and don’t give it any replacement? That is where things get truly interesting. Jonathan Weissman, a biochemist at the University of California, San Francisco, and partners including Doudna have intertwined that dead Cas9 to atoms that can turn genes on and off. Each cell in your body has the same genome, yet the epigenome turns genes on or off to transform skin cells into skin cells or cerebrum cells into brain cells. Cas9 has been an extraordinary tool for building the genome. The dead Cas9 is extraordinary too to engineer the epigenome. Weissman calls the system Crispr-i or Crispr-a, and his partners are using it to control the activation of genes in mice.
89 / Technowize Magazine / February 2016
F uturist
90 / Technowize Magazine / February 2016
The system is useful for researching the ability of genes, yet it could likewise, possibly, be helpful for therapy. For instance, you may kill the genes for receptors that the Zika virus uses to enter human cells. The greater part of this research into altering Cas9 has rutted ahead while researchers are as yet making sense of precisely how the protein functions. With a higher determination sub-atomic guide of Cas9 now available, that work is just going to advance at a much greater speed. Its actual potential lies in curing human diseases. Pharmaceutical company labs have started to create Crispr-based research instruments, for example, cancerous mice—ideal for testing new chemotherapies. A research team at MIT, working with Zhang, used Crispr-Cas9 to develop mice with liver cancer, in not more than a couple of weeks. That sort of thing used to take over a year. Different research groups over the world are trying their hand at approaches to test drugs on cells with single-gene variations to understand why the drugs work at times and come up short in others. Zhang’s lab used the procedure to realize which hereditary genes make individuals impervious to a melanoma drug called Vemurafenib. The genes he recognized might give research new targets for drug developers. Because, the real money is in human therapeutics. For instance, labs are now venturing into the genetics of elite controllers, individuals who can be HIV-positive however never create AIDS. With the help of Crispr, they can thump out a quality called CCR5, which makes a protein that ushers HIV into cells. You’d basically make somebody
91 / Technowize Magazine / February 2016
F uturist
92 / Technowize Magazine / February 2016
an elite controller! Alternately you could use Crispr to target HIV; that starts to look a ton like a cure the world ultimately needs. On the other hand, you could figure out which genes make people susceptible to HIV generally. Ensure they don’t serve other, more key purposes, and after that “alter” them in an incipient embryo. It’d develop into a human insusceptible to the infection. Straight-out altering of a human embryo sets off a wide range of alarms, both in terms of morals as well as legality. It repudiates the policies of the US National Institutes of Health, and at any rate runs counter to the United Nations’ Universal Declaration on the Human Genome and Human Rights. Engineered humans are a courses off, not science-fiction anymore. Regardless of the possibility that researchers never attempt to design a child, the issues those Asilomar participants had four decades ago now appear to be significantly more judicious. The world has changed. In 1975 nobody was asking whether a genetically modified vegetable should to be welcomed in the kitchen. Nobody could test the genes of an unborn baby, or grouping all of them. Today swarms of investors and companies are hustling to put up genetically built creations for sale to the public.
93 / Technowize Magazine / February 2016
THE NERDIST 94 / Technowize Magazine / February 2016
Any insanely cool, incredibly innovative Raspberry Pi project?
Q
I have a geeky/nerdy buddy that I’d like to do something nice for. Some of the things I think he’ll absolutely love are Star Wars cufflinks or R2D2 Bluetooth Speakers. I’ve got a spare Raspberry pi 2 model kit and plans to build something kickass. Now, we’ve built together miniature furniture, props, and worked on so many projects that I’m totally clueless about what ‘something new’ could I give him. My biggest question is this: I was thinking of making a lighting controller to light models with LED’s if that’s possible? I’m a bit lost here. What are some other cool project that I could work on to make the miniature set more lively? Any help or pointers would be greatly appreciated!
A
A lighting controller for miniature sets, props, or furniture would be cool. You can even use an image of the entire floor plan to control which rooms will be activated and when and how. You can even make your gui interface to control the gpio
pins, that would ultimately switch on and off your lights. You may even chose to take things further by associating ambient sound tracks and sound effects. Tip: In order to separate the power on the pi from the lights, you can scale up to 220V. If you’re going to associate sound track, use a couple of wires and clever software to broadcast
95 / Technowize Magazine / February 2016
THE NERDIST
96 / Technowize Magazine / February 2016
straight from your Pi to your mobile device using FM radio signals. The official Raspberry Pi offers some great tips on how the GPIO works.
with server hosting webpages or even games such as Minecraft that can turn large external HDrives into a network attached storage!
You can also a miniature networking field. You’ll need significant power to make it work, and occasional connectivity. Use the pi as a media service, or a home streaming device, or a router with options such as Tor and network-wide ad remove, or even a print server. In fact, this could also work together
You can also build a one-button thermal printer that would give you update on the weather. Again, for this, you’ll need to connect to the Internet and print from quite a few sources. The kit is available from Adafruit that would allow you to print the weather, or even tweets from people you follow on Twitter.
If you’re going to associate sound track, use a couple of wires and clever software to broadcast straight from your Pi to your mobile device using FM radio signals.
97 / Technowize Magazine / February 2016
App Labs ‘Tis the battle of the apps on the grounds of politics For any democratic nation, people are at the centre of the system. Only through people’s vote, the outcome of any election is determined. But a lot of people don’t vote either because they do have enough time to learn about the candidates or because they are not sure who to believe. Fortunately, there are many apps available which can keep you updated with all the information regarding the U.S. Presidential elections of 2016. These apps will inform you about the candidates and different political parties. They also allow you to keep your opinion and make your vote count in the 2016 presidential election and beyond. Whether you are a Republican or a Democrat, you cannot come up with an excuse for being in the dark about political affairs anymore, due to these Smartphone apps. More than a dozen candidates are running for president. Here is the list of candidates running for the presidential election 2016: 66 Republicans: Jeb Bush, Chris Christie, Ben Carson, Ted Cruz, Carly Fiorina, Mike Huckabee, Rand Paul, Jim Gilmore, John Kasich, Macro Rubio, Donald Trump, Rick Santorum 66 Democrats: Hilary Clinton, Martin O’Malley, Bernie Sanders 66 Third Party: Gary Johnson, Jill Stein An informed citizen is really valuable from a social viewpoint, so every American with a Smartphone should have one of the following Election apps and use the power provided by the constitution. 98 / Technowize Magazine / February 2016
99 / Technowize Magazine / February 2016
App Labs Voter Picking a candidate can be really tough, especially when you don’t have enough knowledge about each running candidate. As a result, you probably end up voting the most talked about candidate for your party. Voter app is to the rescue. All you need to do is answer a few questions in “Yes” or “No” by swiping left or right and this app will tell you which candidate has similar opinions as yours. Various speeches, records, public stances and finances are analyses for each candidate and the result is displayed on your screen. This app is similar to the dating app - Tinder; it will help you meet your dream election candidate within a minute. May be political leaders might not like this app, as they want to vote on the basis of their projected persona, rather than their stance and records.
Voter app is to the rescue. All you need to do is answer a few questions in “Yes” or “No” by swiping left or right and this app will tell you which candidate has similar opinions as yours.
100 / Technowize Magazine / February 2016
101 / Technowize Magazine / February 2016 2015
App Labs
102 / Technowize Magazine / February 2016
2016 Election Central Staying updated with all the news on a busy schedule might be tough. One has to go through several websites and apps to do that. But, Election Central can be a one-stop shop for you if you wish to stay updated with all the campaign activities. It has a list of electionrelated news, which can be sorted according to your preference. It also provides a platform where you can discuss your opinions and participate in many debates. It delivers all the primary information like the schedule of election. It also notifies you with debate schedule and videos. If you need every detail, well-organized in a single place, this app is the one for you. This app is available for free on Android and iOS platforms. However, this app may get on your nerves with ads popping now and then, as there is no pro version available to get rid of the ads.
This app is kind of a political blog or you can say vlog.
103 / Technowize Magazine / February 2016
App Labs Crooks and Liars The name itself suggests that this is no boring politics app. Crooks and Liars has a sense of humor and is not limited to the presidential election news. This app is a general political app, but under its Latest news section, it covers all the recent updates about the presidential election. This app is kind of a political blog or you can say vlog. Crooks and Liars was the first to feature video blogs or vlogs. This app is frequently updated with news and notifies you with it if and only if you keep the notifications on. It also provides you with the podcasts to listen to (if that’s your thing). But, this app usually has a tendency to redirect you to some external source to read the complete news story. So, if you don’t mind being redirected frequently and want some general updates on politics along with the election news, this could be the app for you.
104 / Technowize Magazine / February 2016
Crooks and Liars has a sense of humor and is not limited to the presidential election news.
105 / Technowize Magazine / February 2016
App Labs
106 / Technowize Magazine / February 2016
RANQ Shift Interactive created RANQ with the help of IBM’s supercomputer Watson and Bluemix development platform. This app ranks candidates on the basis of real time Twitter discussions. Sentiments are always linked with people, may it be positive, negative or neutral. And somehow, politics always bring out people’s sentiments. This app will rank the running candidates on the basis of people’s tweets. It includes all the running candidates from the Republican as well as the Democratic party. You can also sort updates for a single party which you follow. “Sentiment rating” of people’s tweets are calculated by Watson using complex algorithms. Users can view which candidate is trending on a particular day by clicking on a specific candidate. Tweets related to candidates are also visible to the user. You can narrow down the ratings from nationwide to your specific state.
Sentiments are always linked with people, may it be positive, negative or neutral. And somehow, politics always bring out people’s sentiments.
107 / Technowize Magazine / February 2016
App Labs Countable Countable is an app that will allow the users to present their opinions on a general issue. It will also keep you informed regarding the arguments for and against the subject. Countable lets make your opinion count and let you track the congressional representatives. This app makes it easy to understand the actual legislation. It will provide you with the tools that will enable you to see how the elected officials vote. It discusses all the issues and policies that affect the daily life of citizens. This app is a must-have if you want to search for the candidate who has a similar opinion as yours and is willing to solve such issues. Countable is also accessible on the Web, if you do not want to download the app.
Countable lets make your opinion count and let you track the congressional representatives. This app makes it easy to understand the actual legislation.
108 / Technowize Magazine / February 2016
109 / Technowize Magazine / February 2016
110 / Technowize Magazine / February 2016
App Labs
Sidewire To wrap things we’ve got Sidewire app. This app gives the updates straight from the horse’s mouth. You can get information directly from the campaigns, elected officials, journalists, and political experts. You may wonder that this app will make it worse to pick the candidate as most of the candidates are biased, hopefully not. This app will probably provide you with the unfiltered bias from the running candidates. Sidewire has gathered more than 100 political journalists, candidates, analysts, campaign managers and some elected 111 / Technowize Magazine / February 2016
112 / Technowize Magazine / February 2016
App Labs officials who curate the content on the platform. If you have used above-mentioned Voter app, this app will be a lot relevant to you. Matchmaking with the candidates based on your opinions is surely something you shouldn’t miss. This app is currently available on iOS platform. Additionally, there are many apps from the running candidates, which are used as their official campaign app. For instance, Rand Paul 2016 app allows the user to take selfie with Rand Paul, also they can share the details with their friends regarding the campaign. They can also play some arcade game in which they have to blast campaign logos of other candidates. Ted Cruz also has his campaign apps for iOS and Android platforms. It might be possible that you come across some biased campaigns or platforms, but have your opinion and stand for it. Some apps may allow you to know your friend’s opinion, but make sure your vote is not influenced by anything. Presidential election or App election? With all these apps available, you first need to pick your app before picking your candidate. 113 / Technowize Magazine / February 2016
tech tech ed ed Compliance in Office 365Ž: Data Governance About this Course In this course you will learn how to outline, implement, and administer Data Governance. Day by day, as organizational data saved in documents and emails continues to grow, Complaince in Office 365 makes it easier for you too control the data, which you want to store, as well as manage the information flow out of your organization. Office 365: Data Governance covers all the measures to effectively outline and control data leakage and data retention. This is a second course in the series of courses that concern Complaince in Office 365. By taking this course, you will gain the knowledge of data retention and archiving capabilities of Office 365 and prevention from data leakage. Key Benefits of the course Learn Office 365’s registration and retention architecture. Implement the registration and data retention specifocation of Office 365 Implement prevention for data leakage in Office 365 Understanding the knowledge of archiving and retention for organization Prevention from data leakage Learn troubleshooting of typical archiving issues in Office 365 Starts: February
Effort: 3-5 hours/week
Institution: Microsoft
Course Fee: Free (Add Verified Certificate for $49)
Length: 4 weeks
Subject: Computer Science Languages: English
114 / Technowize Magazine / February 2016
The Software Architect Code: Building the Digital World About this Course This is an introductory course, which aims to help you in discovering and developing software talents in you to succeed in the digital world. Improve your software capabilities and skills from a perspective of software innovation. This is the era of digital world with presence of software everywhere. Software knowledge is very crucial, considering every industry is involved with it. In this course, you can learn the necessary skills required to develop a software. You will learn how people from various professions can collaborate in order to develop an innovative software. Here you will learn the most significant activities required for developing an effective software services and products to keep up with future demands. Key Benefits: Learn the skills required to succeed as a software architect and a software architect. Understand the role of a software architect. Learn the significance of collecting all essential user requirements and employing the “Do it yourself� technique to plan and create software pieces Explore the software testing and design activities addressing the new challenges of tech-focused times Understand new interaction paradigms, creativity and design methods that move the focus from the software to the humans who use it Starts: February 16, 2016
Effort: 3-5 hours/week
Institution: Microsoft
Course Fee: Free (Add Verified Certificate for $49)
Length: 4 weeks
Subject: Computer Science Languages: English 115 / Technowize Magazine / February 2016
tech tech ed ed Cyber Surveillance and Security
About this Course Understand the growing tensions of laws related to national security and privacy, and the inhibiting consequences of this fight for our networked world. once declared as the ultimate vehicle for self-expression and open communication, the internet is rapidly turning into a world-wide networked device for surveillance. Some serious threats towards national security, along with the endless ability of digital storage and processing, have led to various stages of data capture and continuous monitoring of activities of an individual, which were totally unimaginable over a decade ago. This course will help you in taking an active part in the issue of resistance towards the rise of such practises. You will learn about laws related to personal, commercial, and national security and privacy in the online environment postSnowden. Key Benefits: Learn the extent, purposes and effect of global networked surveillance technologies Learn the nature and the consequences of cyber wars and cyber-activism Learn the issues involving the online security and surveillance Starts: February 22, 2016
Effort: 2-3 hours/ week
Institution: AdelaideX
Course Fee: Free (Add a verified certificate for $50)
Length: 6 weeks
Subject: Computer Science Languages: English
116 / Technowize Magazine / February 2016
Information and Communication Technology Accessibilty About this Course In this course, you can learn how to measure a business’s information and communication technology accessibility and evaluate the significance of mainating a workplace that is inclusive for both customers and employees with disabilities. This is a 6-week course module, which consists of detailing basic ICT accessubility hindrances faced by an organization nowadays. In this course, every module is taught by an expert-through activities, discussion forums, and content-rich videos. No matter what your profession is, this 6-week course wll help you to analyze needs related to ICT, identify accessibility issues, and evaluate solutions. Key Benefits: Foundations of ICT accessibility. Principles of accessible ICT design. Identify the uses of assistive technology. Create accessible documents and multimedia. Evaluate and repair websites for accessibility. Identify components of ICT accessibility operations.
Starts: February 29, 2016
Effort: 2-3 hours/ week
Institution: Microsoft
Course Fee: Free (Add a verified certificate for $50)
Length: 6 weeks
Subject: Computer Science Languages: English 117 / Technowize Magazine / February 2016
tech tech ed ed Computional Geometry
About this Course In this 16-week course of computer science, learn and explore geometry, learn geometric algorithms, and develop geometric thinking. As the importance of geometric version of Algorithmic Analysis and Design is increasing, Computational Geometry is now considered the basis of computer aided manufacturing, computer aided design, robotics, and geographic information systems. Key Benefits of this course Awareness of Computational Geometry will help you use Computational Geometry into future research Comprehensive understanding on fundamental strategies for solving geometric problems, plane sweeping, and incremental construction. Learn geometric structures and algorithms such as polygon decompositions, Delaunay triangulations, and Voronoi diagrams.
Starts: March 29, 2016 Institution: Microsoft Length: 16 weeks
118 / Technowize Magazine / February 2016
Effort: 8 hours/week Course Fee: NA Subject: Computer Science Languages: English
Enabling Technologies for Data Science and Analytics: The Internet of Things About this Course In this 5-week course, you can learn about the relationship between the Internet of Things and Big Data. In this course of Data Science, you learn about the major elements in the IoT world and the way how data is extracted from the sensors. You will learn to examine techniques for analysing sentiment analysis, data generation from devices, event data, and facial recognition software. This is the final course in the Data Science and Analytics XSeries Key Benefits of this course: Networks, protocols and basic software for the Internet of Things (IoT) How automated decision and control can be done with IoT technologies Discuss devices including sensors, low power processors, hubs/gateways and cloud computing platforms Learn about the relationship between data science and natural language and audio-visual content processing Study research projects drawn from scientific journals, online media, and novels Review fundamental techniques for visual feature extraction, content classification and high-dimensional indexing Techniques that can be applied to solve problems in web-scale image search engines, face recognition, copy detection, mobile product search, and security surveillance Examine data collection, processing and analysis
Starts: February Institution: Microsoft Length: 5 weeks
Effort: 7-8 hours/week Course Fee: FREE (Add a Verified Certificate for $149) Subject: Data Analytics and Statistics Languages: English 119 / Technowize Magazine / February 2016
Tech Events & Tradeshows 09-11 February 2016 SAE 2016 Hybrid & Electric Vehicles Technologies Symposium The Hybrid & Electric Vehicle Technologies Symposium, organized by SAE will take place from 09-11 February 2016. The symposium will address significant information on business decisions around development, implementation, and technology. It will also address on the technical developments in hybrid and electronic vehicle technology. Additionally, it offers a chance for attendees to network with technology specialists and industrial experts from various supply chains. The attendees will learn about power train components and technologies, technology applications from the hybrid and electric vehicles manufacturers, along with supporting technologies such as charging systems and advanced energy storage.
Venue: Disneyland Hotel | Anaheim, California, USA
12 February 2016 ISE 2016: AV & IT Seminar Program The AV & IT seminar program, organized by ISE will take place on 12 February 2016 from 10:00 to 14:00 in room G104 of the Amsterdam RAI. The objective of the seminar is to examine how IT and AV convergence effects traditional understanding of installed networks and the requirement for increase operational and technical expertise for professionals operation under these sectors.
Venue: Amsterdam RAI | Amsterdam, Netherlands
120 / Technowize Magazine / February 2016
13-18 February 2016 Developer’s Conference + Festival 2016 Developer’s conference and festival 2016 will take place from 12-18 February 2016. It is a series of tech event that consists of Workshops, Conference and Expo, and Hackathon. Join over 1200 developers and designers developing mobile apps and new web within a week-long sponsored Hackathon. Enroll in educational skills tracks, where you can take half-day, full-day, or workshopbased course on hottest developer skills.
Venue: Pier 27 | San Francisco, California, USA
15- 18 February 2016 TechAdvantage 2016 Conference and Expo TechAdvantage 2016 Conference and Expo will take place from 15-18 February 2016 in New Orleans, LA, USA. It is a four day conference with leading-edge strategies and best practices developed to share and demonstrate advantage in technology and science, along with other industrial fields. It is the leading tech conference designed exclusively for electric cooperative professionals engaged in C-level, IT, operations, marketing decision making, engineering, and purchasing and supply.
Venue: New Orleans, LA, USA
121 / Technowize Magazine / February 2016
Tech Events & Tradeshows 21-23 February 2016 Gartner CIO Leadership Forum The Gartner CIO Leadership Forum, organized by the Gartner Events will take place from 21-23 February 2016 in Phoenix, Arizona. This event is a must attend for CIOs. It is created exclusively with direct input of more than 2,800 best CIOs. Explore the most critical technology, business, and critical leadership strategies according to today’s CIOs and engage with various CIOs.
Venue: Phoenix, Arizona
21- 25 February 2016 InterConnect 2016 InterConnect 2016 will take place from 21-25 February 2016 at MGM Grand and Mandalay Bay in Las Vegas, United States. Get the most of out of your existing investments with hands-on training in mobile and cloud solutions built for security, powered by cognitive, and equipped with advanced analytics. Start by building and designing a customer-driven, and a truly cognitive digital experience.
Venue: MGM Grand and Mandalay Bay | Las Vegas, NV, USA
122 / Technowize Magazine / February 2016
24- 25 February 2016 Travel Technology Europe Travel Technology Europe will take place from 24- 25 February 2016 in London, United Kingdom. This event is one of its kinds specializing in software for the travel and hospitality industries and technology systems. The topics for discussions include Innovation, Promotion, Acceleration, Disrupt, and Experience to engage today’s tech, social, and mobile savvy travelers.
Venue: Olympia London | London, United Kingdom
02- 03 March 2016 Gartner Enterprise Information & Master Data Management Summit Gartner Enterprise Information and Master Data Management Summit, organized by Gartner Events will take place from 02- 03 March 2016. This summit is the most premier destination for information management professionals around the world. It is designed to address all maturity levels, delivers the best practices, insights, and frameworks across the IM topics to help control data and improve business value dramatically.
Venue: London, United Kingdom
123 / Technowize Magazine / February 2016
Tech Events & Tradeshows 10 March 2016 Marketing and Tech Innovation Summit The Marketing and Tech Innovation will take place on the 10th of March 2016 in New York, USA. The summit will focus on possibilities when technology is harnessed by marketers. The summit will address how conventional, collaboration with technologists, and cutting-edge technologists are used by marketing teams to improve business performance and innovate in marketing.
Venue: New York, USA
15- 16 March 2016 The Wearable Technology Show 2016 The Wearable Technology Show 2016 will take place from 15-16 March 2016 in London, United Kingdom. The WTS 2016 is the largest show featuring various edge-cutting technologies under one roof. It is the best and biggest forum for forming new partnerships and developing new businesses across the IOT, wearable and smart device landscape. The show will consist of over 200 speakers from tech giants like Bosch, Samsung, Microsoft, Siemens, etc, more than 6,000 delegates, and 300 people from press, to exchange view, establish networking, and do businesses. The conference showcases technologies across a multitude of fields including – smart home, healthcare, fashion, fitness, performance sports, enterprise, augmented reality and presents visionary speakers working within the industry to discuss the future of wearables, smart technology and IOT.
Venue: Excel | London, United Kingdom
124 / Technowize Magazine / February 2016
29- 31 March 2016 The Linux Foundation Collaboration Summit The Collaboration Summit 2016, organized by The Linux Foundation will take place from 29- 31 March 2016 in California, USA. It is an exclusive gathering where the thought leaders from various parts of the world in open source software and collaborative development meet to share best practices and learn how to manage the largest shared technology investments of our time. This is a place where open source technologists and business leaders can advance their company’s strategy based on an open source.
Venue: Resort at Squaw Creek, Lake Tahoe | California, USA
09 April 2016 The Women in Tech Summit The Women in Tech Summit will take place on the 9th of April 2016 at the Chemical Heritage Foundation in Philadelphia, USA. The summit will focus on education, empowerment, connections, and inspirations for women in technology. The Women in Tech Summit is the only women in technology conference that provides attendees with a unique combination of deep-dive, hands-on tech workshops; information and discussions about careers in tech and how to pursue them; and connection and networking opportunities with other women in various aspects and careers in technology. The Women in Tech Summit knows that working in tech is not just about coding but about all aspects of careers in technology. The conference works to bring together women in many different types of careers in tech and at every level from students to senior executives.
Venue: Chemical Heritage Foundation | Philadelphia, USA
125 / Technowize Magazine / February 2016
Tech Events & Tradeshows 12-13 April 2016 Cloud Expo Europe Cloud Expo Europe will take place from 12-13 April 2016 in London, United Kingdom. It is the best place to discover the newest and upcoming business solutions and technologies. Be inspired by real practitioners from blue chip companies and over 500 top experts. Access a record 500 edge-cutting suppliers.
Venue: Excel | London, United Kingdom
27-29 April 2016 GiGse GiGse will take place from 27- 29 April 2016 in San Francisco, USA. It returns with a transformed agenda, rich in digital content and breaking through political boundaries and traditional regulatory. Venturing into newer horizons, the event will focus on immersive millennial content and innovative tech developments by integrating largest North-American operators with the flourishing start-up community. This event provides the perfect setting for technology entrepreneurs and mends the gap between North America digital transformation and iGaming.
Venue: San Francisco, CA, USA
126 / Technowize Magazine / February 2016