www.technowize.com
1 / Technowize Magazine / May 2015
MAKE SURE HE NEVER RUNS OUT OF BOOKS TO READ WWW.TRAVELINGSTORIES.ORG
$10= BOOKS 3 TO A KID IN NEED
TWITTER.COM/TRVLINGSTORIES
INSTAGRAM.COM/TRAVELINGSTORIES
OUTSMARTING POVERTY ONE BOOK AT A TIME
FACEBOOK.COM/TRAVELINGSTORIES
Editor’s Note February 2015
T
he year of 2014 was a memoir masquerading our fear and hatred of mass surveillance and dismal state of digital security. It wolfed-down data breaches, leaks, hacks and software vulnerabilities in one sitting, leaving an unsparing reminder that pretty much everything digital we own is fundamentally flawed and insecure. With cyberspace entering as the next domain in warfare, it raises a tantalizing question - what would be the future of warfare? With the rising threat of cyber-attacks and espionage activities in the hyperconnected world, it is imperative that governments and corporations take significant security measures to prepare for the smart technologies and the Internet of Things. Our cover story, “The Achilles Heel of Internet of Things,” explicitly examines the serious issue of cyber adversaries that needs to be dealt with sooner or later. The myriad
daily attacks over the past years is a constant reminder of how smart technologies have become 21st century warheads. The invisible cloak of anonymity on the internet has not only given cybercriminals a sleigh to ride on a path that undermines integrity, but also profligacy and debauchery in the form of incendiary rhetoric as a mainstay of public discourse. Anonymity breeds uncivility. Haute Money, unfolds a Calif.-based artificial intelligence startup’s quest to structure the deeply unstructured fostered by anonymity that is home to an internet full of outliers and trolls, and many more interesting stories. Plunge in. For globetrotters who are constantly on-the-go, Technopolis offers a cornucopia of gizmos and gadgets in myriad shapes and sizes to enhance your travelling experience. Trendspotting shows why uncategorized, unmanaged and unknown data – Dark Data – that 3 / Technowize Magazine / May 2015
is widespread in most companies, represents abundant opportunities. Futurist plays with the idea of how one significant invention, the “motion microscope”, could help see the unseen. Hardware, Inc., talks about the most recent addition that has created a spark in the tech community. Described as “Etsy for electronics,” this new amazing platform is designed to sell open-source hardware. It is a
community marketplace for hardware creators and aficionados to share creations and interesting hardware finds. We hope you like the mix. Happy viewing, and reading! Like always, we welcome your comments. You may reach us at editor@technowize.com or Editor Technowize, The Fastest Media, 3651 Lindell Road, Suite 320D, Las Vegas, NV 89103.
Like always, we welcome your comments (facebook.com/Technowize, @ technowize on Twitter). You may reach us at editor@technowize.com or Editor - Technowize, The Fastest Media, 3651 Lindell Road, Suite 320D, Las Vegas, NV 89103.
4 / Technowize Magazine / May 2015
5 / Technowize Magazine / May 2015
Content Features
76
Motion Microscope
012
Venture Capital Firms set up a Mighty War Chest for 2015
022
Sematic Web comes closer to Reality
044
Dark Data, finding its way into the spotlight
042
Brighten Up your Camping experience
086
Bento, the app matchmaker is the new talk of the tech town
6 / Technowize Magazine / May 2015
010
Haute Money
028
Technopolis
054
Cover Story
074
Diary of a Technopreneur
086
App Labs
092
Tech Ed
098
Tech Events & Conferences
66
HARDWARE, INC., TINDIE, A DIY HARDWARE HOBBYIST HEAVEN
60
Smart Devices the 21st Century Warheads 7 / Technowize Magazine / May 2015
The Team Editorial Anna Domanska, Editor-in-Chief Christy Gren, Sub-Editor Riana Petanjek, Sub-Editor Priyansha Mistry, Sub-Editor Aubrey Chang, Associate Editor
Design Kevin Paul Sr. Grahpic Designer
Project Management Tony Raval Project Director Jay Raol Project Director
8 / Technowize Magazine / May 2015
Marketing Jason Miller, Sr. Project Director
Advertising Richard Dean, Advertising Manager
96
Technology John Hancock, Head-Web Department Le Manh Coung, Sr Sofrware Coordinator Julia Hunt, Magazine Production
Finance Control R R Baratiya
114
9 / Technowize Magazine / May 2015
10 / Technowize Magazine / May 2015
Haute Money Bringing you the latest cult coverage straight from the tech world - find out about people and companies defining the cutting edge of technology and shaping leaders of the future: entrepreneurs coming from situations set against the backdrop of humble environments.
11 / Technowize Magazine / May 2015
Haute Money
Venture Capital Firms set up a Mighty War Chest for 2015
12 / Technowize Magazine / May 2015
To outbid rivals to invest in the hottest unicorns, venture capital firms are raising gasp-inducing funds, amid early signs of ‘valuation bubble’, involving startups with no revenue and sky-high valuations. In April 2015, Menlo Ventures closed Menlo Ventures XII at $400 million, giving it more resources to cast a wider net to catch startups with the potential to reach valuations as high as $10 billion. Second in line, New Enterprise Associated finished raising $3.1 billion in new capital, capping off a year’s worth of fund-raising. Of Menlo Ventures twelfth fund, $15 million has been earmarked to go into ‘Talent Fund’ for concretely in seed-stage startups. The rest of the fund will be evenly split between consumer and enterprise businesses. Of the new capital, NEA said the $2.8 billion of assets is locked for its 15th investment fund, while the rest, $350 million will be for the Opportunity Fund. The $2.8 billion is said to be the
largest VC fund in history. Over the last few years, Menlo Ventures has invested in unicorns Uber, Dropcam (acquired by Nest), Roku, Warby Parker, Gilead Science and Siri, the voice-driven assistant in Apple’s iPhones and iPads. Among the NEA’s portfolio companies with billion dollar valuation includes WorkDay, MongoDB, and Tableu Software. In the year of 2013, flagship social network, Facebook, Inc., crossed that threshold. In 2014, at least eight startups, including Uber the ride-logistics/hailing startup worth $41.2 billion, reached whooper valuation higher than the market capitalization of more than 70% of Fortune 500 companies, thanks to the indomitable spirit of entrepreneurs and the unwavering support of partners. Both the VC firms relentlessly continue to add entrepreneurs in-house who can incubate companies. The question is, will these firms be able to find the next Uber and Warby Parker?
13 / Technowize Magazine / May 2015
Haute Money
14 / Technowize Magazine / May 2015
For those keen to
feel the chill of Holograms Remember the good old days when paper maps were a necessity in many walks of life? A decade ago, they were replaced by the fancy GPS unit. Today, it is the navigational system in your smartphone and smartwatch. Three years into the future, and it’s going to be AI technology in the cybernatically thrilling self-driving cars. One of the latest pieces of hi-tech to enter the fray is Navion, from Swiss startup WayRay, hoping to help humans navigate the roads more safely, before we’re all chauffeured around the town by autonomous cars. The Navion is a small, head-up display device that sits on the dashboard and projects holographic GPS imagery onto the windshield, besides providing safety notifications and navigation information. The navigation directions resemble the arrows projected on the road in Xbox games like Forza Horizon.The device
responds to simple hand gestures, and integrates with smartphones to give access to email, social networks and the phone when the car is stopped. In the past, a few automakers have discussed the possibility of integrating a feature like this, but there’s little evidence that it is market ready. While on the subject, in a recent study conducted by J.D. Power, it was found that consumers are not so enthusiastic when it comes to hand gesture technologies that can help in controlling their vehicles. WayRay will begin mass producing holographic images at its base in Switzerland. Vitaly Ponomarav, founder and CEO of WayRay, came up with the idea of using the windshield as surface to improve safety using holograms, and spent more than two years in research and development in Switzerland. The Navion could be fantastically useful. It is expected to go on sale in the fall.
15 / Technowize Magazine / May 2015
Haute Money
16 / Technowize Magazine / May 2015
High Court Mulling Lawsuits over Personal Data Google, Facebook and other internet companies are eyeing a critical case that involves class-action lawsuits under the Fair Credit Reporting Act. Following lawsuits, could a gaping hole worth billions of dollars in the pockets of some of these internet giants. The Supreme Court will reach an epoch making decision on whether websites and other firms that accumulate personal data can be sued for publishing erroneous information even if those inaccuracies don’t cause any real harm. This, unravels after an unemployed Virginia resident sued Spokeo, after viewing a profile on him that was filled with inaccuracies. As per his claims, the inaccurate data on the website damaged his job prospects. The Virginia resident is currently pursuing a class action lawsuit against the internet company on behalf of thousands of other plaintiffs who agree that Spokeo publicly published inaccurate data about them. An appeal from Spokeo.com will be heard by the justices. Spokeo. com is an internet search engine that collates publicaly available information on people and lets subscribers view it, including age, address, marital status as well as economic health. According to a ruling by the federal district court, the man had no right to sue due to the fact that he hasn’t suffered any real harm. However, the 9th U.S. Circuit Court of Appeals reversed, stating that Spokeo had in fact violated the Fair Credit Reporting Act. If a class is certified, Spokeo could face damages of $1,000 per violation under the FCRA, adding up to billions of dollars. The Fair Credit Reporting Act is intended to keep credit reporting agencies from accumulating inaccurate data that could possibly jeopardize an individual’s ability to pass employment background checks or get loans. The lawsuits could come off as hairsplitting for consumers who would sue over misleading data, costing companies millions of dollars. 17 / Technowize Magazine / May 2015
Haute Money
18 / Technowize Magazine / May 2015
Is Apple’s minimalistic attitude towards MacBook worth the price? The first round of reviews for Apple’s new MacBook, echoes unanimous concerns about its price and lack of ports.The featherweight MacBook Air with a high-resolution display is very pretty to look at, but it’s not something that Apple aficionado should buy right now. The new MacBook, although $300 more expensive than the cheapest MacBook pro available in the market, has quite a few weaker specifications and seems impractical and difficult to use. In its quest to go minimalist, Apple has eliminated a bunch of ports. The new MacBook comes with only one USB-C port and a headphone jack. The USB-C port is designed for charging the computer. One cannot transfer files using the good ole USB stick. Unless, one has an adapter to connect video cables and plug a zillion accessories, it’s going to be a tough time choosing between charging and accessories. Apple flogs the idea that users would rely in wireless technologies such as Wi-
Fi and Bluetooth instead of physical plugs. Sadly, there are a lot of accessories that cannot be plugged into the laptops wirelessly, such as external hard drives, external monitors and external memory cards. In its zeal to create a supermodel thin and extravagantly thin notebook, Apple has assembled a waferthin keyboard and trackpad. As a result, keys depress very little, moreover, the touchpad is almost painful to use, thanks to its similarly shallow depth. In a lot of ways, the new MacBook is much alike the MacBook Air which was launched way back in 2008. It was underpowered, had minimal ports and very little storage. Although, thin, beautiful and light, it was also expensive compared to other laptops at that time.Two and a half years later, Apple improved everything, right from design to its battery life, presenting the MacBook Air, which is today one of the best laptops in the world. Perhaps, the new MacBook is Apple’s window into the future?
19 / Technowize Magazine / May 2015
Haute Money
The Future is Bright. The Future is Microsoft Continuum One of the most riveting aspects of Microsoft’s Build Developer Conference was Continuum, a new Windows 10 feature, designed to keep all your devices in sync. In an onstage demo, Joe Belfiore, VP of Operating Systems, plugged in a phone to a monitor, keyboard and mouse and started using it like a laptop. The IU instantly adapted to the new inputs and outputs. Everything looked so much PC like that it had people dreaming of the endless promises that one single device could conjure. Continuum presents unfathomable possibilities – connecting to computers on our wrists, pockets and every imaginable place and device on this planet. Wish to watch a movie? Right away, just put on your Virtual Reality goggles and you’re on! This, is the blueprint of the future where technology is ostentatiously pervasive. Microsoft Continuum is much-much bigger than Cortana or HoloLens. It is the key to making one single, small device much more powerful, and Universal apps, is the pathway to it. Microsoft is offering new developer tools to develop one single app that can run across all devices for every kind of user. It looks like Microsoft’s long-term plan is to be ready for whatever industry-changing innovation comes after smartphones and tablets. It’s already one step ahead by encouraging developers to build for devices such as VR goggles and giant tablet screens. If Microsoft is right, at every stop, one will have access to all of their apps and services such that they’ll be perfectly suited for whichever mode one is in.
20 / Technowize Magazine / May 2015
21 / Technowize Magazine / May 2015
Haute Money
22 / Technowize Magazine / May 2015
Sematic Web comes closer to Reality Protected by the shade of anonymity, online comments and reviews sections on websites and forums has the ability to breed both, the most incisive string of comments and the foulest bile to Darth Vader proportions. While anonymity on the internet fosters participation and creative thinking, it also encourages uncivility. Diffbot, a Palo Alto, CA-based artificial intelligence startup and creator of visual learning robot technology broke new grounds in its quest to structure the deeply unstructured internet full of trolls, outliers and the flamers. Diffbot’s new Discussions API allows “branding executives, developers and media monitoring companies to monitor every conversation on the web the same way they monitor Twitter.” Currently, developers have to put down a bunch of scrapers for various sites they wish to monitor. These scrapers are simply expensive and a burden to maintain. Diffbot’s new developer tools can help developers and companies unearth negative reviews and comments from forums and threads on-the-fly to address it. Businesses can monitor their brands, keywords and products, analyze and identify trends and extract the more valuable part of the internet. It’s one of those developer tools that will help find rare and constructive comments on sites like YouTube that condone the nastiest of internet trolls. Discussions API indexes data from platforms such as Disqus, Blogger, Intense Debate, Facebook and Wordpress. It’s no small feat as some of these sites are JavaScript-based, making it even more difficult to crawl. Its technology automatically identifies the structure in the data it crawls, which includes author, data as well as discussion content. It’s going to be particularly interesting to see how companies use the API to unearth trends and sentiment analytics connected to the upcoming presidential election cycle. 23 / Technowize Magazine / May 2015
Haute Money
Alibaba is now competing on Amazon’s Home Turf in the Cloud Amazon.com, Inc., flexed earnings of $1.57 billion for its cloud computing arm, Amazon Web Services in its first quarter this year, suggesting that it is far ahead of rivals in cloud computing business. But it looks like, AWS will soon have to leave its spot on the throne for a rival from the Far East. Chinese e-commerce giant, Alibaba recently announced that the opening of its data centers in China, after opening its first overseas foray in Silicon Valley. Aliyun, the cloud computing business of Alibaba Group has more than 1.4 million customers in China via data centers in Hangzhou, Beijing, Hong Kong, Shenzhen and Qingdao, compared to $1 million customers of AWS in North America. Moreover, Alibaba’s own cloud is relatively younger and far more enormous than Amazon’s. Analysts estimate the value of cloud computing industry to be over $150 million. While Amazon laid the groundwork for AWS nine years ago, it faces stiffer competition from Microsoft, Google and others. Alibaba just happens to the newest and the smartest name on the list. For a company, with the biggest IPO in history, migrating operations in Silicon Valley is a no-brainer. By offering its services to companies that are already cloud-savvy, it is trying to gain a foothold in a boldly steep climb against Amazon in its own home turf.
24 / Technowize Magazine / May 2015
25 / Technowize Magazine / May 2015
Haute Money Corporate Cybersecurity Teams Venturing into Uncharted Waters A former cybersecurity advisor to Presidents Obama and Bush has ventured out a new startup that will help some of the largest corporations in the world anonymously share cyber-attack information. The cyber-attack report sharing platform will help cybersecurity teams report anything – from emails that try to spearphish data from executives to much more sophisticated attacks on data servers. Paul Kurtz’s new startup, TruStar is an anonymous cyber-attack report sharing platform. The startup aims to provide intelligence on hack-attacks happening worldwide, and to share intelligence that can help companies and government
26 / Technowize Magazine / May 2015
agencies defend their systems. In October 2014, TruStar received a nod from the Justice Department with the rider that the company’s subscribers do not share competitively sensitive information. TruStar’s clientele includes companies from various sectors such as IT, finance, transportation, and commercial services. One major challenge the startup faces, stands out like a sore thumb – it is difficult convincing secretive corporations to share their information on hack attacks with their rivals. Albeit, in early 2015, President Obama asked large corporations to share information on cyber-attacks with each other post Sony’s hacking saga. TruStar hopes to be on the crest of this wave. But, before that, TruStar will have to assure hundreds of potential clients that anonymous sharing of information about hacker attacks is indeed a blessing in disguise.
27 / Technowize Magazine / May 2015
Technopolis Gadgets for the globetrotter Getting everything together for your backpacking adventure can be terrifying. Worse still, it can cost you a fortune. The endless list of gadgets aiming to enhance your travelling experience is mind-blowing, albeit not quite as ostentatious and meant specifically for travelers. Whether you’re making your way by train, plane, automobile, or even your own two feet, no trip is perfect these days without digital accessories. Technology has become so advanced that it will leave you truly amazed, scurrying to make additions to your Christmas lists as we put the IT back into globetrotting, rolling and tramping. From the latest technology helping to sort itineraries and getting your bus and train tickets in order to handy gadgets for translation or keeping your smartphone or tablet charged up, we’ve rounded up a few travel-oriented technologies that come in myriad space-saving shapes and sizes, for frequent jetsetters below.
28 / Technowize Magazine / May 2015
29 / Technowize Magazine / May 2015
Technopolis
30 / Technowize Magazine / May 2015
Wrap Stove and Vertigo Venturing in remote locations with harsh environmental conditions? No worries about flames extinguishing during dry and windy times or those tedious ordeals of refilling gas in ordinary portable burners. With this compact induction cooking stove that is Wrap Stove you can easily heat pots and pans by wrapping it around them using tiny magnets in the sleeve that help it cling onto the cooking vessel. This looks so much like a rolled up towel that wraps around any sort of cooking pan and switches on only when the end tab is folded and the temperature is set via a touchscreen. On the other hand, Vertigo is kind of like a microwave you can take mountain climbing because of how it can make cooking so easy. All you got to do is pour some chili or soup into a container and press the button that activates a sensor-triggered LED light indicating when the food or beverage you’re cooking has reached its optimum temperature. Since camping is an equivalent to cramping, the Wrap Stove scores beautifully in the portability division and takes up very little space in your bag. So next time when you find yourself red with hunger in the middle of a jungle while camping, remember to carry these handy items with you that will heat the food up for you so you can devour without much hassle.
31 / Technowize Magazine / May 2015
Technopolis Wrist Mosquito Repeller Gadget Are you a particular target of the bloodsuckers? Don’t these mosquito-repellent wristbands look like they’d be supersmart for everything including camping, fishing, gardening and mountain climbing? After all, who wants to glisten with a shimmer of sweaty, chemical bug spray during outdoor activities? The Wrist Mosquito Repeller gadget completely masks your entire body in a cocoon of protection. How does it work? The Wrist Mosquito Repeller gadget keeps mosquitos away without smelly oils or chemicals, with most of us assuming it uses ultrasound technology to block out the smell of carbon monoxide; the primary reason why mosquitoes get attracted to you. Viatek Mosquito Shield contains peppermint, pine and lavender to prevent people from having too many welts on their arms, legs and chest. Wouldn’t it be wonderful if this clunky bracelet were all we needed to avoid a rash of itchy bites after spending time outdoors? Price - $19.95 for a 12-pack of colorful Viatek Mosquito Shield Bands
32 / Technowize Magazine / May 2015
33 / Technowize Magazine / May 2015
Technopolis
34 / Technowize Magazine / May 2015
Handspresso Wild Hybrid That image you have in your head of being unable to find a nice warm cup of coffee every morning throughout your travels, hikes and outdoor adventures? Scrap it. Here’s a good news for all the coffee addicts - the ultimate version of the machine portable espresso; the Handpresso Wild hybrid coffee maker for all those who find themselves as far up as 20 cars from the Starbucks drive-thru line when they need coffee more than anything else on the face of Earth. Handpresso has created a machine with maximum modularity and simplicity. It is lightweight, stylish and compact and follows you in the office, on vacation, weekend trip or traveling. How does it work? Make up the pressure to 16 bar, using a pump, just like in a bicycle. Add hot water (from a thermos or kettle), place the espresso of your choice and serve a high quality espresso! Long live caffeine. This works without batteries or electricity and will appeal especially to those consuming three cups of coffee and not being able to find a bathroom. So cheers to the cup. And the next. And the next.
35 / Technowize Magazine / May 2015
Technopolis Wi-Fi and USB cufflinks Today business is done as much on the road as it is in the office. This really begs the question as to who on earth would need to wear a set of wireless hotspot cufflinks while on the move? While we’re certain the wireless hotspot feature could come in handy on singular occasions, its utter novelty value would probably be what fascinates tech orientated customers to it. These cufflinks, perfect for a 007 movie, discretely provides its users with both a Wi-Fi hotspot and a 2GB mini USB. Ideal for business meetings on the go (or at the airport), these cufflinks are advanced and chic — and even beneficial for additional personal elegance. It should be specifically noted that one cufflink will be the wireless hotspot initiator, which can be connected to an online device, while the other is merely a 2GB flash drive. The cufflinks cost $250, which is crazy, but if you regularly purchase cufflinks, you probably have that kind of money in your cufflink budget. Interested in the idea of picking a set of these Wi-Fi cufflinks up for yourself? If you are then better head on over to Firebox’s website for a lot more information on how these modern cufflinks work, and where you will be able to order a pair of these for a whopping $250. Any takers?
36 / Technowize Magazine / May 2015
37 / Technowize Magazine / May 2015
Technopolis
38 / Technowize Magazine / May February 2015 2015
Water Purifier Bottle We don’t want to scare you from going anywhere, but bad water is the #1 cause of dysentery and parasite infection. Most of the travelers’ health problems are caused by contaminated drinking water, which makes carrying a water purification system necessary when traveling around. This is especially useful when venturing in remote locations with harsh environmental conditions known for their unsafe tap water. Fortunately enough, these days there are countless products designed to help us in such conditions. The cutting-edge CamelBak All Clear, for instance, is a stateof-the-art device capable of transforming almost any tap or contaminated natural water source into pure drinking water in just 60 seconds. The 0.75-liter water purifying bottle is furnished with rechargeable lithium ion batteries instead of regular traditional batteries, and uses UV light to neutralize viruses and bacteria. In short, this is an excellent way to save money on pure but less cost-effective bottled water and get safe drinking water while on the go.
39 / 39 Technowize / Technowize Magazine Magazine / February / May 2015
Technopolis Nemo Helio Pressure Shower After a day of ripping up waves, pounding mountain trails, safari-ing, zip-lining, or just nursing margs on the beach, we don’t even want to spell out why you would need a nice warm shower. We have scoured an amazing outdoor shower device that is the Nemo Helio Pressure Shower compact shower system that comes in a tiny and neatly nested kit, weighs less than a full Nalgene, and provides up to 7 minutes of steady and satisfying water pressure. Simply fill the bag with water, step on the foot pump a couple of times and voila! You have high pressured, warm (if left under the sun) water ready for that relaxing shower in the most unforgiving jungles. [$99.95]
40 / Technowize Magazine / May February 2015 2015
41 / Technowize Magazine / May 2015
Technopolis
42 / Technowize Magazine / May 2015
Brighten Up your Camping experience Get ready for the perfect, brightly lit camping party or a get together because we bring to you the BioLite NanoGrid that provides off-the-grid illumination. The system lets you daisy-chain multiple lighting units from a single power source, so you can cover up a larger area of the camp at night, while keeping your pack light. What’s more? The BioLite’s Camp Stove, a closed-fire portable stove that uses thermoelectric generation to turn heat into extra energy for charging gadgets. We know this couldn’t get any more cooler but while this one won’t be coming out until the beginning of next year, we have a feeling we’ll have the same kind of appreciation for the BioLite NanoGrid, the awesome miniature power grid for brightening up and charging gadgets on your campsite. Most importantly and interestingly enough, they are meant to be hung, maximizing the brightness around your camping area, so you can easily spot when you’re about to step on bear poo. Oh wait, you noticed it too late. Slated for availability in February, the BioLite NanoGrid system will retail for $99.95.
Research In Motion Limited (RIM) 43 / Technowize Magazine / May 2015
Trendsp otting
Enterprise D
Big D
Up-and-coming trends in Big Data technolog business revolution. From entrepreneurs to tec trends reinventing the world of technology.
44 / Technowize Magazine / May 2015
Dark Data is a
Deal
gy that is growing exponentially and driving a ch enthusiasts, all eyes are on these progressive
45 / Technowize Magazine / May 2015
Trendsp otting
Dark Data, a subset of Big Data has been finding its way into the spotlight. We live in the midst of an atmosphere of numinous, yet docile data revolution. Our bromides about big data say a lot about our penchant for it. A single, personal object like the smartphone epitomizes the synthesis of Herculean information. It reminds us that data is encrypted into the air we breathe. Our love for social conversations, for more privileged, inside information, pales before the colossal volume of data contained in the web. Top analysis firm IDC, observes that the world’s data is unprecedentedly doubling every two years. People are creating, sending and storing more unstructured content within documents and files including, email, social media, apps, filesharing, mobile and cloud storage. This information comes computationally from programs designed by us, frail human beings. Add a dollop of consumerism to it, and we’re ready to hail the Big Data taxi. Today, Big Data is measured in terabytes and petabytes; within a decade, even those numbers may seem quaint. To boot, the rise of the “Internet of Things”, has increased use of analytic and 46 / Technowize Magazine / May 2015
business intelligence tools to extract data from mobile and sensor devices to provide accurate support to consumers. At this rate of data production, it means that a vast pool of the data preserved for a number of standardized uses, comes to the end of the line when it is not put to immediate use. Such uncategorized, unmanaged and unknown data is widespread in most companies actively planning Big Data initiatives. Today, Big Data is measured in terabytes and petabytes; within a decade, even those numbers may seem quaint. To boot, the rise of the “Internet of Things”, has increased use of analytic and business intelligence tools to extract data from mobile and sensor devices to provide accurate support to consumers. At this rate of data production, it means that a vast pool of the data preserved for a number of standardized uses, comes to the end of the line when it is not put to immediate use. Such uncategorized, unmanaged and unknown data is widespread in most companies actively planning Big Data initiatives.
47 / Technowize Magazine / May 2015
Trendsp otting
Hidden Value of Dark Data Described as ‘Dark Data’, it represents abundant opportunity. Dark data is usually put behind retention programs, classification schemes and retrieval systems that companies rely upon to meet compliance liabilities, abate electronic discovery and ensure accurate decisions are made using relevant and accurate information. Huge data sets and registers in companies are steamrolled by evils such as Dark Data, apart from vulnerability and data protection for IT departments. The inevitable costs and risks of dark
48 / Technowize Magazine / May 2015
data meteorically rise during regulatory investigations and cybersecurity events. Although, Dark Data is not as twodimensional as it looks. Speciously considered as uneconomical and goodfor-nothing, it is quite the opposite. In today’s remotely connected marketplace, a business needs to innovate to radically optimize productivity, look for market opportunities and influence customers. The key to this, lies in Dark Data. Just like an overwhelming majority of the Universe is made of mysterious substances like
dark matter and dark energy, Big Data is surrounded by data that cannot be comprehended or seen. This data, offers the potential to shape the businesses of the future. One needs to extract the juice from Dark Data, to be able to fully understand it much better, and categorize it accordingly. Let’s look at the algorithm of spelling correction used by search engines. A few years ago Google significantly improved spell-checkers by integrating colossal databases of users’ self-corrections that previously utilized manual algorithms by digging the complexities of English language and the psychology of typing. Google’s new trick wouldn’t have worked
if it had used only a few user searches to create the algorithm. The search engine utilized a language model to find possible keywords and an error model to find possible errors, and combined them to suggest the best alternative. The most important ingredient to build something like this is data. Google took cues from trillions of web searches from millions of users, across 146 languages. A pure genius technique, it can now be rapidly applied to other languages outside of the vector with little manual labor. This is perhaps one of the hundreds of innovations driven by the sheer mass of data.
49 / Technowize Magazine / May 2015
Trendsp otting
50 / Technowize Magazine / May 2015
Dark Data in the Digital Era Businesses would have a very limited and inaccurate view of consumers, if they are not able to coalesce and ruminate data. According to McKinsey Research, a retailer using data to the full could increase its operating margin by more than 60 percent. Moreover, using data, services enabled by personallocation data could procure $600 billion in consumer surplus. Products like Google search and Siri heavily depend on data. Companies like Facebook and Google have shown, more data means innovative and better solutions to perennial problems. For instance, Cukier and MayerSchonberger’s book, elaborates how AI researcher Oren Etzioni developed Farecast (later sold to Microsoft, and now a part of Bing Travel) to scrap data from the Internet to make accurate guesses about whether airline fare would rise or fall. Dark data is the watchword of the year of 2015. It is a tagline for everything that is uneconomical and good-for nothing, although it is quite the opposite. A bank or retailer only looking at CRM or transactional information in order to target a customer with promotion is only seeing one part of the whole picture and probably understanding a fraction of the interests and preferences of the consumer. Immeasurably valuable data about who these customers are interacting with and what they’re saying on social channels, i.e. how they feel about brands, what they’re looking for, where they shop, their personal network, a recent customer service experience in a bar or a store, is left dark. For a lot of companies, the usual types
of unused data include website, mobile data and social media. Tech Goliaths like Google and Amazon bank on this kind of data to gain a foothold over consumer intelligence. In recent years, it has been observed that consumer-centric businesses with a strong footing on consumer intelligence have been able to gain a lot more customer data compared to long-established businesses like banks. This type of unstructured data generated from social media and web can hold an abundance of information on consumer’s browsing preference. For instance, social networking sites that detail particular consumers preferences, affiliations and interests, as well as mobile technologies, such as geolocation or mobile wallet applications that when pooled together, can help businesses target a buyer onthe-go. Basically, there are billions of data points circulating at any given point of time, which when used, can help companies attain optimal success. There’s another brilliant example of it - a digital wallet promotion that shows up on your smartphone for beer based on previous transaction data. However, you receive this promotion only after you’ve left the convenience store with a bag full of other items. The offer is going to be useless to you, to the store, the brand or your credit/debit card provider. However, if the card provider or the brand were able to properly use real-time data from social media channels, showing key terms like “Fourth of July,” or “Kegger on Saturday,” or geolocation data showing your location, then a well-timed offer would be relevant to you. 51 / Technowize Magazine / May 2015
Trendsp otting
52 / Technowize Magazine / May 2015
Dark Data for Action Driven Insights Companies are now starting to gain a competitive advantage by casting the spotlight on Dark Data. Data that was earlier abjured due to constraints related to traditional data management technologies intended to handle volume, variety and velocity. The growing spotlight on Dark Data has accelerated the adoption of new analytic tools and techniques that empowers new age businesses like Apple and Google to not only query their data in a more efficient manner, but also develop new queries that have never been considered previously. Amazon Web Services, IBM, Microsoft and Hortonworks have Big Data solution in place, like Hadoop. Although, a lot of times, it is not being maximized to its full potential. Companies need to start investing in consumer intelligence solutions that come off such massive databases in order to search, index and provide real-time assessments of consumer activity. More and more companies need to prepare a mobile wallet strategy, in order to meet their consumers on
their mobile devices. Moreover, transactions from web traffic and operational systems also need to be embraced. Businesses need to mix enterprise data that comes from classic sources such as CRM and ERP with other Big Data sources such as social media and web traffic. Relevant consumer data can help spur a sale. There will be 200 billion connected devices by the year of 2020. Such interconnectivity will lead to a volcano of data accumulation. In fact, in the coming years, data will be richer – it will be easier to use, accessible and widespread, helping create an opulent, single-customer view. Turning data – including dark data into actionable intelligence will help businesses race against each other by being more in harmony to the present and future needs of individual customers. Today, it’s not just about data, it’s more about people-process-technology elements that allow companies to use the data available to make insight-driven decisions.
53 / Technowize Magazine / May 2015
COVE R S TO RY
The Achilles Heel of Internet of Things Weaponizing the Wireless Spectrum
54 / Technowize Magazine / May 2015
T
he year of 2014 dialed up all our fear and hatred of totalitarian states, mass surveillance, dismal state of digital security, and purloined secrets splashed across the internet to boiling point. It was a year-long grimly hilarious play between hackers and technology companies displaying their hideously parodic version of privacy. If anything we learned about the so-called hackers, hacktivists or cybercriminals from the year of data breach, it’s this: they’re stepping up their game, and they’re lethal, very lethal. If only we could dust off our hands and go on our merry way believing it’s all gone forever. Sadly, some nightmares do not just disappear once we open our eyes. The year ended leaving a note of caution that everything digital we hold close to our hearts is piteously
vulnerable. Cyber security is a serious issue that needs to be dealt with sooner or later. The World Economic Forum in Davos, Switzerland hosted many controversial conversations, but, one that was subjective enough to evoke appreciation was John Chamber’s security-cyber warfare propaganda machine, which has now taken over the internet. The chairman and chief executive officer of Cisco Systems, warned that 2015 will be a stormy year for hack attacks on businesses in a world filling up fast with a cornucopia of devices connected to the internet in the so-called Internet of Things orb making security threat even more perilous. “You’re going to see every country, every city, every company, every car, every house, every wearable become digitized,” Chamber said.
55 / Technowize Magazine / May 2015
COVE R S TO RY
- John Chambers, Chief Executive Officer of Cisco
T
here are two types of companies: those who have been hacked, and those who don’t yet know they have been hacked. The reality is that there is no such thing as a trusted network or device, and oftentimes, people are the weakest link when it comes to threats entering an environment. Global vigilance and collaborative intelligence are crucial. A global dialogue among governments, society, and the private sector, can help create agreement on how to secure the Internet economy. The Internet of Everything can transform our world, but to create meaningful change, we must rethink how we are going to make sure everyone can capture opportunities in a secure way. We must do this in a way that strategically positions security as a growth engine not only for each individual business, but also for the global economy. If everyone in the global community looks at security as a common cause that can bring us closer together, then we can also move forward together to address the technological and economic problems of our world.
56 / Technowize Magazine / May 2015
Putting Cyber alongside Land, Sea, Air and Space
T
humbing through Edward Snowden’s revelation about NSA lambasting privacy gives future digital wars in cyberspace new weapons – smart devices and the Internet of Things. The Five Eyes Alliance community, a cooperation between the US, Britain, Canada, Australia and New Zealand is developing weapons of Cyber Warfare. These weapons can paralyze computer networks and infrastructure they monitor. Its potential targets include water supplies, factories, airports and flow of money. In his book @War: The Rise of the Military-Internet Complex, American journalist Shane Harris describes how some of Israel and America’s top hackers masterminded the Stuxnet worm, the first digital weapon. The virus was first discovered in 2010 when it ravaged Iran’s Natanz nuclear plant. The exploit was a turning point in the global military strategy chapter of the 21st century. The initial virus was delivered into Natanz through an employee’s thumb drive, proving that the weakest link when it comes to cyber threat is humans. Two years before the Stuxnet was discovered, a Turkish crude oil pipeline mysteriously exploded without triggering any sensors or alarms. Initially thought to be an accident caused by a mechanical failure, it was later found out by U.S. intelligence officials that hackers used the security camera system’s vulnerable software to infiltrate the pipeline’s surveillance
57 / Technowize Magazine / May 2015
COVE R S TO RY systems and valve stations, and super-pressurize the oil pipeline causing a fiery explosion. The real perpetrators of the cyber-attack remain a mystery, but the incident turned our attention to a not to be ignored acrimonious debate over cyber warfare and national security. Unable to exploit the computer network at a big oil company, hackers turned to the most unlikely place looking for vulnerabilities. They infiltrated the online menu with malware of a Chinese restaurant that was popular with its workers. When the employees browsed the menu, they remissly downloaded the code that gave the hackers an access to the company’s vast computer network. The captivating story was covered in a New York Times article about hacking the Internet of Things. What if, someday, a state-sponsored infiltrator snuffs out America’s transport, energy and financial infrastructure in a cyber-Pearl Harbor? Any cyber-attack against American infrastructure would be credited as an act of war. If a nuclear plant can be easily infiltrated using a flash drive, can you imagine how perturbed the CIA or the NSA must be about the mounting threats and risks of smart devices in its homeland? To demonstrate, smart clothing – the technology that will allow millions of health conscious consumers to better monitor and manage their health could easily create security breaches into private networks. Cyber weapons have transformed from cellphones and laptops into smart wristbands and clothing. Dawn Meyerriecks, the deputy director of the Central Intelligence Agency’s directorate of science and technology, draws out attention to the fact that “today’s concerns about cyber war don’t address the looming geo-security threats posed by the Internet of Things, the embedding of computers, sensors, and Internet capabilities into more and more physical objects”.
58 / Technowize Magazine / May 2015
59 / Technowize Magazine / May 2015
COVE R S TO RY Smart Devices the 21st Century Warheads
I
oT devices are built on hardware that has technical vulnerabilities similar to that of PCs. Zachary Peterson, a security expert points out that a vast majority of modern hardware (CPUs, motherboards, RAM etc.) are able to flexible to programming. Hackers can easily execute arbitrary code on any device – small or large and exploit it. If a piece of hardware can take instructions from the internet, it’s far more accessible to hackers! Some of these smart devices provide a feature where employees can use a remote RDP connection to check their smart fridge using work PC. If a classic drive-by or a redirect has been installed, employees would unknowingly expose their computers to such cyber-attacks. Once an intruder has access to a single machine, it’s quite easy to compromise any other device connected to the network. By and large, this is the biggest security problem when it comes to the Internet of Things. The stakes are much higher when a hacker can gain access to one’s physical realm – lighting systems, front or garage door locks, thermostats, baby monitor, or even the entire home security system. The criminal agenda is set at someplace high – a place where they can gain access to sensitive and private information.
60 / Technowize Magazine / May 2015
61 / Technowize Magazine / May 2015
COVE R S TO RY
Unraveling Vulnerabilities
I
nternet of Things is fundamentally flawed and insecure. To prove this, a Forbes journalist hacked into the home automation systems of eight strangers via the internet. As per an estimate by ABI, $12 million home automation systems will be shipped around the world by 2016. This raises an even bigger question. How will we secure an ecosystem of devices that have already been deployed? Technology companies have been jubilantly celebrating the idea of Internet of Things. It has opened up new markets - GE estimates that “Industrial Internet” has the potential to add 10 to 15 trillion dollars to global GDP over the next 20 years. Cisco states its economic value in 2020 will hit the 19 trillion dollars mark. But it seems that tech luminaries’ favorite new toy is soon to fall of the wagon and hit the rabbit hole. The invasiveness of the new generation of objects and devices
62 / Technowize Magazine / May 2015
connected to the internet has made it synonymous with ubiquitous surveillance and cyberweapons. Privacy and cyber-security are one of the top challenges faced by companies today. Peter W. Singer, director of the Center for 21st Century Security and Intelligence at the Brookings Institution, revealed some astounding numbers in his latest book “Cybersecurity and Cyberwar: What Everyone Needs to Know.” More than 100 governments are building cyber military commands to carry out a cyberwar, out of which 20 are serious players. A good, 97 percent of Fortune 500 companies have been hacked. Nine pieces of malware, designed to cause harm to devices of all shapes and sizes connected to the web, are discovered each seconds. Securing hundreds of thousands or possibly millions of interconnected internet of things devices is remarkably different from that of laptops and cellphones, which have far more established tools and techniques. This echoes that traditional enterprise security approaches when it comes to blocking entry of attacks at the email gateway or firewall simply wouldn’t work.
63 / Technowize Magazine / May 2015
COVE R S TO RY
64 / Technowize Magazine / May 2015
Avoiding the Weaponization of Smart Devices
I
n today’s world, much of hacking appears from communist and super-capitalist actors in China, North Korea, Iran, Russia, Syria and elsewhere. Yet, cooperation between governments and companies on cyber issues remains non-functional. It has been 15 years since Congress passed any substantial cybersecurity legislation. The last time was in 2002, much before anyone had even heard of Google Glass or a connected thermostat. Moreover, there is no international agreement on what accounts for an act of cyber war. Nations are leveraging on the present condition for military, political and economic espionage activities. Laws related to armed conflicts are planned to obviate suffering and destruction in war. Yet, cyber conflict doesn’t fit within these current laws. These laws consist of the UN Charter, the North Atlantic Treaty and the Geneva and Hague Conventions, and were created on the basis of traditional warfare – land, sea, air and space. With cyberspace entering as the fifth domain, it raises a tantalizing question - what would be the future of warfare? All in all, with the rising threat of cyber-attacks and espionage activities in the hyperconnected world, it is imperative that governments and corporations take significant security measures to prepare for the Internet of Things.
65 / Technowize Magazine / May 2015
Hardware, inc.
Tindie The Largest Collection of Open-Source Hardware on the Planet Kickstarter, let’s face it, is a brilliant proposition. Someone talented, creative comes forward with a lovely idea that’s both interesting and innovative enough to jumpstart to something big. Tech aficionados love the idea of Kickstarter as the perfect place for setting up innovative hardware projects. But, what if you want to drink from the glass of success slowly and steadily? What if you want to try your product among a group of people who get your item or idea? As the DIY-maker insurgency continues to ride on full-speed, with the potential to pervade through mainstream culture, there are endless possibilities for businesses to ride on the kickstart-jumpstart wave. For one startup, it didn’t exactly start out with the maker movement in mind, instead it hoped to benefit from the “prosumerism” explosion that is taking place in the tech world today.
66 / Technowize Magazine / May 2015
Tindie is an independent, less glamorous niche - hardware marketplace for consumers and hobbyists that could prove to be important to the evolution of hardware design in the 21st century. It supports small businesses, inventors as an Etsy for hardware, except that it supports hardware instead of handmade lace, jewelry and other sleek items. The best thing about Tindie? It also supports consumers who have an idea and want to pursue it as a sideline businesses or may be, even a full time businesses. Moreover, it allows consumers to simply enjoy the products too by purchasing them. By day, Emile Petrone was a web programmer. But, in his spare time, he would tinker with the Raspberry Pi and the Arduino, two economical kits that let you assemble your own hardware devices. Tindie was built by Emile Petrone in 2012, when he posted in the Arduino subreddit to see whether
anybody would need an online platform to offer their hardware innovations and creations? In a relatively short span of time, he got enough positive feedback to begin coding a new online marketplace that helps tech cognescenti buy and sell hardware. While Kickstarter is all about funding glossy and slick looking products that haven’t been built yet, Tindie is a much straightforward marketplace for coarse looking devices that already exists, devices that are regularly built in little clusters using limited amount of capital. Tindie charges indie hardware creators a 5 percent commission to list on its website, in addition to another 2 to 3 percent for payment processing. Launched in June 2012, with orders flooding in from the first day from the United States and Germany, it had more than 1,000 orders in the initial seven months and 10,000 after seven months more. With more than 500 sellers and 67 / Technowize Magazine / May 2015
Hardware, inc.
more than 450 items ranging from hardware units and kits to full robots and hi-tech products, there’s a lot of product diversity coming directly from sellers to keep luring tech aficionados back. Tindie has numerous partnerships with equipment makers to offer products solely on Tindie. Today, Tindie is filled with a medley of products, right from a hardware equipment to create a RepRap to Bluetooth modules, moisture sensors, GPS boards. It has become a go-to-spot for things such as robots that do mobile app testing and cheap hardware parts from Shenzhen. Equipment maker’s 68 / Technowize Magazine / May 2015
biggest sales comes from sensors and devices, which is 60 percent and 17 percent respectively. Sellers on Tindie are individuals or small companies, who’re doing the opposite of what a lot of starts are doing right now – crowdfunding. They are trying to selling a few products first and trying to make sense of how to create a sustainable company after that, instead of trying to jumpstart their startup and scramble to increase production of products that do not exist until successful completion of crowdfunding. “Because we’re the first hardware
marketplace out there, we’ve basically tried to learn on the fly,” says Petrone. “When you have niche, specialized things that people have never thought of, you’re basically introducing to them for the first time. That’s not easy.” Historically, large companies have dominated the hardware sector for two reasons: manufacturing is difficult and expensive. Moreover, hardware requires physical objects, which encompasses manufacturing costs and, shipping. However, a quick price fall, thanks to the rise of smartphones, has made components cheap, thus lowering the barrier to open source entry for hardware. Petrone, who also happens to be on the board of the Open Source Hardware Association, claims that the recent development could act as a boon for hardware. Hardware, unlike software, has always lagged behind when it comes
to the open source movement. Open source software projects led to creations such as Linux. “The more people who know about a project and have access to it, the better it becomes,” Petrone says. “We then all benefit from that collective development.” Tindie is not yet a profitable business. However, it appears to have gotten a novice hardware wave that is just barely starting to take off. It’s a wave that could propogate the making of hardware in the same way that open source has to build software. “We see a big trend emerging in empowering designers to do small batch manufacturing as desktop tools for designers are getting more sophisticated,” says Cyril Ebersweiler, founder of HAXLR8R, a startup accelerator and venture fund that focuses on hardware. “Tindie could be at the forefront of that more advanced marketplace.”
69 / Technowize Magazine / May 2015
Hardware, inc.
Using platforms such as the Arduino and Raspberry Pi as building blocks for larger devices has snowballed in past several years. With Tindie, indie hardware makers can share their designs with likeminded people, create a feedback loop where one single configuration can inspire others. Initial buyers on Tindie were DIY hardware enthusiasts who were also posting their items. But today, this group has diversified and includes music loves, teachers and even employers at government agencies and large corporations, including Intel, Nokia, 70 / Technowize Magazine / May 2015
NASA and Google. In fact, Tindie can act as the perfect place for testing hardware. Petrone says that most Tindie sellers only offer under 100 units, issuing them the opportunity to model their plans through the span of reiterations. “It’s growing the old fashioned way,” explains Petrone. In fact, the Tindie model comes as a relief for those whose products only appeal to a limited number of audience. It’s like the beginning of the PC movement, when hobbyist would come together to show off their homemade
innovations. “A lot of the projects we have on Tindie today look exactly like that,” Petrone says. Sometime ago, Petrone ran a short-lived crowdfunding experiment on Tindie, although, now the site has been positioned as an antikickstarter in the online community. The thing with Kickstarter is that it is quite hard to predict expenses and set costs accurately, since none of the items put in the showcase have been completely created. Using Tindie’s platform, one can sell what they have on hand. “The types of companies we’re trying to help are trying to grow the old fashioned way — by saying: ‘Here’s this idea. I’ve built ten or twenty or five,’” Petrone explains. “They get them out there, people buy them, and they go through that process again. If there’s demand, they’ll scale that up.” “Tapster is our number one or two best seller right now. It’s a robot that does
mobile app testing. It used to be this big hulking robot that was originally built to play Angry Birds. Now every iteration gets more and more polished and the people that are buying it are the biggest companies in the world. We shipped one to Beijing to Nokia. We shipped one to Intel in Austria or somewhere,” says Petrone. “The biggest companies in the world are buying this robot for 500 bucks that does this specialized thing. Most people see it as ‘That’s an interesting little toy.’ The reality is, it’s doing a very specific job and it’s the best thing that’s out there.’” Some of the top selling products on Tindie include environmental sensors such as Chipr, which screens moisture in plant soil. Tindie gloats quite a lot of music hardware like the ARPIE MIDI apreggiator that converts musical chords into a sequence of notes that can be played by a MIDI synthesizer. There’s
71 / Technowize Magazine / May 2015
Hardware, inc.
also Tapster, a robot that can recreate the way people tap on a cellphone and let developers run intricate automated tests on their apps. Currently, the highest selling item on Tindie is the AirPi Kit, a Raspberry Pi-based weather station created by 16-year-old and 17-yearold for a science fair. The teenage duo sold $30,000 to $40,000 worth of kits. “That product was not meant to be commercialized, but they won the science fair and threw it up on Tindie. They made $30,000 in two weeks with a bare PCB that you slap onto a Raspberry Pi,” he says. “They just rolled out v 1.4 72 / Technowize Magazine / May 2015
and schools are buying it for classrooms around the world.” The platform Tindie provides worked well for them, and their success can inspire others too. Presently, Petrone at Tindie is handling issues faced by techies, i.e. finding board houses, machinists, a good middleman. To combat such issues, Tindie has rolled out Tindie Biz, a Yelp for hardware products. As of now, there are over 1,400 manufacturers on Tindie Biz. Emile also wanted to integrate reviews into his online platform. He believes that the real value in doing business comes from receiving genuine, satisfactory reviews
from buyers. As of now, Petrone isn’t precisely certain what the future development of his organization is going to be like. There’s a lot of buzz around the online marketplace, especially as the DIY-maker movement continues to reach new heights. Despite that, he has warned investors that it’s hard to determine how big Tine will really get. Notwithstanding the fact that, Etsy is moving towards creating a platform for hardware innovators, after purchasing an independent hardware company. Petrone is focused on creating a marketplace for independent sellers and small businesses. “Tindie has the most momentum in the space. We’ve basically got the lead. The opportunity is clear. But
the timing is not.” As the DIY-maker movement continues to grow, it’s going to be intriguing to see how small businesses and entrepreneurs reach out of options available online to launch their products. There’s a growing demand for open-source products sold on Tindie that the waiting list alone contains around half a million dollars’ worth of orders. Tindie is by all accounts one extraordinary place for makers that would face failure on sleek crowdfunding sites. It is an early example of what is yet to come. “I think open hardware will start coming into its own in the next ten years,” Petrone says. “Apple’s not going to open source their products anytime soon, but Tesla could.”
73 / Technowize Magazine / May 2015
Diary of a Technopreneur Zynga pioneered social gaming for the mass market and our mission to connect the world through games has never wavered. I am inspired by our upcoming products - it is the most exciting slate of mobile games in Zynga’s history with titles like Empires & Allies, Dawn of Titans and FarmVille: Harvest Swap. These games are coming on the heels of one of the most successful mobile launches in our history with Wizard of Oz Slots, which was launched this past November by our Spooky Cool team in Chicago. Zynga remains focused on our mission of connecting the world through games, which is even more relevant and possible today. Our execution is focused in three areas – our products, where we’re backing proven teams against the most valuable game categories; our people, to foster creative entrepreneurs; and our plan in order to fund our future with focus and simplicity. We need to be more resourceful in how we manage our costs in order to fund our investments in great new games, people and data analytics. We’ve over-burdened our game teams with complexity and centralized expenditure. Now that we are a mobile first company, it’s time to renew our focus on our vision to make play and social games a mass market activity. In order to win, we need to return to our entrepreneurial roots with leaders and teams empowered to drive outcomes. We’ve seen that across our industry and in the early days at Zynga - tighter, 74 / Technowize Magazine / May 2015
more nimble teams can drive faster innovation and deliver more valuable experiences for players. We need to get back to being the leader in mobile data and analytics, which leads to the best product management in our games. I really think the opportunity is still out there now that mobile has so disrupted the market and left a lot of areas to be innovated. It’s a great time to be making things. For our people, we need to create an empowered, entrepreneurial culture that fosters more creativity and innovation. Over the years we’ve seen that tighter, more nimble teams can drive faster innovation and deliver more player value. As a result, at the Q1 2015, we announced a cost reduction program to focus, simplify and align us against our most promising opportunities. We expect these cost reductions to generate $100 million in annualized savings. We are reducing our workforce by 364 people or approximately 18%, decreasing our outside services and reducing our central functions. This was a hard but necessary decision and I believe this plan puts us in the best long term position for success. I think I bring a DNA and passion, in that respect. I look forward to intensifying our focus on social experiences for the millions of consumers who play our games. We have an urgency to focus the execution of the company. We’re just at the beginning of launching the most exciting mobile slate in our history.
Mark Pincus
75 / Technowize Magazine / May 2015
F uturist
Motion M
Sounds from faraway
76 / Technowize Magazine / May 2015
icroscope
y Stars and Galaxies
77 / Technowize Magazine / May 2015
F uturist
78 / Technowize Magazine / May 2015
Since archaic time, man has wanted to see and hear things far smaller, subdued than could be perceived with the naked eye. Although, the first use of the lens remains a bit of a mystery, it’s believed that the use of lenses is quite modern than previously thought. If you look at it, it is infallibly believed that two Dutch spectacle-makers, Hans and Jansen Zacharias invented the first compound microscope in the 1590s. Over the past centuries, microscopes have revolutionized our world. They reveal tiny objects, structures and life that are too nanoscopic for us to see with our naked eyes. Microscopes have contributed significantly in the fields of science and technology where great discoveries have been made over the centuries.
79 / Technowize Magazine / May 2015
F uturist
80 / Technowize Magazine / May 2015
Perception Enhancing Lenses At the recent TEDxBeaconStreet, Michael Rubinstein, a research scientist at Google, played a jaw-dropping video footage of barely perceivable movements, like the pulse and heartbeats. The video footage was extracted using a “Motion Microscope,” that doesn’t use optics like a regular microscope to make small objects look bigger. Instead, it utilizes a video camera and image processing to reveal the tiniest motions and color changes in objects and people. Changes that are impossible for us to see with our naked eyes. A microscope that lets us look at the world in a completely new way. The Motion Microscope, developed at MIT in collaboration with Microsoft and Quanta Research, can extract intelligible audio by analyzing the movements of sound waves bouncing off objects and people. It reveals tiny changes - from the rippling of a woman’s stomach as a baby moves inside, the actual way the blood flows in the human body, how fast your heart is beating, to the wobbly motion of your eyeballs inside of your skull, vibrations of individual guitar strings. Such changes are amazingly abstruse, which is the reason, when you look at these changes with your naked eye, you don’t see it. In a brilliant video demonstration, Rubinstein took a short clip from “Batman Begins” just to show Christian Bale’s pulse. While Bale is presumably wearing makeup, the motion microscope was able to recover his pulse and measure his heart rates. This is derived from an algorithm to amplify minute color changes in videos, which allows the color changes from blood flow to be visualized. The algorithm employs a signal processing approach to analyze image motion and get a very accurate measurement of the color at each pixel in the image/video. The technique used is similar to an Eulerian framework for fluid flow analysis, which is also known as the Eulerian video magnification algorithm. The changes are amplified to create enhanced videos or images, which actually show the changes. The algorithm can show color-amplified videos of objects and people, motion-magnified videos of pregnant bellies, small facial expressions, and mechanical movements like vibrations in engines. It can help engineers diagnose machinery problems, see how buildings and towers away in the wind and react to natural forces. It has its biological applications too, it can show how the veins and arteries are pulsing in our bodies.
81 / Technowize Magazine / May 2015
F uturist
82 / Technowize Magazine / May 2015
Reverberating Sources to See the Unseenthe Unseen The motion microscope is somewhat analogous to the equalizer in a stereo sound system, which boosts some of the frequencies and abates others. Although, in this case, the pertinent frequency is the frequency of color changes in a sequence of video frames, and not the frequency of an audio signal. It also works in real time and can display both the original video and the new version of the video, with changed amplified. We all know that an Opera singers piercing voice can break a wine glass if they hit the correct note. In another video demonstration, Rubinstein showed how a note was played in the resonance frequency of a glass nearby. When magnified the motions by 250 times, one could clearly see how the glass vibrated and resonated to the sound. The motion microscope has its crazy audio and video applications too. Rubinstein and the team at MIT experimented with a bag of chips that was lying on a table. The team filmed the bag lying on the table with a video camera and analyzed tiny, unperceivable motions that sound waves create in the room. In a high-speed video the bag of chips was recorded using a visual microscope. One could not decipher what is actually going on in the video by looking at it, however, the team was able to recover the audio by analyzing tiny motions in the video. The visual microscope could sense motions that can be measured as one thousandth of a millimeter. One can use the visual microscope to recover audio from objects like plants, CCTV cameras, etc. It can act as a huge improvement in interrogation. By simply looking at the changes in one’s facial expression, the interrogator can detect a lie without having eagle eyes or hooking up wires to the person involved in the crime. Moreover, the technology can prove to be really useful in solving criminal affairs by recovering sounds from video recordings. It’s a wild, interesting way to turn everyday objects into microphones! Currently, there is a lot of debate going on in Europe about whether a person declared to be brain-dead is in fact alive or not. The techniques developed can be put to noble use to see whether the person in the vegetative state reacts to sensory or verbal prompts.
83 / Technowize Magazine / May 2015
F uturist
84 / Technowize Magazine / May 2015
Opportunities for Astronomical Discoveries The development is perfectly suited for astronomic observations. Now and then, astronomers are discovering planets around other stars by observing infinitesimal changes in the positions of stars that occur due to the gravitational pull of the orbiting planets. The techniques developed by the team could help see all the stars that have planets at all once. It would be interesting to see what kind of opportunities for astronomical discoveries are awaiting for us, what happens when we point the microscope towards objects in space. The algorithm is open-source so that others fascinated by the new development can use and experiment with it. People can work on their own videos. A website has been put up on the web by Quanta Research where users without any prior experience in computer science or programming can upload their videos, experiment with the new microscope and process them online. It’s a new tool, a new way to look at the world. The technology is a gentle reminder of how limited human senses are at interpreting the characteristics of the nature of reality in the Universe. It is an indubitable proof that everything, the universe is a symphony of vibrating strings.
85 / Technowize Magazine / May 2015
App Labs
Bento, the app matchmaker is the new talk of the tech town
86 / Technowize Magazine / May 2015
Today, there is no real dearth of “smart” launchers in the Android market. Now of course, we have to put “smart” in quotation marks, for there still is a disappointing void in terms of exceptionally unique products trying to accomplish that. So when we tell you that Bento is a new tenderfoot in this scampering market of context-aware developers and launchers, you shouldn’t be asking, “Do we need another one of this kind?” You should rather go about asking, “Is this the one that will really be doing a great job?”
There are plenty of launchers out there promising a ton of personalization, with some, like Google Now, Aviate and EverythingMe, going as far as adapting to your daily lifestyle. However, there is a new baby entering the launcher block soon, which kind of blends the best of the above in one complete app, striving to change the way humans perceive interaction with their phones, just like a screen with icons and widgets on it. Bento is a venture capitalbacked project that is
under a semi-private beta at the moment. On 6th May, Nikhil Chandhok, former product manager at YouTube and later a member of Google’s venture capital arm, took the wraps off his new start-up, Bento, a mobile application that aims at becoming the first place people find themselves in, soon after picking up their mobile phones. The company has received a whopping $2 million in venture capital from giant investors like Google Ventures, Social+Capital and First Round Capital.
The Idea To fulfill this sort of a premise, Bento intends to use the cards system, but not in the same fashion as Google Now uses it. Bento plans to advance much further into developing those timely snippets of information available to all its users at any given point of time. Bento will present various suggestions to you from the time you wake up (weather, breakfast places), and all throughout the day, digging up relevant apps you
might have completely forgotten you had installed on your phone, based entirely on the occasion and location. However, thankfully it does not try to guess everything seamlessly like Google Now, but actually asks about your home and locations, for instance, upon initial setup. Then it proceeds to organizing all your apps in groups, or “spaces,” on separate screens automatically which you can revamp at any given point of time.
There is still a void in developing unique producs 87 / Technowize Magazine / May 2015
App Labs From Concept To Product If good ideas were all that mattered, by now all of us would have already been chained down to a smart launcher. For Bento, it’s all about implementation and performance. We would like to add another reminder that this is very much an in-development version, so some leniency is called for when it comes to those rough edges. Setup is fairly easy and not as complicated as one would have imagined. Bento wants your Google account to learn everything you like to see and so we assume this should make it easier to keep your personalizations in sync across various devices/installs. Rather than try to work it out itself, Bento also asks for your home and work locations, which makes a lot of sense. Lastly, you can choose which “spaces” you want, which are basically groupings of apps that serve similar functions. Each space gets its own screen, which you can then be rearranged as you please.
88 / Technowize Magazine / May 2015
Bento app cards At this stage Bento doesn’t offer the kind of crisp and clean integration that Google Now does, but it’s just the beginning. Headlines from Reddit, events from Google Calendar and popular videos from YouTube can all be displayed on the front page by tapping the three dots by the side of each card to dismiss it or block it fully. Tap the ‘Cards’ button in the the Bento Settings and choose which apps show up on the home screen by default. Song lyrics, weather forecasts, Yelp reviews (for venues near your current location), upcoming events and trending songs on SoundCloud are among the options you can choose from.
89 / 89 Technowize / Technowize Magazine Magazine / February / May 2015
App Labs Bento personalization One of the ways in which Bento offers assistance is in stacking notification cards at the top of the home screen—you can swipe to dismiss and even block apps that you don’t particularly want to hear from. Weather is obviously personalized to your location while the contextual apps drawer picks shortcuts to match where you are and what time it is. The search box remains at the top of the screen: Enter a query here and Bento searches through your apps, your contacts and your browsing history as well as the web. Another change Bento makes is to sort your apps into smart groups and folders—like all the modifications the launcher makes, you can undo this tweak if you don’t like it. The apps themselves get injected with contextual information too, so you can open up the Uber panel to see pickup times for your current location and the base fare you’re going to have to pay. As this is still a beta release you may well see the occasional bug or missing feature, but there should be much more to come in the future.
90 / Technowize Magazine / May 2015
enter a query and bento searches through your apps.
91 / Technowize Magazine / May 2015
tech tech ed ed Introduction to Computer Science and Python Programming A fun, fast-paced introduction to solving interesting problems with computer science through Python programming. About this Course Looking to get started with computer science while learning to program in Python? This computer science course provides an introduction to computer science that’s both challenging and fun. It takes a broad look at the field of computer science through a variety of demonstrations and projects. We’ll cover both low- and highlevel concepts, from how the circuits inside a computer represent data to how to design algorithms, as well as how all of this information affects the technology we use today. Additionally, we’ll teach the basics of Python programming, giving us a way to put our new CS knowledge into practice. No need to know any programming before starting the course; we’ll teach everything you need to know along the way. All you need to start is a good grasp of algebra, and you can fall in love with both the concepts and the practice of computer science.
Starts: June 2, 2015
Effort: 5-7 hours/week
Institution: Harvey Mudd College
Subject: Computer Science
Length: 14 weeks
Languages: English
92 / Technowize Magazine / May 2015
Human-Computer Interaction Design
Helping you build human-centered design skills, so that you have the principles and methods to create excellent interfaces with any technology. About this Course In this course, you will learn how to design technologies that bring people joy, rather than frustration. You’ll learn several techniques for rapidly prototyping and evaluating multiple interface alternatives -- and why rapid prototyping and comparative evaluation are essential to excellent interaction design. You’ll learn how to conduct fieldwork with people to help you get design ideas. How to make paper prototypes and low-fidelity mock-ups that are interactive -- and how to use these designs to get feedback from other stakeholders like your teammates, clients, and users. You’ll learn principles of visual design so that you can effectively organize and present information with your interfaces. You’ll learn principles of perception and cognition that inform effective interaction design. And you’ll learn how to perform and analyze controlled experiments online. In many cases, we’ll use Web design as the anchoring domain. A lot of the examples will come from the Web, and we’ll talk just a bit about Web technologies in particular. When we do so, it will be to support the main goal of this course, which is helping you build human-centered design skills, so that you have the principles and methods to create excellent interfaces with any technology.
Starts: June 16
Effort: 10-12 hours/week
Institution: University of California
Subject: Tech & Design
Length: 7 weeks
Languages: English
93 / Technowize Magazine / May 2015
tech tech ed ed Silicon Photonics Design, Fabrication and Data Analysis Design your own silicon photonics chip. The first online course to include photonics fabrication, experimentation, and data analysis. About this Course This short course teaches students and industry professionals how to design integrated optical devices and circuits, using a hands-on approach with commercial tools. The focus of this course is a design project, guided by lectures, tutorials and activities. As a first-time designer, you will design an interferometer, which is a widely used device in many applications such as communications (modulation, switching) and sensing. Specifically, it is Mach-Zehnder Interferometer, consisting of fibre grating couplers, two splitters, and optical waveguides. For advanced designers, this course is an opportunity to design many other devices, such as directional couplers, ring, racetrack and disk resonators, Bragg gratings including grating assisted contradirectional couplers, photonic crystals, multi-mode interference (MMI) couplers, polarization diversity components, mode-division multiplexing (MDM) components and circuits, novel waveguides such as sub-wavelength grating (SWG) and metamaterial waveguides, slot waveguides, etc. Commercial software tool licenses are provided in this course (Lumerical Solutions, Mentor Graphics, and MATLAB). Open-source alternatives are provided. Mentor Graphics tools are accessed remotely via a cloud service; the others can be run on your own computer. Starts: July 7, 2015
Effort: 3-8 hours/week
Institution: UBCx
Subject: Engineering
Length: 6 weeks
Languages: English
94 / Technowize Magazine / May 2015
Building Cloud Apps with Microsoft Azure – Part 3 Learn to build real-world cloud solutions from Microsoft experts. About this Course This course will walk you through a patterns-based approach to building realworld cloud solutions. The patterns apply to the development process as well as to architecture and coding practices. The concepts are illustrated with concrete examples, and each module includes links to other resources that provide more in-depth information. The examples and the links to additional resources are for Microsoft frameworks and services, but the principles illustrated apply to other web development frameworks and cloud environments as well. This is part three of a three-course series. New patterns introduced in part 3 include monitoring, telemetry, and designing apps to survive failure. SO... WHAT DO YOU WANT TO LEARN? Do you have any burning questions about developing apps for the cloud? Once you enroll, please send your question to DEV202x@microsoft.com. Not only will this help us fine-tune the course content but Tom Dykstra and Rick Anderson will post answer to the most asked questions when the course launches.
Starts: June 16, 2015
Effort: 4 hours/week
Institution: Microsoft
Subject: Computer Science
Length: 4 weeks
Languages: English 95 / Technowize Magazine / May 2015
tech tech ed ed
Cloud Computing Applications Learn how to use the cloud and write programs for data analytics. About this Course Learn of “cloudonomics,” the underlying economic reasons that we are creating the cloud. Learn the basic concepts underlying cloud services and be able to use services like AWS or OpenStack Dashboard to construct cloud services or applications. Demonstrate your ability to create web services, massively parallel data intensive computations using Map/Reduce, NoSQL databases, and real-time processing of real-time data streams. Use machine learning tools to solve simple problems. The course includes concepts of: • • • • • •
Baremetal provisioning Identity service Orchestration Software as a service MapReduce Analytics
• • • • • •
Neutron networking Image service Infrastructure as a service Platform as a service Big data Privacy and legal issues
The course will also include example problems and solutions to cloud computing, including hands-on laboratory experiments (Load Balancing and Web Services, MapReduce, Hive, Storm, and Mahout). Case studies will be drawn from Yahoo, Google, Twitter, Facebook, data mining, analytics, and machine learning. Starts: August 24 –September 30
Effort: 6-8 hours/week
Institution: University of Illinois at Urbana-Champaign
Subject: Software Engineering
Length: 4 weeks
Languages: English
96 / Technowize Magazine / May 2015
A System View of Communications: From Signals to Packets (Part 1) Explore the tradeoffs in designing communication systems like mobile phones, and the engineering tools to handle them. About this Course Have you ever wondered how information is transmitted using your mobile phone or a WiFi hotspot? This introductory course seeks to enable you to understand the basic engineering tools used and tradeoffs encountered in the design of these communication systems. This course is divided into three parts. In Part 1, we examine the point-to-point link, which communicates information from a single transmitter to a single receiver. Part 2 examines how multiple transmitters can share the same physical channel. Part 3 discusses how information can be transmitted reliably from one station to another over a network that connects multiple stations. Online interactive exercises are included to help build your intuition. This course was inspired by and built upon the course 6.02 Digital Communication Systems developed at MIT, which Prof Bertram Shi worked on during his sabbatical in 2009.
Starts: August 25, 2015
Effort: 5 hours/week
Institution: The Hong Kong University of Science and Technology
Subject: Computer Science
Length: 7 weeks
Languages: English
97 / Technowize Magazine / May 2015
Tech Events & Conferences 31 May-04 Jun 2015 IEEE Pulsed Power Conference The IEEE Pulsed Power Conference, organized by the IEEE Advancing Technology For Humanity will take place from 31st May to the 4th June 2015 at the Hilton Austin in Austin, USA. The conference will cover areas like exchange of information on pulsed power technology and engineering and many more related topics.
Venue: Hilton Austin | Austin, USA 31 May-04 Jun 2015
World Congress on Integrated Computational Materials Engineering The World Congress on Integrated Computational Materials Engineering, organized by the TMS will take place from 31st May to the 4th June 2015 in Colorado Springs, USA. The conference will cover areas like the wide range of materials programs where an ICME approach validated by experimental efforts is applicable, including computational and experimental based talks, individual computational methods utilized in an ICME approach, including both advantages and limitations, roles of ICME in graduate and undergraduate courses, digital infrastructure required for information sharing and model integration.
Venue: Venue to be announced | Colorado Springs, USA 02-04 Jun 2015 Xerocon Denver
The XEROCON DENVER 2015, organized by the XERO will take place from 2nd June to the 4th June 2015 at the Denver Center for the Performing Arts in Denver, USA. The conference will cover areas like Cloud accounting, networking, social functions, and development.
Venue: Denver Center for the Performing Arts | Denver, USA 98 / Technowize Magazine / May 2015
09-11 Jun 2015 Hadoop Summit North America The Hadoop Summit North America, organized by the Hortonworks Inc will take place from 9th June to the 11th June 2015 at the San Jose Convention Center in San Jose, United States Of America.
Venue: San Jose Convention Center | San Jose, USA 15-16 Jun 2015 Data Center & Computing Conference and Expo
The Data Center & Computing Conference and Expo, organized by the BNP Media will take place from 15th June to the 16th June 2015 at the Marriott Marquis in New York, USA. The conference will cover areas like Achieving Increased Efficiency Without Sacrificing Uptime, Tomorrow Starts Today, US DOE and NYSERDA – The Global Data Center Energy Challenge, Colocation Data Center Tour Preparation.
Venue: Marriott Marquis | New York, USA 18 Jun 2015 Iot Privacy Summit
The Iot Privacy Summit, organized by the Association Of Community College Trustees ACCT will take place on 18th June 2015 at the Computer History Museum in Mountain View, United States Of America.
Venue: Computer History Museum | Mountain View, USA
99 / Technowize Magazine / May 2015
Tech Events & Conferences 23-25 Jun 2015 Solidcon Hardware, Software & the Internet of Things The Solidcon Hardware, Software & the Internet of Things, organized by the O’Reilly Media, Inc. will take place from 23rd June to the 25th June 2015 at the Fort Mason Center in San Francisco, USA. The conference will cover areas like During the Conference Engineers Are Building Products Never Before Imagined, Programmers Are Reaching Beyond the Screen in Ways That Would Make a Sci-fi Writer Envious, Designers Are Creating Uxs That Make Previously Outlandish Ideas Seem Obvious and Intuitive, Entrepreneurs and Business Leaders Are Inventing Entirely New Business Models. Hardware, Software, Sensors, and Physical Things Are Coming Together in Uncharted Waters. To Succeed, You’ll Need to Build Teams That Cross Disciplines in Ways Never Before Attempted. Envision New Business Models. And Recognize the “crazy” Ideas That Are Now Entirely Possible. Learn How at Solid.
Venue: Fort Mason Center | San Francisco, USA 23-25 Jun 2015 Hardware Software And The Internet of Things
The Hardware Software And The Internet of Things, organized by the O’Reilly Media, Inc will take place from 23rd June to the 25th June 2015 at the Fort Mason Center in San Francisco, USA. The conference will cover areas like Business Leaders Who Want to Surf the Upcoming Innovative Disruption, Stay Competitive, and Understand an Uncharted Business Model Where Things Are Also Services. Software Developers Who Create Intelligent, Costeffective, and Beautifully Designed Things. Hardware Engineers Who Want Their Elegantly Engineered Things to Be Connected, Intelligent, and Adaptive. Innovators and Start-ups in the New Digital Industrial Economy Actively Seeking the Latest Solutions to Optimize Efficiencies, Increase Productivity, Attract Funding, and Grow.
Venue: Fort Mason Center | San Francisco, USA 100 / Technowize Magazine / May 2015
25-26 Jun 2015 Big Data Analytics Conference The Big Data Analytics Conference, organized by the LIMRA International, Inc will take place from 25th June to the 26th June 2015 at the Seaport Hotel and Seaport World Trade Center in Boston, USA. The conference will cover areas like challenges and opportunities in big data.
Venue: Seaport Hotel and Seaport World Trade.. | Boston, USA 29 Jun-02 Jul 2015 Annual International Cyber Psychology, Cyber Therapy & Social Networking Conference The Annual International Cyber Psychology, Cyber Therapy & Social Networking Conference, organized by the Interactive Media Institute will take place from 29th June to the 2nd July 2015 at the University of California San Diego in San Diego, USA. The conference will cover areas like sharing platform for researchers, clinicians, policymakers and funding agents to share and discuss advancements in the growing disciplines of CyberTherapy & CyberPsychology.
Venue: University of California San Diego | San Diego, USA 12-16 Jul 2015 Microsoft Worldwide Partner Conference
The Microsoft Worldwide Partner Conference, organized by the Microsoft will take place from 12th July to the 16th July 2015 at the Orange County Convention Center (OCCC) in Orlando, USA. The conference will cover areas like to generate future business, to get the competitive edge, to deliver worldclass customer results and more.
Venue: Orange County Convention Center (OCCC) | Orlando, USA
101 / Technowize Magazine / May 2015
Tech Events & Conferences 15-18 Jul 2015 Microbiology of The Built Environment Conference The Microbiology of the Built Environment Conference, organized by the Weebly will take place from 15th July to the 18th July 2015 at the University of Colorado ,Boulder in Boulder, USA. The conference will cover areas like understanding these complex ecosystems will present opportunities to influence construction practices and other industrial processes, and to impact both human health and well being.
Venue: University of Colorado ,Boulder | Boulder, USA 20-22 Jul 2015 Embedded Systems Conference Silicon Valley
The Embedded Systems Conference Silicon Valley, organized by the UBM will take place from 20th July to the 22nd July 2015 at the Santa Clara Marriott in Santa Clara, USA. The conference will cover areas like Connected Devices and the IoT, Embedded Software Design, Prototyping, Embedded Systems Design, Software: Design, Languages, & Quality, The Fantastical Theater of Engineering Innovation, Teardown Track: Wearables and Health Tech Devices and much more.
Venue: Santa Clara Marriott | Santa Clara, USA 02-07 Aug 2015
International Conference on Social Computing and Social Media The International Conference on Social Computing and Social Media, organized by the will take place from 2nd August to the 7th August 2015 at the in Los Angeles, USA. The conference will cover areas like community engagement, computer supported collaborative learning, design and evaluation methodologies for social computing and social media, education and the use of social computing and social media, ethical and legal issues in social computing and social media, ethical and legal issues in social computing and social media, visualizing social interaction, virtual worlds.
Venue: Westin Bonaventure Hotel & Suites | Los Angeles, USA 102 / Technowize Magazine / May 2015
09-13 Aug 2015 International Conference & Exhibition On Computer Graphics And Interactive Techniques International Conference & Exhibition on Computer Graphics and Interactive Techniques is a 5 day event being held from 9th August to the 13th August 2015 at the Los Angeles Convention Center in Los Angeles, USA. This event showcases products like software, scanners, robotics, graphics, communication, simulation, to that of stereo 3d technology based products, to that of simulation services associated with this field etc. in the Computer Hardware & Software, Architecture & Designing industries.
Venue: Los Angeles Convention Center | Los Angeles, USA 10-12 Aug 2015 Mobile Web & Cloud Conference
The Mobile Web & Cloud Conference, organized by the That Conference NFP. will take place from 10th August to the 12th August 2015 at the Kalahari Resort & Waterpark in Wisconsin, USA. The conference will cover areas like lean startup 101 and accelerating ideas into product success, to that of ripples on the pond.
Venue: Kalahari Resort & Waterpark | Wisconsin, USA 18-20 Aug 2015 Cyber Security Conference
The Cyber Security Conference, organized by the Academy of Science and Engineering will take place from 18th August to the 20th August 2015 at the Stanford University Stanford in Stanford, United States Of America. The conference will cover areas like Access control Accounting and audit Anonymity Application Security Applied cryptography Authentication Cloud computing security Data security Digital forensics.
Venue: Stanford University Stanford | Stanford, USA
103 / Technowize Magazine / May 2015
104 / Technowize Magazine / May 2015
105 / Technowize Magazine / May 2015