Israeli Grid Technology Conference

Last week I was on IGT conference which is the Israeli grid technology conference. It was interesting to see the change from one year to another where last year it was all about new technologies and new ideas and this year the main theme was of commercial companies and integrators discussing how to apply it. …

Continue reading

Strategic Board Passes the 40,000 Technology Blog Mark!

This week Strategic Board passed the 40,000 mark on technology related blogs and news sources we regularly monitor. The exact number right now is 41,696. Our automatic blog discovery and classification mechanism achieved a very high success ratio (>95% accuracy) during the last six months. Today the big majority of the blogs and news sources …

Continue reading

Blogs Anti Spamming Technology

After reading PSFK: Sifry Discusses SpamBlogs I wondered whether there an emerging market for blog anti spamming tools exists. For the popular blogs anti spamming technology can ease life since spamming threats are ever changing and tracking as well as devising solution for every new form of spamming is tedious. Spammers are known to be …

Continue reading

Digital Transformation Is Hard and Existential

There is no large corporation on the planet which does not have digital transformation as one of the top three strategic priorities, and many have already deep-dived into it without necessarily understanding the meaning of success. Digital transformation is highly strategic, and many times existential due to the simple fact that technology changed everyone’s life …

Continue reading

What Will Happen When Machines Start Lying to Us

The mere thought of a computer lying to you about something has boggled my brain ever since I heard it from a friend professor on a flight as an anecdote on what could happen next in AI. That one sentence took me on a long trip in a rabbit hole of a wide range of …

Continue reading

How to Disclose a Security Vulnerability and Stay Alive

In recent ten years, I was involved in the disclosure of multiple vulnerabilities to different organizations and each story is unique and diverse as there is no standard way of doing it. I am not a security researcher and did not find those vulnerabilities on my own, but I was there. A responsible researcher, subjective …

Continue reading

The First Principle of Security By Design

People create technologies to serve a purpose. It starts with a goal in mind and then the creator is going through the design phase and later on builds a technology-based system that can achieve that goal. For example, someone created Google Docs which allows people to write documents online. A system is a composition of …

Continue reading

Risks of Artificial Intelligence on Society

Random Thoughts on Cyber Security, Artificial Intelligence, and Future Risks at the OECD Event – AI: Intelligent Machines, Smart Policies It is the end of the first day of a fascinating event in artificial intelligence, its impact on societies and how policymakers should act upon what seems like a once in lifetime technological revolution. As …

Continue reading