• What is Digital Architecture anyway?
    https://hackernoon.com/what-is-digital-architecture-anyway-47482189e3fc?source=rss----3a8144eab

    What is Digital Architecture Anyway?Best way to secure funding for your project is to put the word Digital somewhere into the name of it.Those were the words I heard from a IT executive pretty much summarising the way IT industry reacts to Digital today. We work in digital transformation projects which would be just called transformation projects a few years ago.Unsurprisingly companies are seeking for Digital Architects to support these projects, whereas they would be just looking for Technology Architects before digital became the fund-securing-word. Funnily enough, if you look at to required job skills, you can hardly spot any significant difference apart from some key words. So what makes an architect a Digital Architect and in fact, is there such thing as Digital Architecture?Short (...)

    #digital-architecture #business #software-architecture #digital-transformation #enterprise-technology


  • How #data Analytics Can Revolutionize Your #business Strategy and Unlock Success
    https://hackernoon.com/how-data-analytics-can-revolutionize-your-business-strategy-and-unlock-s

    https://images.unsplash.com/photo-1526628953301-3e589a6a8b74?ixlib=rb-0.3.5&ixid=eyJhcHBfaWQiOj analyzing big data has become a significant business tool. It’s constantly changing the way brands operate and market their products across various fields and industries. In fact, every company today, regardless of size, is considered to be a data business in some measure.Therefore having a well-thought-out data strategy is ultimately important in case you want to achieve success these days. So if you’re still drowning in statistics trying to collect as much information as possible, stop. Here are some basic guidelines on how to use data analytics to your advantage and help your business  (...)

    #business-strategy #data-analytics #big-data


  • Software spia, le nuove armi africane

    Ufficialmente introdotti contro il terrorismo, sono usati anche per controllare dissidenti politici.

    Almeno dal 2009 l’Egitto è tra i principali acquirenti di strumentazioni per la sorveglianza di massa. #Software intrusivi che si possono agganciare ai telefonini oppure alle mail e tracciare così i comportamenti di chiunque. Specialmente se considerato un nemico politico dal regime. Al Cairo, dopo la primavera araba, si è abbattuto un rigido inverno dei diritti: oppositori politici, sindacalisti, persino ricercatori universitari come Giulio Regeni sono stati fatti sparire, ammazzati o torturati. Per fare tutto questo, le agenzia di sicurezza hanno spiato i loro bersagli attraverso sistemi informatici. Tra le aziende, chi ha fatturato vendendo gli strumenti per spiare i nemici politici, c’è l’italiana #Hacking_Team, le cui mail sono state rese pubbliche da una maxi fuga di notizie nel luglio 2015.

    L’Egitto non è l’unico paese africano a fare uso di questo tipo di tecnologie. In particolare in Africa, questo genere di strumenti per tenere sotto controllo la popolazione stanno diventando una costante. Sono l’ultima frontiera del mercato delle armi. Nemico ufficiale contro cui utilizzarle: il terrorismo, che si chiami Al Shabaab, Boko Haram, Isis. In pratica, da semplici persone “sospette” a dissidenti politici.

    Una stima di Markets and Markets del 2014 prevede che per il 2019 il mercato delle “intercettazioni” varrà 1,3 miliardi di dollari. E accanto a questo corre un mercato nero dalle dimensioni inimmaginabili, dove ogni transazione avviene nel deep web, il doppio fondo del contenitore di internet. Senza bisogno di autorizzazioni, né di sistemi di licenze, come invece previsto dalle normative di tutto il mondo. I paesi africani sono tra i nuovi agguerriti compratori di queste armi 2.0, di fabbricazione per lo più israeliana ed europea.

    La mappa degli spioni

    L’utilizzo e la vendita di questi sistemi – proprio come per le armi – in diversi paesi è schermato dal segreto militare, nonostante il “duplice uso” (civile e militare) che possono avere questi strumenti. Detti, appunto, dual-use. L’inchiesta Security for Sale (https://irpi.eu/sicurezza-vendesi), condotta in febbraio da 22 giornalisti europei, ha individuato i principali importatori di tecnologie intrusive in Africa. La lista è lunga: oltre il Kenya, di cui Osservatorio Diritti ha già parlato, e l’Egitto, l’esempio più famoso, ci sono Libia (ancora sotto Gheddafi, ndr), Etiopia, Nigeria, Sudan, Sudafrica, Mauritania e Uganda.
    #Kenya #Libye #Ethiopie #Nigeria #Soudan

    In Mauritania è in carcere da due anni il cittadino italiano #Cristian_Provvisionato per una vendita di sistemi di intercettazione finita male. Provvisionato, una guardia giurata che non sarebbe mai stata in grado di vendere sistemi di questo genere, avrebbe dovuto presentare ai mauritani un sistema di intercettazione per Whatsapp, che la sua azienda – Vigilar – avrebbe a sua volta acquistato attraverso la società indiano-tedesca Wolf Intelligence. Bersaglio del sistema sarebbero dovuti essere terroristi attivi al confine mauritano, per quanto diverse organizzazioni internazionali abbiano sollevato riserve rispetto al possibile utilizzo di sistemi del genere in un paese che viola i diritti umani.
    #Mauritanie

    L’accusa nei confronti di Cristian Provvisionato, cioè truffa, non regge perché il cittadino italiano era all’oscuro, come è stato comprovato da più ricostruzioni giornalistiche, di ciò che stava presentando in Mauritania. Aveva accettato il lavoro perché gli era stato promesso che sarebbe stato veloce, pulito e con un buon guadagno. Invece si trova ancora dietro le sbarre. Per il caso Provvisionato la magistratura milanese ha aperto un’inchiesta che coinvolge anche #Vigilar e #Wolf_Intelligence. Il partner israeliano dei due è una delle aziende da sempre competitor di Hacking Team.

    La stessa Hacking Team ha venduto ad altri regimi autoritari africani (scarica la ricerca del centro studi CitizenLab – università di Toronto). Il caso più clamoroso è quello dei servizi segreti del Sudan, che nel 2012, prima che entrasse in vigore qualunque embargo, hanno acquistato merce per 960 mila euro. Anche le Nazioni Unite, nel 2014, quando è entrato in vigore l’embargo con il Sudan, hanno fatto domande ad Hacking Team in merito alle relazioni commerciali con le forze d’intelligence militare del Paese.
    #Soudan #services_secrets

    Nello stesso 2012 una compagnia britannica aveva iniziato a vendere software intrusivi alle forze militari dell’Uganda. Era l’inizio di un’operazione di spionaggio di alcuni leader politici dell’opposizione che arrivava, denunciavano media locali nel 2015, fino al ricatto di alcuni di loro. Paese di fabbricazione del software spia, come spesso accade, Israele.
    #Ouganda

    Il Sudafrica è un caso a sé: da un lato importatore, dall’altro esportatore di tecnologie-spia. Il primo fornitore di questo genere di software per il Sudafrica è la Gran Bretagna, mentre il mercato di riferimento a cui vendere è quello africano. Il Paese ha anche una propria azienda leader nel settore. Si chiama #VASTech e il suo prodotto di punta è #Zebra, un dispositivo in grado di intercettare chiamate vocali, sms e mms.
    #Afrique_du_sud

    Nel 2013 Privacy International, un’organizzazione internazionale con base in Gran Bretagna che si occupa di privacy e sorveglianza di massa, ha scoperto una fornitura di questo software alla Libia di Gheddafi, nel 2011, nel periodo in cui è stato registrato il picco di attività di spionaggio (dato confermato da Wikileaks). Eppure, dal 2009 al 2013 solo 48 potenziale contravvenzioni sono finite sotto indagine del Ncac, l’ente governativo preposto a questo genere di controlli.

    Il settore, però, nello stesso lasso di tempo ha avuto un boom incredibile, arrivando nel solo 2012 a 4.407 licenze di esportazione per 94 paesi in totale. Il mercato vale circa 8 miliardi di euro. In Sudafrica sono in corso proteste per chiedere le dimissioni del presidente Jacob Zuma, coinvolto in diversi casi di corruzione e ormai considerato impresentabile. È lecito pensare che anche questa volta chi manifesta sia tenuto sotto osservazione da sistemi di sorveglianza.


    https://www.osservatoriodiritti.it/2017/05/08/software-spia-le-nuove-armi-africane
    #Afrique #surveillance #interception #surveillance_de_masse #Egypte #business

    ping @fil

    • Security for sale

      The European Union has deep pockets when it comes to security. Major defense contractors and tech giants compete for generous subsidies, to better protect us from crime and terrorism. At least that’s the idea. But who really benefits? The public or the security industry itself?

      Over the past year, we’ve worked with more than twenty journalists in eleven European countries to investigate this burgeoning sector. We quickly discovered that the European security industry is primarily taking good care of itself – often at the expense of the public.

      In this crash course Security for Sale, we bring you up to speed on EU policy makers and industry big shots who’ve asserted themselves as “managers of unease,” on the lobbies representing major defense companies, on the billions spent on security research, and on the many ethical issues surrounding the European security industry.

      “Security for sale” is a journalistic project coordinated by Dutch newspaper De Correspondent and IRPI collaborated for the Italian context. The webportal of “Security for Sale” collects all articles produced within the project in several languages.

      https://irpi.eu/en/security-for-sale

    • Lawful Interception Market worth $1,342.4 Million by 2019

      The report “Lawful Interception Market by Network Technologies and Devices ( VOIP, LTE, WLAN, WIMAX, DSL, PSTN, ISDN, CDMA, GSM, GPRS, Mediation Devices, Routers, Management Servers); Communication Content; End Users - Global Advancement, Worldwide Forecast & Analysis (2014-2019)” defines and segments the LI market on the basis of devices, network technologies, communication content, and services with in-depth analysis and forecasting of revenues. It also identifies drivers and restraints for this market with insights on trends, opportunities, and challenges.

      Browse 80 market tables and 23 figures spread through 177 pages and in-depth TOC on “Lawful Interception Market by Network Technologies and Devices ( VOIP, LTE, WLAN, WIMAX, DSL, PSTN, ISDN, CDMA, GSM, GPRS, Mediation Devices, Routers, Management Servers); Communication Content; End Users - Global Advancement, Worldwide Forecast & Analysis (2014-2019)”
      https://www.marketsandmarkets.com/Market-Reports/lawful-interception-market-1264.html
      Early buyers will receive 10% customization on reports.

      Lawful Interception (LI) has been proven to be very helpful for the security agencies or Law Enforcement Agencies (LEAs) for combating terrorism and criminal activities. Across the world, countries have adopted such legislative regulations and made it compulsory for the operators to make LI-enabled communication network. Since the advancement of communication channels and network technologies over the period of time, the interception techniques have also enhanced for variety of communications such as Voice over Internet Protocol (VoIP), web-traffic, Electronic Mail (Email), and more. Now, the interception is possible for all networks that deliver voice, data, and Internet services.

      Sophisticated communication channels and advanced network technologies are the major driving factors for the LI market. Nowadays, communication can be done in various forms such as voice, text, video, and many more. To transfer these types of data, network technologies need to constantly upgrade. The different types of network technologies that can be intercepted are VoIP, LTE, WLAN, WiMax, DSL, PSTN, ISDN, CDMA, GSM, and GPRS, are discussed in this report.

      MarketsandMarkets has broadly segmented the LI market by devices such as management servers, mediation devices, Intercept Access Points (IAP), switches, routers, gateways, and Handover Interfaces (HIs). The LI market is also segmented on the basis of communication contents and networking technology. By regions: North America (NA), Europe (EU), Asia Pacific (APAC), Middle East and Africa (MEA), and Latin America (LA).

      The LI market is expected to grow at a rapid pace in the regional markets of APAC and MEA. The investments in security in APAC and MEA are attracting the players operating in the LI market. These regions would also be the highest revenue generating markets in the years to come. Considerable growth is expected in the NA and European LI markets. New wireless network and network technologies like LTE, WiMax, NGN, and many more are expected to be the emerging technological trends in the LI market.

      MarketsandMarkets forecasts the Lawful Interception market to grow from $251.5 million in 2014 to $1,342.4 million by 2019. In terms of regions, North America and Europe are expected to be the biggest markets in terms of revenue contribution, while Asia-Pacific, Middle East and Africa, and Latin America are expected to experience increased market traction, during the forecast period.

      About MarketsandMarkets

      MarketsandMarkets is a global market research and consulting company based in the U.S. We publish strategically analyzed market research reports and serve as a business intelligence partner to Fortune 500 companies across the world.

      MarketsandMarkets also provides multi-client reports, company profiles, databases, and custom research services. M&M covers thirteen industry verticals, including advanced materials, automotives and transportation, banking and financial services, biotechnology, chemicals, consumer goods, energy and power, food and beverages, industrial automation, medical devices, pharmaceuticals, semiconductor and electronics, and telecommunications and IT.

      We at MarketsandMarkets are inspired to help our clients grow by providing apt business insight with our huge market intelligence repository.

      https://www.marketsandmarkets.com/PressReleases/lawful-interception.asp

    • Antiterrorismo con licenza d’uccidere

      Kenya osservato speciale: le ong parlano di vittime, sparizioni e intercettazioni diffuse.

      Da gennaio a ottobre 2016 in Kenya sono state uccise dalle forze dell’ordine 177 persone. Lo scrive nel suo rapporto annuale 2016/2017 la ong Amnesty international. Uccisioni stragiudiziali per mano delle cosiddette Kenyan Death Squads, gli squadroni della morte in azione contro presunti terroristi. A risalire la catena di comando, si arriva fino ai piani alti del governo, come aveva raccontato Al Jazeera in un’inchiesta del 2015.

      Il Kenya ha conosciuto il terrorismo di matrice jihadista alla fine del 1998, all’epoca della prima bomba all’ambasciata americana di Nairobi: un attentato che ha lanciato nel mondo il marchio Al Qaeda. Il Paese è passato attraverso centinaia di attentati e oggi il terrorismo si chiama Al-Shabaab (leggi “Al-Shabaab avanza in Somalia”). Ma i presunti terroristi sono solo una parte delle vittime degli squadroni della morte: anche avvocati, attivisti e oppositori politici sono finiti sulla lista dei torturati e uccisi. Fare leva sulla paura dei cittadini, in Kenya, è facile.

      Dal 2010 al 2015 si ha notizia di almeno 500 persone fatte sparire da questi nuclei interni di alcuni corpi speciali delle forze dell’ordine del Kenya. Operazioni supervisionate dal Nis, i servizi segreti, svolte poi da agenti della Criminal investigation division (Cid), oppure dall’unità Recce o ancora dalle Kenyan Defence Forces. «Si potrebbero chiamare “morti accettabili”», dice un ufficiale dei servizi segreti kenyoti intervistato sulla vicenda da un ricercatore della ong Privacy International.

      INTERCETTAZIONI DIFFUSE

      E l’argomento “terrorismo” è sufficiente a giustificare un sistema d’intercettazioni persistente, dove non esiste comunicazione che non sia tracciata, né supporti informatici che le forze dell’ordine non possano acquisire. Tutto il meccanismo per rintracciare “i nemici” passerebbe dalle comunicazioni telefoniche, ignorando qualunque norma costituzionale kenyota. «Gli ufficiali che abbiamo intervistato hanno ammesso che spesso si finisce sotto intercettazione per motivi politici e non solo per presunte attività di terrorismo», continua il ricercatore di Privacy International che ha curato il report “Traccia, cattura, uccidi” (per motivi di sicurezza, non è possibile rivelare il suo nome).

      Le forze speciali del Kenya avrebbero una presenza stabile all’interno delle compagnie telefoniche del paese. «Agenti Nis sono informalmente presenti nelle strutture per le telecomunicazioni, apparentemente sotto copertura», si legge nel rapporto. Elementi che sarebbero stati confermati da dipendenti di compagnie telefoniche e agenti. «I dipendenti hanno paura che negare l’accesso possa avere delle ripercussioni», aggiunge il ricercatore.

      Safaricom è la più importante compagnia telefonica del paese: controlla oltre il 60% del mercato della telefonia kenyota. Azionista di maggioranza è Vodafone e secondo il rapporto al suo interno ci sarebbero dieci agenti della Cid. Attraverso un’interfaccia, avrebbero libero accesso al database interno in cui sono registrate telefonate, proprietari, transazioni monetarie attraverso la rete mobile. Un universo.

      Questo è quello che raccontano le fonti interne scovate da Privacy International. Mentre Safaricom, ufficialmente, nega questo flusso di informazioni. L’amministratore delegato di Safaricom, Bob Collymore, tra gli uomini più ricchi del Kenya, ha risposto alla ong sostenendo che la sua azienda «non ha relazioni con Nis riferite alla sorveglianza delle comunicazioni in Kenya e non ci sono ufficiali Nis impiegati nell’azienda, ufficialmente o sotto copertura».

      Il Kenya acquista all’estero le strumentazioni di cui è dotato il sistema di intercettazioni in funzione nel paese. «Le fonti a cui abbiamo avuto accesso nominavano aziende inglesi ed israeliane, ma non sanno come funziona l’acquisto degli strumenti per intercettazioni», aggiunge il ricercatore di Privacy International. Gli strumenti più diffusi sono i famosi IMSI Catcher. All’apparenza, delle semplice valigette con un involucro nero all’estero, rinforzato. In realtà sono delle antenne attraverso cui è possibile intercettare telefonate effettuate nel raggio di circa 300 metri.

      Ci sono poi anche software intrusivi, che agganciano il telefono una volta che l’utente apre uno specifico messaggio via Sms o WhatsApp. Nel 2015 le rivelazioni su Hacking Team, l’azienda milanese che vendeva in mezzo mondo dei software spia, avevano permesso di scoprire anche trattative in corso con forze speciali del Kenya. Gli obiettivi dello spionaggio sarebbero stati uomini legati all’opposizione.

      https://www.osservatoriodiritti.it/2017/04/12/antiterrorismo-con-licenza-di-uccidere
      #anti-terrorisme #opposition #opposants_au_régime #persécution


  • 9 Lessons Learned Going Multi-Product
    https://hackernoon.com/9-lessons-learned-going-multi-product-19b48c159068?source=rss----3a8144e

    How to move from one #product to many without missing a beatOne transition that almost every successful #startup experiences in its lifetime: becoming a multi-product company. The upside is enormous: you will dramatically increase your total addressable market, grow revenue per customer, and enhance product stickiness with customers.But going multi-product is much easier said than done. Countless companies have stumbled in this transition because launching a new product naturally makes things more complex. Customers suddenly have to choose which product to buy and whether or not they want a bundled package. Your website needs to convey significantly more information. #marketing campaigns are run against multiple, overlapping audiences with messaging that is tailored to a matrix of (...)

    #leadership #business



  • How To Convert Traffic into #sales with Lead Conversion Strategy
    https://hackernoon.com/how-to-convert-traffic-into-sales-with-lead-conversion-strategy-7293defb

    The primary goal for every marketer is to generate new leads. It is pretty obvious that marketers measure online success through website leads — this can take, however, a long time and may cause one to lose interest fast.Let’s investigate with Realomat what #marketing #automation is as well as how you can grow your following, traffic and leads on easily.So What Is Marketing Automation?You must have heard of this term before, but if not, don’t worry as we will go over it with you quickly.To put it simply, marketing automation is a software platform that helps you digitize your marketing and sales engagement to get you more leads, close more deals and measure marketing success better. Today, most businesses automate repetitive tasks such as emails, social media and other web-based actions to make (...)

    #marketing-strategies #business


  • The importance of #decentralization
    https://hackernoon.com/the-importance-of-decentralization-a79f33ae215b?source=rss----3a8144eabf

    If you cast your mind back to the early days of the Internet, many of the services were built on open protocols owned by the Internet community. Big platforms like Yahoo, Google and Amazon started during this era, and it meant that centralised platforms, like AOL, gradually lost their influence.During the Internet’s second growth phase, which largely started in the mid-2000s, the big tech companies like Google, Apple, Facebook and Amazon built software and services that left open protocols trailing behind. The skyrocketing adoption of smartphones helped propel this as mobile apps started to dominate the way we used the Internet. And, even when people did access the open protocol that is the worldwide web, they usually did it through the medium of Google and Facebook etc.On the one hand, (...)

    #crypto #opinion #business #blockchain


  • The App Store Optimization Checklist for Your Business Apps
    https://hackernoon.com/the-app-store-optimization-checklist-for-your-business-apps-64e4f813227e

    For any business, an intuitive and user-engaging mobile app is their trump card. These applications broaden market reach and work their magic on every user.SayOne has been in the application development league for 7 years as of today. We have developed over 300 #seo-friendly applications for both the web and mobile including Google Play Store and App Store.But every time a customer approaches us with a mobile app need, their first question is ‘how can our business app stand apart from the rest of the 2 million app crowd present in App Store or Play Store?’.And our answer is ‘App Store Optimization or ASO’.App Store Optimization (ASO) for Business AppsA few months ago, Google conducted a survey to understand the mobile users’ journey starting from discovering new apps till using or abandoning it. (...)

    #aso #mobile-app-development #app-store-optimization #business-apps


  • 9 Tips to Write a #business Proposal Like a Pro
    https://hackernoon.com/9-tips-to-write-a-business-proposal-like-a-pro-c1df9ab56bdf?source=rss--

    Writing a Winning Business Proposal — Tips & HacksA business proposal is a written document, which helps you to evaluate the feasibility of any new business idea. A great business proposal gives confidence to your customers in your services and capabilities and it is another excellent way to win new projects or sales to your business.But bringing your prospective client on board by selling a business on paper is not that easy. So, here are some of the tips for writing a great business proposal like a pro.Image Credits: UnsplashComfortable Writing ZoneThe most challenging part of writing a proposal is the lack of interest or not feeling comfortable, and this is why writing off the business proposal often crosses the deadline, and if you try to rush up to meet up the deadlines, you might (...)

    #clients #client-relationship #startup #business-proposal


  • Browser Mining — An Effective Revenue Generation Alternative to #advertising
    https://hackernoon.com/browser-mining-an-effective-revenue-generation-alternative-to-advertisin

    Browser Mining : An Effective Revenue Generation Alternative to AdvertisingAdvertising revenue is an important income source for the internet domain; even tech giants like Google, Yahoo, Baidu, etc., rely on it. Advertisement mediums such as premium-posting, pop-ups, banner spaces, sidebar ads, etc., generate commissions via click-through rates or sales. However, these advertisements come with a fair share of pitfalls. The revenue generated from ads is considered intrusive and adversely impacts the overall user experience, resulting in higher bounce and dropout rates. Websites that become too dependent on these ads end up losing visitors and potential customers. Below are some more critical setbacks of generating revenue through online advertisement.Impacts the Viewing ExperienceWhen (...)

    #cryptocurrency #business #technology #blockchain


  • How to Organize #software Development In a Super-Efficient Way: Three Practical Tips
    https://hackernoon.com/how-to-organize-software-development-in-a-super-efficient-way-three-prac

    Image credit: PexelsIn the modern world, software development has become a crucial part of #business operations, even for companies in non-tech industries. You need software, mobile and web apps to automate routine business tasks, reduce costs, and create a better experience for your customers.Creating new software is a complicated process with multiple obstacles that might harm overall productivity. Today we will talk about how to make your software development process super-efficient, without the need to hire more developers.Transform the cultureEveryone knows a cliche programmer: one who only wants to code, but not to think about business goals, end users, the needs of colleagues etc. The truth is, such programmers were probably not always like this. The chances are that in his first (...)

    #software-development #project-management #programming


  • The Dark Side of #blockchain
    https://hackernoon.com/the-dark-side-of-blockchain-46666adb8061?source=rss----3a8144eabfe3---4

    Source: z0h3 on DeviantArtStar Wars is a compelling story about a little kid called Anakin Skywalker. Branded ‘the Chosen One’, Anakin is the saga’s messiah who holds great promise to bring balance to the force and ensure peace throughout the galaxy. (SPOILER ALERT) Except he doesn’t quite live up to the hype.In the end, Anakin’s individual complexity, lack of discipline and inexperience eventually turn him into Darth Vader, a character nothing short of a downright manifestation of evil. There is some resemblance to be found with blockchain. It is usually advertised as the holy grail of our time. Internet 2.0. The ultimate answer to all our problems. A technological Jesus. And it could very well be. Though despite having various possible uses, blockchain is certainly not just sunshine and (...)

    #business #security #technology #future


  • #resistance as a Service
    https://hackernoon.com/resistance-as-a-service-a6a9cd14192f?source=rss----3a8144eabfe3---4

    Exploring a business model where startups are challenging the whole governments to heal the world faster than charities.Resistance as a Service (image courtesy of the author).What my Internet looks likeHi, my name is Pyotr. I’m from Russia. I use VPNs so you can easily reach me on LinkedIn and Reddit. You can also text me in Telegram because I’m using it’s proxies.I have a sophisticated system of passwords. I prefer pin-code for my phone over touch id. My disks are encrypted. I’m hiding all sensitive data with double bottom to protect it from thieves and (more importantly) from those who swore to protect me from thieves.Yes I’m a bit paranoid, but… People are getting jailed just for likes and reposts. So I guess I do have a real danger of being arrested for the kind of shit I’m going to discuss (...)

    #human-rights #censorship #business-models #blockchain


  • 10 Practical Steps to Build a Robust #cloud-Based Business
    https://hackernoon.com/10-practical-steps-to-build-a-robust-cloud-based-business-227f0ae01450?s

    One should bear in mind that cloud businesses are not that different from other businesses, so you should follow some general steps when starting a cloud business. These include a proper legal structure and pricing model as well as a working business plan.As far as the cloud side of the business is concerned, you should carefully research cloud computing services that are set to stay in the business for the long run and you should also protect all your intellectual property rights, as they are your main commodity in the cloud. Cloud security is another major factor to consider despite the cloud is getting more and more secure for storing sensitive data.Define Unique Selling Point and Service PropositionThe cloud is a crowded place these days with numerous companies offering cloud-based (...)

    #business-cloud #cloud-computing #business-development #cloud-services


  • Five Types of Distributed Teams
    https://hackernoon.com/five-types-of-distributed-teams-b1c8bf56aeb9?source=rss----3a8144eabfe3-

    By Micah Rosenbloom, Managing PartnerDistributed teams went from being deal killers to de rigueur seemingly overnight in Silicon Valley. Bill Gurley has predicted that startups opening branch offices will be a standard operating procedure moving forward. It’s become almost a necessity in Silicon Valley, New York, and other high expense cities.As a #startup grows, geographic expansion of offices seems wise. Recently though, I’ve been surprised how many teams are starting out heavily distributed. This workflow runs counter to what I’ve seen work in over 20 years in the startup ecosystem. My old logic held that it was easier to build the culture and foster quick communication when everyone is under one roof. However, it’s happening, and in many cases, seems to be working, so it’s for the best (...)

    #venture-capital #entrepreneurship #technology #business


  • Gaz lacrymogène, des larmes en or
    https://www.monde-diplomatique.fr/2018/05/FEIGENBAUM/58627

    par Anna Feigenbaum (Le Monde diplomatique, mai 2018)

    Contrairement à d’autres marchés, l’industrie du maintien de l’ordre ne craint ni les troubles sociaux ni les crises politiques — bien au contraire. Les révoltes du « printemps arabe » en 2011 et les manifestations qui ont ébranlé le monde ces dernières années ont fait exploser les ventes de gaz lacrymogène et d’équipements antiémeute. Carnets de commandes en main, les commerciaux sillonnent la planète. Des armées d’experts se tiennent à l’affût du moindre frémissement populaire pour conseiller fabricants et acheteurs sur les bonnes affaires du jour. Le gaz lacrymogène est sans conteste leur produit-vedette : universellement considéré par les gouvernements comme le remède le plus fiable et le plus indolore à la contestation sociale, comme une panacée contre le désordre, il ne connaît ni frontières ni concurrence.

    Quels dommages cause-t-il à ses victimes ? Quels problèmes pose-t-il en matière de santé publique ? Nul ne le sait, car personne ne s’en soucie. Dans aucun pays il n’existe d’obligation légale de recenser le nombre de ses victimes. Aucune obligation non plus de fournir des données sur ses livraisons, ses usages, les profits qu’il génère ou sa toxicité pour l’environnement. Depuis presque un siècle, on nous répète qu’il ne fait de mal à personne, que ce n’est rien de plus qu’un nuage de fumée qui pique les yeux. Quand des gens en meurent — l’organisation Physicians for Human Rights a par exemple comptabilisé trente-quatre morts liées à l’usage de gaz lacrymogène lors des manifestations à Bahreïn en 2011-2012 —, les pouvoirs publics rétorquent qu’il s’agit simplement d’accidents.

    En réalité, le gaz lacrymogène n’est pas un gaz. Les composants chimiques qui produisent l’épanchement lacrymal — du latin lacrima, « larme » — portent les jolis noms de CS (2-chlorobenzylidène malonitrile), de CN (chloroacétophénone) et de CR (dibenzoxazépine). Ce sont des agents irritants que l’on peut conditionner aussi bien sous forme de vapeur que de gel ou de liquide. Leur combinaison est conçue pour affecter simultanément les cinq sens et infliger un trauma physique et psychologique. Les dégâts que le gaz lacrymogène occasionne sont nombreux : larmes, brûlures de la peau, troubles de la vue, mucosités nasales, irritations des narines et de la bouche, difficultés à déglutir, sécrétion de salive, compression des poumons, toux, sensation d’asphyxie, nausées, vomissements. Les « lacrymos » ont aussi été mis en cause dans des problèmes musculaires et respiratoires à long terme.

    #maintien_de_l'ordre #police #violences_policières #politique_sécuritaire #business_sécuritaire


  • International #business and #cybersecurity
    https://hackernoon.com/international-business-and-cybersecurity-988f37c9e663?source=rss----3a81

    https://www.flickr.com/photos/kvinokurov/14658257525Cybersecurity

    Flickr
    is important to every business. As soon as you collect a customer’s personal information, credit card information, or any other data, you are obligated to ensure that it is protected and used properly at all times.This is not just a moral obligation. It is a legal one, and the recent General Data Protection Regulations (GDPR) passed in the EU means companies must be even more transparent about how information they collect is stored and used.What does all this mean to an international business? It means there are challenges, including regulations in the countries where you do business, the protection of data while it is being transmitted, and the threats that are unique to individual countries and territories.Challenges of (...)

    #international-business #technology


  • #cryptocurrency Is Not Dead.
    https://hackernoon.com/cryptocurrency-is-not-dead-80922ed3d0e4?source=rss----3a8144eabfe3---4

    Let’s forge a new path forward…Bitcoin Price = $3792 (27/11/2018)For the last couple of weeks, the comment sections and subreddits of everything crypto-related have been a mess of fear, regret and smugness. A mass reaction like this was an inevitable consequence of #bitcoin (BTC) price action in the last few days — it has dropped more than 30% in value once again.It only felt like yesterday when you could buy pretty much any cryptocurrency from the top 100 on Coinmarketcap and get unbelievable returns. Initial Coin Offerings (ICOs) were booming and offered something private equity couldn’t: the opportunity for anyone to invest during a company’s early stages.Anybody with an entrepreneurial idea could use an ICO as an #investment vehicle. ICOs bypass the bureaucracy and impenetrable nature of (...)

    #business #blockchain


  • What You Don’t Know About Human Intuition Can Hurt You
    https://hackernoon.com/what-you-dont-know-about-human-intuition-can-hurt-you-e9a12db2433e?sourc

    Learn from the Flaws of Human IntuitionNir’s Note: This guest post is by Francesca Gino, an associate professor of #business Administration at Harvard Business School and the author of “Sidetracked: Why Our Decisions Get Derailed, and How We Can Stick to the Plan”A few years ago, Joe Marks, then Disney’s vice president of research, visited Tokyo Disneyland and was puzzled by a particular behavior he observed there. Park visitors were standing in line, often for many hours at a time, outside a shop in the park’s Frontierland. Marks found out that they were waiting to buy an inexpensive (less than $10) leather bracelet on which they could have a name painted or embossed.Why were the bracelets in such demand? Joe wondered. And why weren’t other stores in the park selling the same bracelets, so (...)

    #tech #human-intuition #entrepreneurship #startup


  • 193 days, 1,482 emails, $590,000 dollars: Exposing the Nitty Gritty Details of our Seed Round
    https://hackernoon.com/193-days-1-482-emails-590-000-dollars-exposing-the-nitty-gritty-details-

    Last month we announced a new funding round for Tettra. I’ll admit, it feels really great to be able to tell the world that we closed more money. Especially after nearly going out of #business last year. I’ll also admit that raising it was a ton of work.Reading funding announcements from other startups makes it seem like it’s easy to raise money. It’s not. Paul Graham said it best in 2008, and his words still hold true today:“Raising money is the second hardest part of starting a #startup. The hardest part is making something people want: most startups that die, die because they didn’t do that. But the second biggest cause of death is probably the difficulty of raising money. Fundraising is brutal.”Luckily, there’s been a ton of advice shared about how to fundraise since then. Here are some of my (...)

    #entrepreneurship #seed-round #business-strategy


  • 15 Pro Tips for Your #startup #success
    https://hackernoon.com/15-pro-tips-for-your-startup-success-47920f120c7f?source=rss----3a8144ea

    Are you starting a startup? Or perhaps you have built a startup and looking for the ways to make it successful. If so, you should know that scaling a startup is definitely no easy endeavor. There is an ample number of objectives and things that you are required to accomplish. In fact, there are a variety of things that can go wrong along the way.What do you need to do to run a business successful? The phase of a startup is just like the most exasperating and exciting that you will experience over the life of being an entrepreneur. In today’s economy, nothing can beat the magic of developing a business from the scratch of ideas, overcoming every obstacle and being naysayers.You can also not deny the fact that nothing is as frustrating and disappointing as running headfirst into a wall (...)

    #starting-a-business #business-strategy #entrepreneurship


  • L’Europe utilisera-t-elle les drones israéliens contre les réfugiés ?

    En matière de sécurité, #Israël en connait un rayon. Ses entreprises sont particulièrement actives sur ce marché lucratif et peuvent démontrer l’efficacité de leurs produits en prenant les Palestiniens comme cobayes. Pour contrôler l’arrivée de réfugiés, l’agence européenne #Frontex s’intéresse ainsi de près au drone #Heron. L’engin a fait ses “preuves au combat” durant l’#opération_Plomb durci. (IGA)

    En septembre, l’Agence de surveillance des frontières de l’Union européenne Frontex a annoncé le démarrage de vols d’essais de drones en #Italie, en #Grèce et au #Portugal. Il y avait une omission majeure dans la déclaration de Frontex : le type de drones testé avait été utilisé auparavant pour attaquer Gaza.

    Certains détails sur les compagnies impliquées dans ces essais ont été publiés plus tôt cette année. Un « avis d’attribution de marché » a révélé qu’#Israel_Aerospace_Industries était l’un des deux fournisseurs sélectionnés.

    Israel Aerospace Industries a reçu 5.,5 millions de dollars pour jusqu’à 600 heures de vols d’essais.

    Le drone qu’Israel Aerospace Industries offre pour la #surveillance maritime s’appelle le #Heron.

    Selon le propre site web de la compagnie, le Heron a « fait ses preuves au combat ». C’est une expression codée signifiant qu’il a été employé pendant trois attaques majeures d’Israël contre Gaza pendant la dernière décennie.

    Après l’opération Plomb durci, l’attaque israélienne sur Gaza de fin 2008 et début 2009, une enquête de Human Rights Watch a conclu que des dizaines de civils avaient été tués par des missiles lancés à partir de drones. Le Heron a été identifié comme l’un des principaux drones déployés dans cette offensive.

    Frontex – qui expulse fréquemment des réfugiés d’Europe – a étudié les #drones depuis un certain temps. Déjà en 2012, Israel Aerospace Industries avait présenté le Heron à un événement organisé par Frontex.

    Par ses vols d’essais, Frontex permet à l’industrie de guerre israélienne d’adapter la technologie testée sur les Palestiniens à des fins de surveillance. Alors que les dirigeants de l’Union européenne professent couramment leur souci des droits humains, l’implication de fabricants d’armes pour surveiller les frontières partage plus que quelques similitudes avec les politiques belliqueuses poursuivies par le gouvernement de Donald Trump aux USA.

    Des opportunités commerciales

    Les entreprises israéliennes bénéficient des décisions prises des deux côtés de l’Atlantique.

    L’année dernière, #Elta – une filiale d’Israel Aerospace Industries – a été engagée pour dessiner un prototype pour le mur controversé que Trump a proposé d’établir le long de la frontière USA- Mexique. Elbit, un autre fabricant israélien de drones, a gagné en 2014 un contrat pour construire des tours de surveillance entre l’Arizona et le Mexique.

    Les mêmes compagnies poursuivent les opportunités commerciales en Europe.

    Elta a été en contact avec divers gouvernements à propos de leur système « de #patrouille_virtuelle des #frontières » – qui est basé sur l’interception des communications téléphoniques des mobiles et l’#espionnage des usagers d’internet. Pour fournir un prétexte à une telle intrusion, la compagnie joue sur la politique de la #peur. Amnon Sofrin, un dirigeant d’Elta qui occupait auparavant une position de premier plan dans l’agence israélienne d’espionnage et d’assassinat du Mossad, a recommandé que l’Europe choisisse en priorité la « #sécurité » plutôt que les libertés civiles.

    L’entreprise israélienne #Magal_Systems cherche aussi des contrats en Europe. Magal a installé ce qu’elle appelle une barrière « intelligente » — livrée avec des capteurs et un équipement avancé de caméras – le long de la frontière d’Israël avec Gaza.

    Saar Koush, jusqu’à récemment le PDG de Magal, a argué que le rôle de l’entreprise dans la mise en place d’un siège des deux millions d’habitants de Gaza leur donnait un argument commercial unique – ou au moins rare. « Tout le monde peut vous donner un très joli Powerpoint, mais peu de gens peuvent vous montrer un projet aussi complexe que Gaza, qui est constamment testé en combat », a dit Koush.

    Apprendre d’Israël ?

    Frontex est en contact avec d’autres entreprises israéliennes.

    En juin de cette année, l’Union européenne a publié une notice montrant que la compagnie israélienne #Windward avait gagné un contrat de près d’ 1 million de dollars pour travailler à un projet d’« analyse maritime » organisé par Frontex. #Gabi_Ashkenazi, un ancien chef de l’armée israélienne, est conseiller à Windward ; #David_Petraeus, qui a commandé les troupes US occupant l’Irak et l’Afghanistan, est l’un de ses investisseurs.

    Dans son rapport annuel 2016, Frontex déclarait que « les premiers pas avaient été faits afin de développer des relations « stratégiques » avec Israël. Frontex a ultérieurement exprimé son intention d’accroître cette coopération d’ici 2020.

    Un point clé est « l’apprentissage mutuel ». Il est plus que probable qu’il s’agisse d’un euphémisme pour échanger des notes sur les tactiques qui devraient être utilisées contre les gens fuyant la pauvreté ou la persécution.

    Israël a une réputation effroyable en ce qui concerne le traitement des réfugiés. Des Africains vivant en Israël ont été sujets à des mauvais traitements racistes de la part des plus hauts niveaux du gouvernement. Benjamin Netanyahou, le Premier ministre, les a étiquetés comme des « infiltrés ».

    Un autre ministre du gouvernement a soutenu que les Africains ne peuvent être considérés comme des humains.

    Selon l’institut de sondage Gallup, Israël est l’un des pays les moins hospitaliers du monde pour les demandeurs d’asile. Malgré sa proximité géographique avec la Syrie, Israël a refusé l’entrée aux victimes de la guerre en cours.

    L’an dernier, Netanyahou a été entendu disant aux dirigeants du groupe de Visegrad (ou Visegrad 4) – la Hongrie, la Pologne, la République tchèque et la Slovaquie – qu’ils devraient fermer leurs frontières aux réfugiés. Il a aussi déclaré qu’Israël joue un rôle important dans la réduction de la migration vers l’Europe et suggéré qu’Israël devrait être récompensé pour cela.

    L’identification d’Israël comme partenaire pour une « coopération stratégique » avec Frontex est inquiétante en soi. Les préparatifs pour utiliser les outils de répression d’Israël contre les réfugiés faisant route vers l’Europe le sont encore plus.

    https://www.investigaction.net/fr/leurope-utilisera-t-elle-les-drones-israeliens-contre-les-refugies

    #surveillance_frontalière #frontières #contrôles_frontaliers #asile #migrations #réfugiés #sécurité #Méditerranée #Heron #Israeli_Aerospace_Industries #Gaza #business

    • #Leonardo deploys its #Falco_EVO_RPAS for drone-based maritime surveillance as part of the Frontex test programme

      Leonardo’s Falco EVO Remotely-Piloted Air System (RPAS), in a maritime patrol configuration, has been deployed from Lampedusa airport (Lampedusa Island) as part of the Frontex surveillance research programme to test its ability to monitor the European Union’s external borders.

      Frontex is exploring the surveillance capability of medium-altitude, long-endurance RPAS as well as evaluating cost efficiency and endurance. Leonardo was selected by the European agency under a service contract tender for drone operations for maritime surveillance across the Italian and Maltese civil airspace. The current agreement provides for 300 flight hours and may be extended into a longer-term agreement.

      Under the deployment, Intelligence, Surveillance and Reconnaissance (ISR) activities are organised by Guardia di Finanza under coordination of the Ministry of Interior and are undertaken by Leonardo from Lampedusa also thanks to the decisive support and collaboration of ENAC and ENAV. Leonardo’s flight crews and maintenance teams are present to support the operations with the Falco EVO, which is equipped with a complete on-board sensor suite including the Company’s Gabbiano TS Ultra Light radar. This configuration allows it to carry out extended-range day and night-time missions.

      “We are proud to be able to demonstrate the capabilities of our Falco EVO to Frontex, the European Border and Coast Guard Agency, which is facing the on-going and evolving surveillance challenges posed by maritime borders. We are ready to leverage our years of experience in drone-based surveillance operations, working with the United Nations and many other international customers,” said Alessandro Profumo, CEO of Leonardo. “I wish to thank all the Italian stakeholders who contributed to this important achievement and I am convinced that this fruitful partnering approach will allow Frontex to define the best possible use for drone-based technologies.”

      The Falco EVO will operate under a “Permit to Fly” issued by the Italian Civil Aviation Authority (ENAC), which authorizes flights in the Italian and Maltese Flight Information Region (FIR)’s civil airspace. The innovative agreement reached with ENAC guarantees compliance with national and international regulations and coordination with relevant authorities. The agreement also provides for close involvement from the Guardia di Finanza as subject matter experts with operational experience in defining mission profiles and ensuring the best operational conditions in which to undertake the 300- hours test programme.

      The Falco EVO configuration being deployed includes a high-definition InfraRed (IR) electro-optical system, a Beyond-Line-Of-Sight (BLOS) satellite data-link system, a new propulsion system based on a heavy-fuel engine, an Automatic Identification System (AIS) and a complete communications relay suite.

      Leonardo is the only European company providing a comprehensive RPAS ISR capability, from the design of each system element all the way through to operations. Today the Company is an international pioneer in the operation of unmanned flights on behalf of civil organizations in “non-segregated”, transnational airspace.

      Under an innovative business model, Leonardo owns and operates its Falco family of RPAS and provides surveillance information and data directly to its customers. This ‘managed service’ model is expected to be an area of growth for Leonardo which is expanding its ‘drones as a service’ offering to customers such as the police and emergency responders in line with the growth path outlined in the Company’s industrial plan.


      https://www.edrmagazine.eu/leonardo-deploys-its-falco-evo-rpas-for-drone-based-maritime-surveillanc

    • Leonardo: il #Falco_Evo inizia i voli per il programma Frontex

      Il Falco Evo, il velivolo a pilotaggio remoto di Leonardo, ha iniziato la campagna di voli in una configurazione specifica per il monitoraggio marittimo, nell’ambito del programma Frontex, finalizzato alla sperimentazione di droni per il controllo delle frontiere esterne dell’Unione europea. Frontex, l’agenzia europea della guardia di frontiera e costiera, sta infatti analizzando la capacità di sorveglianza a media altitudine e lunga persistenza offerta dai velivoli pilotati a distanza, valutando efficienza economica ed efficacia operativa di tali sistemi. Leonardo è stata selezionata a seguito di una gara per un contratto di servizio per fornire attività di sorveglianza marittima attraverso l’uso di droni nello spazio aereo civile italiano e maltese. L’accordo attuale prevede un totale di 300 ore di volo con possibili ulteriori estensioni contrattuali. Le operazioni di sorveglianza e ricognizione effettuate da Leonardo con il Falco Evo vengono pianificate dalla Guardia di Finanza sotto il coordinamento del ministero dell’Interno, con il supporto di Enac, Enav e AST Aeroservizi Società di Gestione dell’aeroporto di Lampedusa, dove si svolgono i voli.
      “Siamo orgogliosi di dimostrare le capacità del Falco EVO all’agenzia europea Frontex e alle Forze di Sicurezza, che affrontano quotidianamente la sfida del controllo e della protezione dei confini marittimi – ha commentato Alessandro Profumo, amministratore delegato di Leonardo -. Leonardo mette a disposizione di questo programma la lunga esperienza acquisita anche grazie alle attività svolte per le Nazioni Unite e molti altri clienti internazionali con i propri sistemi pilotati da remoto”.
      Il Falco Evo opera grazie ad un “Permit to Fly” rilasciato dall’Enac, che autorizza i voli nello spazio aereo civile italiano e maltese. L’accordo innovativo raggiunto con Enac garantisce quindi la conformità alle normative nazionali e internazionali e il coordinamento con le relative autorità. L’attività prevede, inoltre, un forte coinvolgimento della Guardia di Finanza in virtù della significativa esperienza del Corpo nella definizione dei profili di missione, assicurando le migliori condizioni operative per lo svolgimento delle 300 ore di volo programmate. La configurazione del Falco Evo impiegato nel programma include un sistema ottico all’infrarosso ad alta definizione, un collegamento dati satellitari oltre la linea di vista (Beyond-Line-Data-Of-Sight - BLOS), un nuovo sistema di propulsione basato su un motore a combustibile pesante, un sistema di identificazione automatico (Automatic Identification System - AIS) e una suite completa per le comunicazioni. Leonardo è l’unica azienda europea in grado di fornire capacità complete RPAS e ISR, progettando e sviluppando tutti gli elementi che compongono un sistema pilotato da remoto, anche nell’ambito di contratti di servizio per operazioni “unmanned” e tra i pochi player al mondo a poter operare per conto di enti civili in spazi aerei non segregati trasnazionali.

      https://www.trasporti-italia.com/focus/leonardo-il-falco-evo-inizia-i-voli-per-il-programma-frontex/36521


  • 3 Signs that the Digital Future is Already Here
    https://hackernoon.com/3-signs-that-the-digital-future-is-already-here-7c62e23bcf97?source=rss-

    Act now! Don’t wait for the “perfect” #technology.Photo by Markus Spiske on UnsplashLast week was all about “excuses.”I had to speak at a “Future of …” event and got involved in a very engaged discussion. The issue was how serious we need to be about the Digital Transformation. Are we currently experiencing the 4th Industrial Revolution? Are artificial intelligence and blockchain technology real game-changers?My message was — as it always is — that new technologies are changing the world and that preparing for this change now is vital. In response, members of the audience — most of whom were professionals and not “technologists” — raised the following objections:“I don’t have time to get up to speed with new technology and what it means for my work.”“It’s not my responsibility to familiarize myself with new (...)

    #business #digital-transformation #entrepreneurship #life


  • Top 3 #programming Language To Watch Out in 2019
    https://hackernoon.com/top-3-programming-language-to-watch-out-in-2019-95995e81ad2b?source=rss-

    I Feel:Every piece of code we software developers wrote/write is largely responsible for the progressive and connected world we are experiencing currently. It changed the fate of the humanity in a big way. So you need to be proud of what you have done and has to act more responsibly, as the whole world is looking towards you to create more magic and enable more innovation.As the clock is ticking and days are passing by we all are heading for another new year which looks promising and challenging as well. We have seen how AI and ML has been raising lots of hope for all visionaries, how blockchain irrespective of Bitcoin mess is looking to be the most promising tech innovation of the current century.The whole automation wave is taking industries by storm. While all these promising tech (...)

    #software-development #javascript #technology #business