SDG’s and the Ethics of Technology

In the series Star Trek: Voyager we find that the character Seven of Nine is a former Borg drone, who becomes disconnected from the Borg Collective, and faces the challenges of becoming a human individual again while still depending on Borg cybernetic implants. An important part of her survival and ability to deal with these foreign implants are the nanorobots that …

SDG’s and the Ethics of Technology Read More »

US Senate Committee on Blockchain

On August 21st, 2018, the U.S. Senate Committee on Energy and Natural Resources held a public hearing on Energy Efficiency of Blockchain and Similar Technologies. The purpose of the hearing is to consider the energy efficiency of blockchain and similar technologies and the cybersecurity possibilities of such technologies for energy industry applications. In particular, should we expect …

US Senate Committee on Blockchain Read More »

Embracing the Charter of Trust

The Charter of Trust, an initiative of Siemens AG, was introduced during the 2018 Munich Security Conference and offers baseline standards for Cyber Security. The Charter of Trust recognizes that the digitalization of our society, factories and infrastructure must evolve hand in hand with Cyber Security. As the network of partners committing to the Charter …

Embracing the Charter of Trust Read More »

Back to the Future Cyber Security – Chapter 5, Episode 2: Access denied

Thumbs up when Cyber Security is done the right way! When Cyber Security is done the right way, we see a combination of a team taking their responsibilities serious, and a team which is using technology as part of the solution and not as goal. That is the only way to do the right things …

Back to the Future Cyber Security – Chapter 5, Episode 2: Access denied Read More »

Back to the Future Cyber Security – Chapter 5, Episode 1: PS phone home

There are plenty examples of where Cyber Security failed and how expensive that could be. It is good that we point out these problems, especially when they could have been prevented. And there is another reason to expose Cyber Security issues and hacks. As a recent poll among Twitter users shows, trust in organizations and …

Back to the Future Cyber Security – Chapter 5, Episode 1: PS phone home Read More »

Marketing anecdotes and why the cloud is called the cloud

There are some pretty cool anecdotes about great marketing campaigns which started with an unintended statement or misunderstanding. Some of these anecdotes might not reflect the actual events or are twisted a bit to make the story cooler but isn’t that what anecdotes are all about? These are my favorite marketing anecdotes and let’s start …

Marketing anecdotes and why the cloud is called the cloud Read More »