« March 2015 | Main | May 2015 »

April 30, 2015

Confluence 2015: Inspiring Us To Be More

Posted by Sumit Virmani (View Profile | View All Posts) at 12:29 PM

confluence15.jpg

The energy here is so palpable that one can almost touch it. The buzzing precincts of San Francisco Marriott Marquis suddenly seem incredibly electric. Nearly 800 delegates, including our clients from around the world, industry analysts, advisors and our ecosystem partners are gathered here, for Infosys Confluence 2015, to deliberate, discuss and debate how technology can make it possible for all of us to push the limits, make our businesses stronger and do all that we can imagine. Indeed, Be More.

While this overwhelming participation and celebration stands testimony to the three-decade strong relationship we've forged with our stakeholders, there's certainly more to it. I believe it is the dialogue Infosys has started about the new next-generation business challenges that these industry leaders are trying to get their arms around. Enterprises today continue to be challenged by the traditional concerns around efficiency and growth, while at the same time, they are witnessing fundamentally new kinds of problems for which there are no best practices yet. Infosys recently embarked on a journey to address these dual concerns through the Renew-New strategy. The renewal of the known - bringing massive, transformational improvements to our traditional services by bringing continuous innovations through automation, repeatability and AI. And simultaneously, focusing our creativity and imagination on the unknown - completely new kinds of solutions, open-source based, next-generation elastic platforms to solve the new kinds of problems. In other words, be the next-generation technology services provider. And what better place to see all this innovation in action than at Infosys Confluence 2015!

I suspect the magic of this day also has something to do with the incredible opening keynote by General Colin Powell, Former United States Secretary of State. A self-made man who climbed the highest echelons of the U.S. army and the government, Powell explained the role of leadership in unravelling some of the knottiest challenges of our times. Drawing from his experiences in the US Army, he reinforced how leadership is not as much about the leader as much as it is about the followers, and how trust plays a crucial role as we focus on inventing great futures for ourselves and others. This is indeed a timely message for all of us who have started on this incredible journey of being more - together.
 
The next two days will unfold an impressive lineup of keynotes, panel discussions, and solution showcases - all examining various dimensions of the next-generation services model - being digital, the entrepreneurial mindset, amplifying efficiency, pain-free transformation, among others.
 
But this gathering is not only about business and more business. Because Infosys and many of our client partners believe in learning for life and hold that technology and learning can greatly amplify human potential. After all, every day we all see how computing technology can improve an average person's ability to be more productive. Through the Infosys Foundation USA and the NGO 'Hack the Hood', a hackathon was flagged off today for youngsters from under-represented communities. Tomorrow, these youngsters will hack away and show the world that lack of resources, exposure, prior skills and STEM proficiency are no longer barriers for individuals seeking to advance their computer programming skills.
 
What a perfect start to Confluence 2015!

April 24, 2015

Security & Apple Pay

Posted by Dr. Ashutosh Saxena (View Profile | View All Posts) at 11:45 AM



Is Apple Pay Vulnerable to Hacking? [Source: https://www.youtube.com/watch?v=Nf9iopf9Ars]

There are certainties in life. The sun will rise in the east and set in the west. And, rest assured, any Apple product you buy is going to be connected to every other Apple product currently on the market. But what about Apple Pay, the mobile payment service and digital wallet that the company unveiled in fall of last year? How does its connections to other Apple products help or hinder it?

Let's start at the very beginning. The initial idea behind Pay was to help consumers make payments using Apple mobile devices. Apple Pay would accomplish this feat by replacing the credit or debit magnetic strip at credit card terminals. Apple partnered with an array of blue-chip companies, including American Express, MasterCard, and Visa. At first, all seemed to be operating smoothly: Apple Pay worked with Visa's PayWave, MasterCard's PayPass, and American Express' ExpressPay terminals.

But in January of this year, DROP Labs, a mobile payments/commerce strategy and advisory practice, found that banking institutions were verifying users and cards over the telephone. They reported that fraudsters had successfully used Apple Pay as a conduit for transactions using counterfeit cards. While Apple Pay's inherent security mechanisms, such as tokenization and TouchID biometric authentication, had not been compromised, the tools and practices used to verify account holders and the cards being loaded to 'i-devices' appeared to be the weak link.

The fraud has more to do with identity theft than breaking into Apple's encrypted biometric payment service. The cyber-criminals are setting up new iPhones with stolen credit card information, then impersonating the victim using other information easily found online by social engineering, thus tricking the bank into thinking they are the authorized user in order to verify the new card. Given that criminals can easily purchase credit card details and other personal data off black market sites, it is a relatively easy scam operation compared to elaborate infiltrations of large retail chains like Target.

In the case of Apple Pay, it's interesting to note that banks are actually the ones doing the authentication, not Apple. And each bank can have its own method of authorizing cards. Naturally, banks want to make it easy and seamless for customers, but at times, it is a trade-off between usability and security.

Although banks are ultimately responsible for authorizing a card, they must also cross-check the recent activity of a certain card, along with information provided by Apple and then determine the course the action. Retailers (online or otherwise) should also ask for proof of identification at check-out. I believe Apple can play a more important role in the verification process. For example, at the time of signing up for Apple Pay, Apple should insist on an out-of-bounds second factor, one-time PIN issued by the bank to register a new card on an i-device. This one-time effort on the part of the user will ensure that Apple Pay remains secure, without compromising ease of use.

Apple already stands out in the crowd for seamless connectivity between its products. With an added layer of security for its devices (and new products like the Apple Watch), Apple's sun will continue to rise.

April 22, 2015

Carbon Divestment Becomes a Financial Imperative

Posted by Aruna C. Newton (View Profile | View All Posts) at 10:42 AM



Pricing Carbon: It's About Our Economy & Our Future [Source: https://www.youtube.com/watch?v=PQPDGfeRoS8]

Today, we celebrate Earth Day.

This day takes many of us out of our comfort zones, which is what it is designed to do. It forces us to think about the finite natural resources we have on what the astrophysicist Carl Sagan once referred to as "that little blue dot" floating around in space. It's the only home we have, so we might as well do everything we can to take care of it.

Sometimes that's easier said than done. For years, carbon divestment strategies were in the sole realm of universities and were based completely on moral issues. That moral high ground is nice, but something is happening around the world to transform it into a financial imperative. As that transformation takes place, more people, governments, and corporations are sitting up and taking notice.

There's a riveting new study that comes out of a joint research effort between Amundi, Europe's largest asset management firm, the Swedish pension fund AP4, and Columbia Business School. What researchers from those three entities have discovered is that investments in companies that are based on fossil fuels, for instance, are still very lucrative. So how to lessen an investment's exposure to fossil fuels but still receive the kinds of fat returns that they provide?

The World Bank recently reported that 40 countries and 22 cities, states, and provinces that account for nearly a quarter of the planet's greenhouse gas emissions are on their way to establishing carbon pricing mechanisms. The more that entities place what essentially amounts to a carbon tax on greenhouse gas emitters, the more ways there will be to hedge a successful investment against what are still very profitable carbon-based firms. What the researchers did was to approach the massive index provider MSCI to create what's called the MSCI Global Low Carbon Leaders fund.

What an investor gets is lower exposure to companies that emit greenhouse gasses. But the index is also set up in such a way that it anticipates the growing carbon surcharges that governments continue to levy on greenhouse gas emitters. As the taxes grow, many fossil fuel-based companies will be forced to look for newer methods of energy to create and to sell. And the taxes will also make it cost-prohibitive to follow up on what were until recently very lucrative endeavors.

Consider, for example, Canada's Alberta Tar Sands. There's a lot of oil locked up in those sands, but it takes a lot of effort to get to it and refine it. Add to that fact that the Organization for Economic Cooperation and Development estimates that carbon taxes will reach $60 per metric ton by 2030 and $80 per metric ton by 2040. With taxes as high as those, what fossil fuel company would want to spend a lot of funds and effort trying to extract oil from tar sands? Doing so wouldn't make financial sense.

True, the world is a long way away from settling on one set of carbon pricing principles. But it will happen someday. And when it does, those investment funds that have been set up to hedge against greenhouse gas emitters will be brilliantly positioned to reap the benefits. So this Earth Day, think about what can be done now to make things a reality in the decades to come.

April 16, 2015

Great Strides in A.I. Come From Video Games

Posted by Dr. Srinivas Padmanabhuni (View Profile | View All Posts) at 9:54 AM



Computer teaches itself to play games - BBC News [Source: https://www.youtube.com/watch?v=nwx96e7qck0]

Artificial Intelligence (A.I.) has been on our minds and our innovation agendas since at least the 1950s, when a bunch of science fiction TV shows included friendly robots. But what the public really thought about A.I. was probably best captured in the late 1960s classic, 2001: A Space Odyssey, when the computer HAL becomes smart enough to take over the spaceship.

I never subscribed to the notion that A.I. would result in a sinister plot by computers to take over the world, or even the recent furore over 'safe A.I.' However, I do believe that it is important to focus on what the core task of A.I. has been - that is, trusted self-learning machines help humans liberate themselves from menial tasks so that they can concentrate on solving larger, complex problems.

So it was with great interest that I read about a new computer that has mastered some 50 video games on the classic 1980s gaming console, the Atari 2600. Those of you who are reading this and are under the age of 40 probably won't even know what the Atari 2600 is, or how popular it was in the late 1970s and early 1980s. It was an important device in that it brought video gaming into people's homes - you could hook up the console to the television set and play a number of well-known games that first appeared in public arcades. Remember Pong, Space Invaders, Asteroids, and Pac-Man?

Each game took a while to figure out and (eventually) master. That's what made the 2600 such a commercial success. Its owners were constantly creating new game cartridges that children would add to their collections once they became tired with a previous game. It appears as though a program known as the deep Q-network (DQN) has mastered many of these vintage video games by teaching itself.

At first, aficionados of A.I. compared DQN to IBM's supercomputer Deep Blue, the machine that beat chess champion Gary Kasparov in 1997. But remember that Deep Blue was programmed to be a chess-playing machine. Likewise, I was also reminded of the work on the computer program Chinook, which was declared the Man-Machine World Champion in checkers in 1994. Chinook was developed at the University of Alberta (which also happens to be my alma mater!) much before Deep Blue.

DQN, on the other hand, taught itself how to play each Atari game and eventually became really good at playing them - no outside assistance provided. In fact, DQN is giving rise to a new term: 'general A.I.' It's ushering in a new era of computers that can indeed teach themselves how to do certain things on their own.

One expert wrote that what made the DQN such a success with 1980s video games is that it uses two A.I. techniques: deep neural networks, a cornerstone of A.I. research since they were developed in the early 1980s (when, ironically, the Atari was at the height of its popularity), and reinforcement learning, modeled on behavioral psychology.

What watchers of A.I. progress are so excited about is that the DQN is adaptable, much like humans and animals. The big difference between a brain and a computer was that the latter always had to be programmed with a specific set of instructions on how to behave. Without specific instructions, it wouldn't be able to teach itself to overcome problems and think for itself. Now that the DQN has shown us that a machine can indeed be adaptable, the floodgates have truly opened.

My prediction is that enterprises will be asking themselves the ways in which they could apply this self-learning computer technology to their own business models. Think of all the tasks currently accomplished by humans that can someday be performed by A.I.-enabled machines. Across verticals, A.I. has proven itself by performing a range of tasks such as fraud detection, diagnosis, language translation, social media analytics, etc. to name a few. Even in IT services, there is a wave of robotic automation helping to take on repetitive tasks in remote IT support, or remote process support.

It's yet another sign that we're living through an era defined by a new human revolution.

April 13, 2015

Automotive Megatrends 2015: Connected Vehicles

Posted by Jeff Kavanaugh (View Profile | View All Posts) at 7:52 AM

I attended the recent Automotive Megatrends conference in Detroit (Dearborn, actually, across the street from Ford world headquarters). It was an exciting event, with 500 participants, an exhibit hall, and 45 speakers who showcased three prevailing trends in the automotive industry: powertrain innovation, vehicle light weighting, and connected vehicles. It was a powerful statement about US manufacturing, and I was proud that my firm (Infosys) was a major sponsor.

While powertrain and light weighting are vital to improved mileage and performance, I was keenly interested in the connected vehicles track. This marriage of Detroit and Silicon Valley has energized the entire industry, and on the surface, it seems to reinforce the renaissance of American manufacturing overall.

The Connected Vehicles track had something for everyone. The large OEMs discussed their approaches to telematics, and their successes and failures along the way. Greg Ross of GM talked about a global connected customer experience. Their flagship OnStar product already has seven million customers and growing rapidly, and the monthly call volumes and interactions are already mind-boggling. The infrastructure and support implications are scary, but then again, the revenue and diagnostic opportunities from all those interactions and sensor readings are attractive as well.

Paul Asel of Nokia Growth Partners discussed two forces for change: in the short-term, innovation will be driven from the outside in, propelled by software and services, and usher in the dawn of Intelligent Driving. Long-term, it will be from the inside out, from hardware and infrastructure, and becoming a more pervasive Intelligent Mobility.

Connected vehicles aren't just about the physical connection - they are also improving the human-machine interface. Today there is isolated information management and adaptive driving and steering. However, the industry is heading toward holistic integration of information and assistance systems. The user experience designer and the engineer are becoming partners to deliver a compelling experience to a set of drivers with continually increasing expectations.

Connected vehicles are on the road to becoming autonomous vehicles, or as Sam LaMagna from Intel put it, it becomes as much about the compute as the commute. To make it happen, we will require an auto grade-computing platform.

It's now about the software, not just the hardware. This is also giving rise to an interesting set of allies: open source and secure connected vehicles. While conventional wisdom may view open source as not secure, there has been a 45% drop in car thefts, partially due to the increased use of open source technology in vehicles. Even if you are not worried about your physical security, chances are you are fretting about data security and privacy issues. This is also becoming a significant component of the connected vehicle technology stack, especially when tampering with the data can have safety or privacy impact.

Why all the fuss about connected vehicles? There is profit in connectivity, with revenue estimates over $30 billion if the assumptions hold true. After all, there is a reason that Apple and Google are now in this market. Connected vehicles require a rethinking of strategy. Let the app developers develop the apps, and OEMs control the data, from personal devices, vehicles, and the environment.

How can this industry adopt more agile and faster ways of working? Rohit Kedia, Infosys Manufacturing regional head believes that the answer may lie in non-traditional ways and non-traditional competitors. His lunch keynote covered how mature industries like automotive need to look outside the usual competitors for innovation - and threats. Apple and Google are not just cool tech companies with best practices to emulate. They are now both in the auto business. And of course there is Tesla, born and raised in Silicon Valley and proudly proclaiming itself to be a software company that makes cars (not a car company that makes software).

What does that mean for manufacturers? Are OEMs doomed to suffer the fate of telecom providers, who invested billions into data networks and then saw Google and other internet-based firms achieve billion dollar valuations before they barely crossed 100 workers? Not necessarily. As several speakers reinforced, automakers should allow the tech companies to handle the entertainment aspects of connected vehicles, but maintain tight control over the platform and own the data. The frenzied, rapid-prototyped, quickly launched software mindset has reached the world of physical products, and the old operating models (not to mention the products) will never be the same.

One of the coolest talks was about the Willow Run Automated and Connected Vehicle Facility, a 400-acre facility in the heart of the 'smart vehicle' corridor in Detroit. By building out this dedicated test track to simulate the real world and collect relevant data, it is reinforcing Detroit's prominence in the brave new world of connected vehicles. Ironically, this scary disruptive technology may be just the thing that provides the automotive industry a new lease on life - the connected vehicle trend is one of the most exciting things to happen to the auto world in decades, and it is capturing the imagination of a whole new generation of buyers.

What will next year's Megatrends be? After all, 2015 was supposed to be the year of the Hoverboard from Back to the Future. When it does finally arrive, perhaps it will be connected too.

April 10, 2015

Can Style Trump Technology?

Posted by Amitabh Mudaliar (View Profile | View All Posts) at 9:53 AM



Will Fashion Fall for Apple Watch? [Source: https://www.youtube.com/watch?v=HmgvnGmSOyM]

If there's one thing the great Modernist movement of the mid-20th century taught us, it's that form follows function. We live in world pretty much defined by that mantra. As the technology around us becomes more sophisticated, it's clear that what we focus on as consumers is how the technology can liberate us. The styling or the packaging comes in a distant second.

Or does it? I have been fascinated by various reports that Apple, anticipating the launch of its long awaited Apple Watch, is training its sales associates to emphasize the styling of the Watch. Training its sales staff to discuss fashion is incredibly new territory for a technology company like Apple. So much so that a prominent Apple follower recently wrote that many of the company's newest hires come not from engineering firms but from the likes of luxury fashion retailers such as Burberry, Yves St. Laurent, Tag Heuer, and Louis Vuitton. Sales associates are being given crash courses in how to deal with would-be buyers of the watch by using age-old luxury retailing tactics - not something a technology company and computer maker has typically had to think about.

In the coming months, a visit to an Apple retail outlet might include certain strategic approaches from the staff, including determining to what extent a consumer knows about the new timepiece. Doing so, says experts, allows Apple to decide whether or not to take a shopper right into the sale process or direct her to retail staff specifically trained to teach and answer questions about the Watch. Plus, Apple Store associated will ask questions in order to determine which Watch model to sell to the customer. Questions like: "What does your current watch look like?," "How do you plan on using your Apple Watch?," "Which Apple Watch look matches your personal style?," "Do you prefer leather or metal bands?," and "Are you more of a classic or modern watch enthusiast?" will help the store efficiently classify the consumer into a particular category.

Why are they changing their entire approach to retailing their products? Why is a technology touting style before it talks about function? It's all about the upgrade, dear readers. When potential customers begin answering questions related to fashion, then the associates can slip in questions about iPhone upgrades. An Apple insider says that sales associates will talk about newer iPhone models if a customer uses an iPhones older than the iPhone 6 and iPhone 6 Plus. One of the things we all know is that a consumer needs an updated iPhone to get everything she can out of the new Apple Watch.

Besides establishing a brilliant new sales strategy, the debut of the Apple Watch marks an important point in the evolution of personal technology. The growing popularity of the Internet of Everything and global connectivity means that we as consumers will think less about the technology underpinning the devices and more about the devices themselves. Case in point: When was the last time you thought about electricity and the utilities grid that feeds your home and business the power? Probably not too recently (unless you experienced a power outage!). The same is true of the Internet of Everything. Fairly soon, the IoT will be so ubiquitous that consumers won't think about connecting to the Internet so much as they will about how stylish the devices are that deliver them that global connectivity.

So when I hear that customers can begin visiting Apple stores on April 10th - two weeks before the Watch goes on sale - it all makes sense. Apparently its sales staff will be prepared to classify consumers into four categories: Watch & Sport types, the more upscale Edition crowd, those who simply have lots of questions about the device, and those who simply want to try it on for the first time. If the 20th century was about form following function, then the 21st might very well go down in history as the period when a New Human Revolution began to change consumer attitudes about technology. It's getting more and more important that a consumer be stylish as well as high-tech.

April 9, 2015

Cell Phones Change the Way Money Moves

Posted by Rajashekara V. Maiya (View Profile | View All Posts) at 9:08 AM



Financial Services for Everyone - Agent Banking in the Democratic Republic of Congo [Source: https://www.youtube.com/watch?v=qFwR7JWaQPY]

The mobile digital device is changing the world in more ways than you think. In the field of microfinance, for example, the humble cell phone is revolutionizing the rift between the world's richest and poorest communities.

Microfinance has officially been around for decades. But it was a labor of love in that loan organizations sent representatives to some of the remotest areas on earth to sign people up for loans and make the payments in person. Now, however, a cell phone connection allows budding entrepreneurs in even the poorest of countries to solicit and receive loans digitally. They don't have to wait for the banker to come to their villages with signed bank checks.

According to latest reports, by 2020, almost 70% of the world's population, including those residing in emerging economies, will have super computers or smartphones in their pockets. In countries like Indonesia and Philippines, the financial inclusion rates are less than 30%, but mobile penetration is above 70%. The figures speak for themselves - we are witnessing a revolution in which money will move quicker and in more ways than we can imagine. In fact, the president and CEO of microfinance giant FINCA, Rupert Scofield, recently said in an interview that digital devices are so radically changing the loan landscape that financial and relief enterprises are having to re-draw their traditional loan programs. Clearly this is a problem everyone enjoys having to face: the ability to bring more funds to underserved areas of the world.

For their part, FINCA is embracing the overall technological progress by advocating biometric fingerprint scanning for borrowers. Sensors allow more borrowers without national ID cards to access much needed funding. Big Data has also enabled loan agencies to verify where the funds are going so that there is less fraud. Transparency is just one of the results of how digital devices are letting more people access loans. They can connect to outlets via their mobile phones and be verified by certain loan agencies almost instantly.

In the old days, that kind of verification could take weeks, according to Scofield, who refers to the onset of digital borrowing as the 'second great disruption' in the history of microfinance. The first great disruption was when microfinance agencies began traveling to the global south some four decades ago and letting would-be entrepreneurs know that funding for innovative ideas truly exists and is accessible.

What many microfinance organizations are doing is the logical next step: They're teaming up with large telecommunications firms to reach more people.The borrowing process is currently changing because of smartphones, credit scoring, and the power of Big Data. But the genesis of every great idea begins with a person. That's something that digital tools will never replace. They'll simply make their access to much needed funding all the more seamless.

Indeed, digital power is making the 40-year-old field of microfinance far more productive. Not unlike the effect of digital on almost every other global enterprise. It won't be long before someone in the world's most impoverished village will be able to submit a loan request via her mobile phone and get an answer within minutes. Consider the fact that today, according to FINCA, in a country like Nicaragua, there are 550 clients for each loan officer. So the work of loaning funds can only go so quickly.

When digital tools fully replace these officers, much needed funding will get to those who are requesting it. The next financial powerhouses could very well come out of the emerging markets. Given the right digital tools and funding, these entrepreneurs will be able to bring their fresh perspectives on global trade and disrupt markets that have traditionally been dominated by Western firms.

April 2, 2015

With the Internet of Things Comes Hidden Risks

Posted by Dr. Ashutosh Saxena (View Profile | View All Posts) at 9:07 AM



CyberPatriot Prepares Students to Protect the Internet of Everything [Source: https://www.youtube.com/watch?v=u1tBJNdZQuc]

Of all the unsettling stories of our Internet age, perhaps none is creepier than computer miscreants hacking into home video cameras or security systems. Whenever I hear an expert or colleague sing about the merits of the Internet of Things (IoT), I remind him or her of their home security systems that could be hacked by creepy outsiders. The story, though unsettling, puts things in perspective. That is, as wonderful as the IoT will be for our personal lives overall, what with all the conveniences involved, we have made a deal that is a formidable one - one in which our privacy and security is forever compromised.

That's why we have to be more vigilant - like it or not. Convenience and the wonders of technology come with a price. Besides, the IoT is already just about everywhere. There are nearly five billion connected things and this number could climb to 25 billion by 2020, according to the folks at Gartner. Now it is true that the IoT promises a smoother life, such as the ability for consumers to keep track of their groceries and energy consumption on their cell phones. We will even receive alerts when milk is running low. Everything, including our homes and our heartbeats (did you see the recent Apple iWatch event?) will be monitored to make our lives more flexible and downright easier.

Then there is the not totally unrelated topic of privacy. Companies convert information to valuable knowledge about our every move. They open personalized advertisements on various smart gadgets similar to the online users on websites in the name of personalizing the shopping experience. Another school of thought goes something like this: Such uses of the IoT are invasions of privacy. Security is an offshoot of privacy. Or maybe more accurately I should be framing my argument as the universal right to privacy and security. Right now, some intruder is getting ready to out-smart TVs, thermostats, home automation hubs, alarm systems and other common domestic devices including fridges, ovens, door and window sensors, motion detectors, video cameras and recording mechanisms. Why? Well, these gadgets are all connected via the cloud to a mobile device or the web. Any web technology is hackable. Cyber intruders can access home video cameras or security systems remotely, without the owner's knowledge.

Some people say that IoT is actually worse than an insecure space as it is typically based on the solutions that links network, application, mobile, and cloud technologies together into a single ecosystem. Hackers love to intrude because of weak passwords, insecure password recovery mechanisms, and poorly protected credentials. Valid user accounts can be identified through feedback received from reset password mechanisms, credential input and sign-up pages. Transport encryption is essential for all communications that travel across the Internet to protect sensitive data. Otherwise it is a cakewalk for the hacker. To help manufacturers, developers, and consumers better understand the security issues associated with the IoT, the Open Web Application Security Project (OWASP) is a project designed to enable users to make better security decisions when building, deploying, or assessing IoT technologies.

As we all prepare for an interconnected future, businesses and governments must come up with new laws and policies. And they must keep up with developments. The European Union, for example, outlined such measures in its report on 'IoT Privacy, Data Protection, Information Security.' One recommendation is to develop privacy-friendly default settings on IoT products and services that would give users more control over what information is shared with others. Furthermore, it suggests that IoT networks give individuals the rights to their own data.

Now if we could only track down the miscreants who hack home video systems!

Search InfyTalk

+1 and Like InfyTalk

Subscribe to InfyTalk feed

InfyTalk VBlogs: Watch Now

Infosys on Twitter