Watch the video to listen to the talk
Note: you can see the slides on slideshareI will briefly talk about Smart Cities or Smart Citizens: Which is the Future? We couldn’t have chosen a better venue than Barcelona to talk about smart cities -- this beautiful city is internationally recognized as one of the shining examples of smart cities in the world -- you can see for yourself at the “Smart City BCN” website: http://smartcity.bcn.cat/ My presentation is from the perspective of over
You can watch the interview on this Youtube video
Q: What are the effects of the Northern Sea Route on global economy?
(NB) The Northern Sea Route refers to the sea route from the Far East to Bering Sea over the North Sea and the Arctic. It’s a shorter route between the Far East countries and Europe than going through the Suez Canal. Recently the Chinese container ship “Yong Sheng” made a trip from Dalian to Rotterdam over the Northern Sea Route and it took 15 days less
Ivy Barkakati is DJ-ing in H&M Lounge at Primavera Sound festival in Barcelona
Today (May 29, 2015) -- at the H&M Lounge in PrimaveraSound in Barcelona¡Hoy la música del H&M Lounge la pone Ivy Barkakati! #HMLovesPrimaveraSound pic.twitter.com/tpPEdl0fDS— H&M España (@hmespana) May 29, 2015-17 a 17:45h -18:30 a 19:30h -20:25 a 21:30h -22:30 a 23h
Click below to watch the video
Strategic adoption of technologies, especially bringing in new ones as they become viable, is key to the success of every organization whether it’s delivering pizzas or launching a spaceship. It’s important to have a framework that enables the CTO or chief technologist to monitor and guide, what I call, the “technology intake” -- how new technology is identified, piloted, and brought into operational use in a slow, but steady manner. I call it a strategic fra
No need to read, just watch this video :-)
Bitcoin is virtual money, but without any central bank or authority to maintain or vouch for your account. Instead it’s all done in a decentralized manner using cryptography.
It’s traditional to explain anything involving cryptography using Bob and Alice, so I’ll do the same. To send or receive bitcoins, both Bob and Alice will run a bitcoin client software on their computer and they will create bitcoin wallets -- each wallet i
Note: This is a toast -- in Enlglish and then in Spanish -- to my daughter Ivy and son-in-law Arnau at their wedding reception in Barcelona at meeatings23 It was a great reception with friends and family and excellent food cooked by a chef in the kitchen next door to the room where we celebrated. By the way, my prepared text, shown below, does not fully match the video because I improvised :-)
English versionGood evening everyone. We are very happy to gather here today with our
As I explained in another video, 3D printing is essentially a way of constructing a 3-dimensional object by putting down thin layers of material. The 3D printer deposits the layers by using information from a computer file that describes the object’s 3-dimensional shape. So, in essence, you can create any object once you have a 3D printer, the material for the object, and the computer file that describes the object’s shape. This can really shake things up when it comes to manufacturing products,
3D printing is a lot in technology news nowadays. It’s essentially a way of constructing a 3-dimensional object by putting down thin layers of material. You can understand it best by looking at an example (see my video for the details).
Suppose you needed an object of a certain shape for a project. In the past, you'd have started with a block of material and removed the parts you don't need to arrive at the desired shape. That's "subtractive manufacturing" where yo
Remember that Advanced Persistent Threats (APTs) take advantage of vulnerabilities in software such as the Web browser, Microsoft Office applications, or Adobe Acrobat to install malware (think of malware as bad software) -- usually a remote access tool (RAT) on your system that communicates with the attacker through command-and-control servers. As an individual, your best defense against these attacks is to make sure that you apply all available software updates. On Windows systems, you can set
Advanced Persistent Threat or APT is the latest buzzword for the newer cybersecurity attacks where some bad piece of code gets downloaded to your computer without your explicit knowledge and then it stays around to be used by a remote attacker to do whatever they want to do -- usually spread to other systems and to steal interesting information from your and your organization’s systems. Here’s how an APT typically work.
For a targeted attack, an attacker may gather info
As the summer wedding season gets going, as the proud father of the bride, you may have to deliver a brief welcome speech at the reception. If so, here's my "father of the bride" speech for you to use as an example. This one is also an exception to the 3-minute rule for my NBTMV videos -- weighing in at almost 6 minutes, but you can't blame me for being long-winded; after all, this is my daughter's wedding and the first one at that!
Below is the speech as I had prepared it, but
We visited Lisbon, Portugal for a week in late February 2012 and enjoyed it very much. We rented an apartment and explored the city on our own. As usual, I started by buying a copy of Lisbon travel guide to figure out the layout of the city and then searched for apartments on VRBO.com near Rossio, which is one of the main areas of the city.
We found an apartment called Casa Travessa that was located a short walk up the hill near Rossio, the busy central plaza. The apartment served a
Cybersecurity is so much harder than physical security! In physical security, you have a well-defined physical perimeter -- your doors, windows, gates etc -- to watch and protect, but in cybersecurity the perimeter is not well-defined. Think of cybersecurity for a typical home or business -- you usually have a box -- the “router,” perhaps a wireless one -- that lets you connect your network of PCs and other devices to the Internet via your Internet Service Provider. Although there is a single ph
In a previous video I talked about the importance of assessing the impact of technology before adopting it. Today I want to talk to you about the impact of increased use of facial recognition technology. You may have already heard about the use of facial recognition technology to detect the mix of male and female customers at bars. Facial recognition technology is also used to identify people on the street or in a crowd.
Facial recognition is what is known as biometrics, which is identifi
If you want to lose weight, here's a story to help and motivate you.
I always knew that good food with fewer calories and exercise are important to manage your weight, but when he was young did not follow this advice. My diet included lots of rice and very little exercise. So, over many years, bit by bit, I gained weight. When I was 44, my weight was over 200 pounds. Around this time, I had a stroke of good luck. My youngest daughter wanted to run in a 5K race and asked me to run wi
Si quieres perder el peso, aquí está una historia para ayudarte y motivarte.
Siempre sabía que buena alimentación con menos calorias y ejercicios eran importantes para manejar su peso, pero cuando era joven no seguía este consejo. Comía mucho arroz y hacía poco ejercicios. Así que, hace muchos años, poco a poco, me gané peso. Cuando tenía 44 años, pesaba más de 200 libras. Al rededor de este t
Biometric technologies use specific features of your body such as fingerprint, facial image, iris pattern, or even the geometry of your hand, to identify you. Assessing the impact of using biometrics depend on the exact type of use. If your laptop has a fingerprint reader where you swipe your finger to log in, then all we may need to worry about is the possibility that the system somehow could not match your fingerprint with what was previously stored in the system, in which case, there sh
As more and more of us begin to rely on cloud services, security is definitely one of the topmost concerns on our mind. From the user’s perspective, whether it’s an individual or an organization, cloud security translates to protecting the information that you’re storing on the cloud. You want the information to be available when you want it, and not be shared with anyone that you don’t want to share with, and make sure that nobody changes that inform ation without your permission or knowledge.
(Rules are meant to be broken.... so here's a video that's not 3 minutes, but almost 30 minutes long... for you to peruse when you have some time :-)
Here are the slides to follow along as you watch the video or just browse and read the transcript of the talk...
Naba barkakati it solutions for new business - keynote - kisdi-global-conference 2010
View more presentations from Naba Barkakati Good afternoon!
First, I wanted to thank our host — the Korea Inform
In this video I provide an update on my video recording setup at home. For the last few months, I have been using the same setup, recording the videos with a Panasonic Lumix DMC-LX3 digital camera, which has been performing very well but that it doesn’t have an external microphone input and I thought I could improve the sound quality of the video recording by using a camera with an external microphone so I began searching and I found this website called snapsort.com where you can pu
Happy new year. I bought a Sony Alpha NEX-3 camera with an external stereo microphone and I’m recording this first video of 2012 using that camera. I hope this video sounds better than my old videos recorded without an external microphone.
It’s early enough in the new year that there’s still time for you to make some new year’s resolutions and follow through on them. Here are three ideas for new year’s resolutions, for each of which I have videos and other information in my blog.The
As you know from my previous videos, I have been using a 3-step process for learning to speak Spanish: (1) Listen and Repeat, (2) Listen and Understand, and (3) Start Speaking (and as I have said, you also have to study vocabulary and grammar along the way). For me, the “start speaking” step was easier said than done and it may be the same for you. Even though I gained some basic Spanish speaking capability from my “Listen and Repeat” step using the Pimsleur method, I had the usual fear of makin
It’s important to assess the impact of technology before using it either in a product or for your or your organization’s use (for that matter, for the nation’s use as well). Let’s start with an example. Suppose you are a cell phone manufacturer and you decide to capture all user actions so that you can “debug” -- fix problems -- when something goes wrong and also improve performance when you see some parts of the system not performing to expectation. Capturing user actions is a perfectly valid a
I have been using a 3-step process for learning to speak Spanish: (1) Listen and Repeat, (2) Listen and Understand, and (3) Start Speaking (of course, you also have to study vocabulary and grammar along the way). For the Listen and Repeat step, if you use the Pimsleur method, as I did, then you’d have already learned the basics -- Spanish pronunciation, alphabet, numbers, days of the week, and so on and you would be speaking some Spanish already. However to get ready for conversations in Spanish
If you are a typical Google+ user, it’s either “famine or feast” when it comes to your Google+ stream. When you first join, the stream is in a “famine” stage with new posts appearing few and far in between. Perhaps all you have are your posts and those from members of your family who reluctantly joined Google+ at your urging even though they’re already on Facebook :-)It’s easy to get out of the “famine” once you realize that you can add other interesting people to your circles even if they don’t