article thumbnail

Cybersecurity 2030

Haft of the Spear

Discussions about cybersecurity overwhelmingly focus on the recent, which are our responses to the design and engineering decisions of the past. Yet in cybersecurity [1] the path towards a brighter future is rarely discussed. To parahprase William Gibson, this cybersecurity future is already here, it is just not evenly distributed.

article thumbnail

Egypt’s e-commerce platform Wasla nabs $9 million from retail finance provider Contact

TechCrunch

Contact has been in the business of consumer finance since 2001, while Wasla was founded in 2018 by former Serag Meneassy and Taymour Sabry , both ex-Rocket Internet entrepreneurs, and investment banker Mahmoud El Said. “It’s In the checkout phase, we plan to introduce a very secure payment method…limited by time or value.

eCommerce 223
Insiders

Sign Up for our Newsletter

This site is protected by reCAPTCHA and the Google Privacy Policy and Terms of Service apply.

article thumbnail

Hand Labeling Considered Harmful

O'Reilly Media - Ideas

We need to use expertise efficiently: the financial cost and time taken for experts to hand-label every data point can break projects, such as diagnostic imaging involving life-threatening conditions and security and defense-related satellite imagery analysis.

article thumbnail

Good to Great. Are you ‘good’ or maybe slightly below?

Strategy Driven

Good to Great was published in 2001 way before social media dominated the scene. Measure new customers secured. In 1996, I wrote this customer service truth: “It never costs as much to fix the problem as it does to not fix the problem.” Eighteen years later, that statement has never been more true. Many of them self-serving.

article thumbnail

IT Governance Maximises IT Returns

The Agile Manager

The net effect is that it drives down the value of IT, just as the same uncertainty drives down the value of a security. 3 The credit rating of mortgage backed securities created significant misinformation in risk exposure. The inability to demonstrate functional completeness of a solution (e.g, 7 The same applies to IT.

article thumbnail

Achieving the Best by Preparing for the Worst: Lessons Learned from High-Profile Crises, part 1 of 4

Strategy Driven

There have been far-reaching business after-effects from the attacks on September 11, 2001. In the fourth quarter of 2001, there were 408 extended mass layoff events, involving 114,711 workers, directly or indirectly attributed to the attacks. Net income or loss includes those items. million jobs were affected by the.

article thumbnail

AoAD2 Practice: Incremental Design

James Shore

Distributed processing, persistence, internationalization, security, and transaction structure are commonly considered so complex that you must consider them from the beginning. This was in 2001, when the library ecosystem was much less mature. I disagree; I’ve dealt with them all incrementally. Shore 2004a].