Wednesday, March 30, 2016

Faster Fast Food

McDonald’s new app has just launched online ordering in test markets and is looking to launch a customer loyalty program early next year. McDonald’s aims to create faster and more accurate service with their new ordering system. With the loyalty program McDonald’s aims to collect more data on customers in order to personalize their experience
With online ordering through the app McDonald’s believes it will get rid of the risk of people who get impatient with long lines and leave. Forbes predicts that there will be a 10% spending increase in sales due to this new app feature. With the upcoming loyalty program McDonald’s aims to create a more one on one interaction with customers. They will be able to collect data on behavior and preferences that they cannot collect in stores. They will see spending habits, frequency of visits, and more. The company hopes to also collect more customer feedback through the new app. McDonald’s plans to use push notifications to lure in customers who haven’t been to the restaurant lately to promote more business. Starbucks and Dunkin Donuts already have successful loyalty programs that have drastically increased sales and McDonald’s, although late to jump on the bandwagon, hopes to do the same. Currently, the app has 10 million downloads since late last year and they predict a very high increase after both new features are launched. One successful part of the app that is already featured is the ability to play McDonald’s monopoly instead of having to use their website. McDonald’s monopoly is their most popular sweepstakes game. It offers more convenience which is the main target for all features of the app. 

Forbes failed to mention in the articles exactly how the McDonald’s loyalty program and online ordering will work. What perks will one earn and how long will it take or how much money do you need to spend in order to get loyalty rewards? If a customer orders online to avoid lines will there be a separate line for pick up? Do customers pick what time they want to pick up? Can customers pick up the food in the drive-thru or go in the store? If they use drive-thru won’t they just have to wait in line with all the other cars anyway? With the food being made so fast currently, how will the online order food stay fresh? With Starbucks being a more expensive drink company, it lures in more need for rewards. Will customers feel the need to have a loyalty program with such a cheap food option like McDonalds? Do consumers feel the need to get a free $1 fry unlike a $5 latte. McDonald’s is expected to have a huge increase in stock prices due to the new app whether or not it will have forecasted problems. 


http://www.forbes.com/sites/greatspeculations/2016/03/30/now-testing-mobile-ordering-on-the-mcdonalds-app/#549d973d2c17

Amazon Utilizes Facial Recognition Technology

Amazon, the online retail and technology company, is creating a new way for customers to verify their identity at checkout-- with a selfie. Using facial recognition software, Amazon hopes to eliminate password security measures, making purchases safer. Amazon has not launched this new innovation yet but the system would prompt users to blink or smile to ensure the right person is at the checkout, not a hacker or computer program. Facial recognition software is an expert system, increasing in popularity as security issues grow. It works through a series of algorithms that match computer data to human faces. The technology is used extensively in police surveillance to recognize suspects. Amazon strives to utilize the latest information systems available to provide the best customer experience. Online retail continues to increase in popularity and Amazon has certainly grown as a result. Amazon often takes an unconventional approach to IT in order to ensure customers are met with convenience and the company benefits overall. As the article points out, passwords are a dated technology that can easily be hacked and taken advantage of. Similarly, users often forget or lose passwords and must go through steps to recover web accounts. With facial recognition, both Amazon and the customer can feel safe making online sales and purchases. The artificial intelligence behind facial recognition software utilized by Amazon increases the human element technology often lacks. Other companies, including Master Card and Windows are also developing and employing facial recognition systems as a means of protecting user’s personal technology accounts and diminishing fraud.

In viewing this technology from all sides, it is important to note that facial recognition software assumes users have access to a smartphone or personal computer with a high definition camera. While it is true many American consumers use smartphones, not all of Amazon’s customers will be able to pay with a selfie. Another possible downside would be the technology failing. If the expert system cannot identify a user's face at any given point, Amazon will lose a customer. Unless the technology is 100% accurate, Amazon will need to have a backup or secondary form of customer identification. According to PBS, facial recognition technology is most accurate in a controlled environment with proper lighting. John Gabrieli, a neuroscientist at MIT, explains that computer algorithms have not been able to fully capture facial recognition on the same level as the human brain. While the technology will continue to develop, computer scientists are working to program computers in a way that mirrors the human brain.

Amazon's patent includes the following sketch of moving facial recognition software: 


http://money.cnn.com/2016/03/15/technology/amazon-selfie-payment/index.html
http://www.pbs.org/wgbh/nova/next/tech/the-limits-of-facial-recognition/    

India's Mining Industry uses Tech to Increase Efficency

India’s rapidly growing economy has increased the demand for various metal ores, which are mined from deposits in various parts of the country. Illegal mining and various forms of scamming, however, have plagued Goa, India. In response to these problems, new technology from Telematics4u is enabling India’s mining operations to be both more self regulating and more efficient, increasing buyer’s confidence in purchasing their ores. The system is enabled through GPS trackers installed on shipper’s trucks and weight sensors stationed outside mining sites. The weight sensors can determine how much ore is in the truck and the GPS trackers can monitor the location of the ore. All this information is collected and monitored at a company called Telematics4u. This provides India’s mines with unprecedented accuracy in terms of how much ore was actually moved from the mine and where it is at any given time.
            One major advantage of Telematics4u’s new system is it gives India’s mining companies unprecedented information about how much ore was actually moved from their mines. The scale systems used are more accurate than the standard models that most of the mines were previously using. Also, the mining companies can contact Telematics4u anytime to collect information about the weight of ore moved out of their mine, making it easier for mines to keep record of inventories and detect fraud.
            A second advantage is the tracking of the ore while in transit. Only transporters who have the tracker installed on their vehicles are authorized to haul for mines using Telematics4u systems. Thus, mining companies can be assured that they will be able to have access to information pertaining to the exact location of their product in transit, as well as information on how fast its moving. Having access to driver’s locations provides transparency and can be important when dealing with customer service issues and potential thefts.
            A third advantage of the system is the increase in buyer confidence. Due to widespread corruption in the mining industry, certain mining areas in India were banned from doing business in 2012 as a result of India law[1]. This can put pressure on markets, and increase the cost of ore to buyers. As the new system helps to assure legitimacy, it can help stabilize India’s mining industry and make prices and the market more predictable and stable for buyers.
            One thing over looked in the article is the cost associated with installing this technology, as well as its reliability. Indian mines may be very conscious of spending, and may not be interested in this technology if it is too costly to install and operate. In addition, certain areas of India may experience frequent technological problems, which may result in the Telematics4u’s servers being down at random periods of time.









[1] http://economictimes.indiatimes.com/industry/indl-goods/svs/metals-mining/mining-turns-to-technology-to-end-fraud-and-bring-transparency/articleshow/51624816.cms

Vision vs. Ultron: The Future of Artificial Intelligence

The purpose of IS is to be able to use technology to better perform tasks and integrate technology to make a process run more smoothly, quickly and accurately.  Typically this is done by human analysis and research in order to find ways to better use technology. However, what if there was a way to circumvent the need for human inter-mediation?   This is where Microsoft's, as well as other large name companies such as Facebook and Google, are attempting to break new ground. The use of Artificial Intelligence is becoming the status quo.  Companies are encouraging their consumers to interact with the AI in order to things like get help with a product, order something offline, or other menial tasks like schedule an appointment.  However, the past of AI is muddled with mistakes. In recent news, the failed release of the AI "Tay" remarks some of the caution that most people have against trusting AI.  Within 24 hours of its release, the bot was taught to praise Hitler, claim Bush orchestrated 9/11 and show a strange affinity for illicit drug use. In theory, AI being taught to handle user input is a fantastic venture.  However, the learning for the AI must take place in a safe environment where they cannot be so easily corrupted. Once the AI has learned some basic do's and don'ts its potential for success is limitless. Amazon's "Echo" utilizes AI to help make suggestions to their user and to process commands.  Much of the success for the AI seems to depend on how it is implemented and certain rules/knowledge embedded in its creation.
        The article does a good job of analyzing the failures of AI, but it only slightly mentions the successes.  AI has a very long and arduous journey to even come close to being as widely accessible, and successful, as depicted in some science fiction. It also does not seem to highlight that ventures into the world of AI have been as early as the late 90's and early 2000's. AI has come a long way since then, but still has quite the trek remaining.
        The article also could do a better job representing the interactions of AI today.  It does mention complex and rare examples like "Echo", but neglects even the simpler forms of AI like the bots in computer games. These are much more common place, but not as typically thought of as meaningful forms of AI.
        AI has a future in the world. Some people are ready for it, others are very hesitant because of examples like "Tay". Hopefully examples like "Echo" will persuade the masses that AI is meant to be for our betterment. This article is a decent means for introducing the reader to a world with which they are not familiar.

http://www.bloomberg.com/features/2016-microsoft-future-ai-chatbots/

A Rising Issue: Drones and their Interference with Air Traffic

Drones are probably used most frequently by hobbyists who fly their drones for fun and make cool videos by using the video capabilities of their drones.  While this may seem like a harmless hobby, the FAA has reported that there has been a number of close encounters between drones and actual air traffic.  The threat of collisions between drones and airplanes has resulted in the creation of the Digital Notice and Awareness System (D-NAS).  D-NAS is a way for air traffic control and drone users to be able to monitor a drone's location and to see whether or not it poses a threat to nearby airplanes.  The system was developed by a start-up called AirMap, and can be accessed through the apps of the various drone manufacturers.  

An article from the Washington Post outlines that D-NAS works by having drone users input their drone's flight radius as well as the intended flight time.  The system will then take this data and send it to air traffic control at nearby airports to help the airports keep track of how many drones are in the area and whether or not they pose a threat to aircraft.  Another added benefit that the article points out is that D-NAS allows drone users and air traffic control to view a map that points out exactly where drones are flying in real time.  In addition to real-time monitoring drones, D-NAS will also store that drone's location to track the patterns of drone flights around specific airports.  The article mentions one particular air traffic safety manager that said he would be able to analyze the data so that he could see the most popular locations for flying drones and use that as a basis for where to post caution signs.

While the article mentions that there have been, "764 drone sightings near airplanes in 2015", it does not expand on this and leaves me wondering just how big of a problem these drones are for planes anyway.  First, how frequent do incidents involving drones and planes occur? Second, how serious of a problem could it be if a drone and a plane were to collide?  A different article from the Washington Post notes that there were 25 truly serious incidents where a drone and a plane came within only a few seconds or feet of colliding, and that there were about 176 total incidents from June 2015 to November 2015.  As to the severity of a drone-plane collision, many aviation safety experts have stated that if a drone were to be sucked into a jet engine or even collides with a plane's propeller then the damage could be catastrophic.  I think one major aspect that has been largely overlooked is that drones in general are mostly unregulated.  While there are some restricted drone flying areas, they can be very difficult to enforce.  By tracking a drone's location, D-NAS allows air traffic control the ability to better monitor their restricted areas.

Source #1 https://www.washingtonpost.com/news/innovations/wp/2016/03/29/how-airports-and-the-drone-industry-are-teaming-up-to-protect-planes/

Source #2 https://www.washingtonpost.com/world/national-security/near-collisions-between-drones-airliners-surge-new-faa-reports-show/2014/11/26/9a8c1716-758c-11e4-bd1b-03009bd3e984_story.html



HPE Hybrid Cloud Strategy Hinges On Synergy Platform

Jessica Davis recently published an article titled HPE Hybrid Cloud Strategy Hinges On Synergy Platform, which explains Hewlett-Packard Enterprise’s new modified cloud system that they recently launched called Synergy. This system is designed to function enterprise cloud essentials for both public and private clouds.  Synergy offers users the option to create their own internal cloud infrastructure that operates the same way as an infrastructure of public clouds would. Interestingly, this article points out that Synergy is capable of handling any type of application and workload, and once the application or workload is no longer needed the information will return to the pool for the sake of being repurposed for the next application or workload. Another interesting point made in this article was the three key components of Synergy. The first component offers a unified API. The second component provides consistent pools of resources for the applications and workloads to operate. Lastly the third component states that Synergy is already equipped with software-defined intelligence, which includes OneView Composer, Image Streamer, and Frictionless update. Another interesting point made in the article was the mention of HPE’s upcoming launch of their new open source tool called Grommet, which will enable nontechnical people to run infrastructure resources from a simple Web interface.

As I believe this article does a sufficient job at explain this new cloud system developed through IT, I feel that the author overlooked some points she mentioned in her article. First off, Davis mentions that Synergy is intended for flexibility rather than dedicated infrastructure for specific applications. However, she neglects to mention why flexible cloud systems are better than dedicated infrastructures. The reader is left to question whether Synergy might be better for certain enterprises than others. Next, I would suggest that the author further explains what Grommet is and whether or not it is to be used with Synergy. I say this because she only mentions that it is a new open source tool for non-technical people. So I wondered if Grommet and Synergy are used together in order to make resourcing easier for everyone. However, I did like that Davis mentioned HPE’s newest releases such as HPE Hyper Converged 380 and Grommet. I believe by mentioning these new releases she is trying to call attention to the fact that HPE is focusing on creating more efficient and cost friendly ways of storing and computing applications and workloads.
Article Source: http://www.informationweek.com/cloud/platform-as-a-service/hpe-hybrid-cloud-strategy-hinges-on-synergy-platform/d/d-id/1324892?

Apple Vs F.B.I.

For my third blog post, I have chosen to write about an article discussing the United States governments ability to hack into the iphone. The iphone in question has been highly publicized after the U.S. government asked and then attempted to sue for the rights of a master key to apple products. The phone in question was owned Syed Fizwan Farook, one of the gunman in the San Bernadino attack last year. In the article, a range of topics including Apple security, F.B.I. hacking, and possible hacking techniques that were used.
Three major points that this article pointed out were the F.B.I.’s breakthrough in hacking the phone, how the government might have gone about doing it and Apple’s security division. The critical part of this article is that the F.B.I. was finally able to bypass the iphone’s security and access the data. While the F.B.I did not release information saying how they did it but it is known that they consulted with a third party in order to do it. This is so important because we now know that the government can bypass some the current security and break into iphones. The article then speculates how the agency might have gone about doing this. The article speculates that the F.B.I. would have used a NAND mirror chip in order to duplicated the memory of the iphone chip. Once it was mirrored, they then could guess a many password as they wanted. If they got locked out they they could simply restart and try again. The third topic discussed that I found important was Apple’s security division. Apple’s security division has seen a lot of turnover recently and some question how quickly they will be able to discover and fix the hole in the system. Since Apple has placed so much importance on the security of their products, many believe that if a solution is not provided relatively quickly it would hurt the brands reputation.
            While reading this article I had a few ideas that I felt were overlooked. First and most importantly I was concerned with the legality of the situation. The government spent months trying to hack and break into Apple’s iphone firewall, and while they did it to break into the one iphone the hack will work across all phones with the same software. The next part I believe was overlooked was Apple products as a whole. Since everything Apple is connected through the cloud, is all Apple data for an account now vulnerable or is it limited solely to the iphone. The third part I think that was overlooked were the long term repercussions for Apple. Does Apple have a new giant issue because the F.B.I was able to hack one phone after months of trying to, or do they merely have to figure out what the F.B.I. did to get in and fix that?


Works Cited
http://www.nytimes.com/2016/03/30/technology/apples-new-challenge-learning-how-the-us-cracked-its-iphone.html?ref=technology&_r=0