April 2017 Digital Edition

Click Here

March 2017 Digital Edition

Click Here

Feb. 2017 Digital Edition

Click Here

Nov/Dec 2016 Digital Edition

Click Here

Oct 2016 Digital Edition

Click Here

Technology Sectors

Market Sectors

Homepage

Oil drilling in ANWR moves ahead as part of Senate tax bill

Republicans took a major step forward early Saturday in their decades-long fight to open a piece of the Arctic National Wildlife Refuge to oil drilling.

Included as part of the sweeping tax reform bill passed by the Senate in a 51-to-49 vote is a highly controversial provision to allow energy exploration in a 1.5 million-acre swath of ANWR known as the “1002 area,” which lies along the coast. In total, ANWR spans more than 19 million acres.

The drilling provision was seen as key to getting Sen. Lisa Murkowski, Alaska Republican, on board with the tax bill.

“Opening the 1002 Area and tax reform both stand on their own, but combining them into the same bill, and then successfully passing that bill, makes this a great day to be an Alaskan,” she said in a statement after the measures passed. “I thank all of the senators who spent time learning about our opportunities and needs, and who joined us tonight in voting for Alaska. We are grateful for their support and eager to take the next steps for this pro-jobs, pro-growth, and pro-energy legislation.”

Drilling in ANWR has become of the most high-profile fights in history between energy advocates and environmentalists. Those who favor oil drilling say only a small portion of the pristine area will be affected, and that exploration can be done safely; environmentalists maintain that opening any piece of ANWR to drilling sets a dangerous precedent, and they contend that an ecologically disastrous spill is inevitable.

The issue has split Republicans. Sen. Susan Collins of Maine has previously voted against ANWR drilling, as has Sen. John McCain of Arizona. Both supported the measure Saturday.

There’s also notable Republican opposition in the House, which has already passed its own tax measure without an ANWR provision.

Ahead of Saturday’s vote, a dozen House Republicans wrote to House Speaker and Senate Majority Leader Mitch McConnell urging them to remove ANWR drilling from any tax-reform efforts, arguing that there’s simply no need to drill in such a sensitive area.

“After years of debate, the Arctic Refuge stands as a symbol of our nation’s strong and enduring legacy,” reads the letter, signed by Rep. Brian Fitzpatrick of Pennsylvania, Rep. Dave Reichert of Minnesota and other Republicans. “Any development footprint in the Refuge stands to disrupt this fragile, critically important landscape.”

Environmental groups vowed to continue their opposition, and a host of lawsuits are expected if the provision is signed into law by President Trump.

“Sen. Murkowski’s big sellout to the oil industry must be stopped. An international treasure and America’s conservation legacy are at stake. We’ve been fighting to protect the Arctic National Wildlife Refuge for more than 30 years. We won’t let it end like this,” said Jamie Rappaport Clark, president and CEO of the environmental group Defenders of Wildlife.

Approaching video forensics with fresh intelligence

New AI technology that mimics the human brain can help law enforcement and intelligence organizations rapidly identify patterns, objects and faces in large amounts of archived and live streaming video

 

Video is a critical element in crime prevention and investigation, yet current law enforcement systems are increasingly unable to cope. The sheer volume of surveillance material captured and stored every day is staggering, and set to rise dramatically. Adding more cameras to gather more information will only ever be useful if processes to search and analyze the mountain of data keep pace. As it stands vital information may be missed because the vast majority of video is simply never viewed. 

 

Information technology firm Cisco estimates than in 2021 it would take more than 5 million years to watch the amount of video traffic across the globe – each month. Market researcher IHS forecasts that 127 million surveillance cameras and 400,000 body-worn cameras will ship this year, in addition to the estimated 300 million cameras already deployed. By 2020 it is predicted there will be more than 1 billion cameras operated by smart cities worldwide, providing 30 billion frames of video per day. Internet video surveillance traffic alone increased 71 per cent in 2016 according to Cisco, and is set to increase sevenfold by 2021. Globally, 3.4 per cent of all video traffic crossing the internet will be video surveillance.

 

Give that a major problem for surveillance operators is directed attention fatigue, where the brain naturally alternates between periods of attention and distraction, it would require a superhuman effort to identify and classify all these images. What is required is a system that is never distracted and can work in conjunction with people to reduce errors, which is what artificial intelligence-driven video systems promise. 

 

AI in video surveillance can potentially deliver four times the performance of conventional video search – in contrast to human vigilance, which studies have shown can degrade by 95 per cent after about 20 minutes.

 

The cost of deep learning

 

Since 2012, when AI video analytics took off, the systems trained to recognize objects and facial IDs from different types of image have proved expensive to run and slow to compute, and require large datasets to generate results. These systems, which are based on convolutional neural networks (CNNs), employ an AI technique known as ‘deep learning’. They excel at churning through data but lack the ability to refine and react to streams of information gathered from the surrounding environment – which the human brain is extremely good at.

 

What’s more, CNNs exhibit limitations including poor noise immunity, particularly when random pixels appear in an image due to noisy sensors or lens contamination. They can serve false classifications if the network becomes confused – for example by someone wearing glasses, or if it cannot find a new face in a crowd without a large set of labelled images relating to that face being added to the database. The network parameters of CNNs need careful adjustment, and even then the accuracy rate for correct image classification may not be sufficient for video surveillance applications.

 

Spiking neural networks

 

A relatively new approach is the spiking neural network (SNN), which simulates and models the different aspects of the human brain’s operation much more closely than a CNN.

 

For instance, a police department that is looking for a suspect in live video streams does not have thousands of images of that suspect; nor does it have weeks to train a CNN system. In an SNN-based system, it can find patterns and people in videos in milliseconds and from a single image – which, importantly, can be as small as 24 x 24 pixels: it doesn’t need to be high definition. The system excels in recognition in low-light, low-resolution, noisy environments, making it ideal for the large amount of previously installed video surveillance systems.

 

Unlike current CNN technologies that require extensive pre-labelled datasets and expensive cloud-based training and acceleration, an SNN system can be implemented in software with traditional computer processors (CPUs) and trained on-premises. The one-shot technology learns in real time and requires only modest processing power – typically a Windows- or Linux-based x86 desktop computer or server – as well as consuming little energy.

 

This enables a greater number of law enforcement organizations to capitalize on the opportunities offered by AI. It means AI algorithms can be used with legacy systems without requiring expensive hardware or infrastructure upgrades, and it can be deployed in the field in highly secure environments that may not have cloud connectivity.

 

Tasks that seemed impossible for machines just a few years ago are becoming almost routine, and SNN technology has perhaps the greatest potential to bring valuable new capabilities into mainstream automated video surveillance today.

 

About the author:

Bob Beachler is Senior Vice President of Marketing and Business Development at BrainChip. He can be reached at: [email protected]

REVOLUTIONARY UK SECURITY PRODUCT SET TO MAKE STREETS SAFER FOLLOWING TERRORIST ATTACKS

A British-designed road block system, which can withstand the force of a 5,500lbs vehicle travelling at 30mph, is headed to the United States in response to last week’s New York City terrorist attack in Manhattan.

Surface Guard has been developed by ATG Access, the world’s leading innovator of bollard and vehicle barrier systems. Surface Guard is the first system of its kind designed to protect pedestrians from targeted vehicle attacks, and meets the latest international standards along with a full suite of independent testing.

With the holiday season approaching and more events likely taking place, hundreds of Surface Guard units will be dispatched to the US by the end of November to deter possible attackers from targeting crowded locations.

Unlike many traditional barriers, no heavy machinery is required to install the Surface Guard system.  Four men can close off a roadway in under an hour.  Designed to allow pedestrians and cyclists to flow freely through the system, Surface Guard has also been developed to allow emergency vehicles to pass through access points if necessary.

Surface Guard has already successfully protected cycle lanes and roads at Europe’s largest fireworks display in Stockton-On-Tees on Bonfire night 2017, and received positive reviews from security forces and the general public in the UK, after multiple deployments in crowded places.

Later this month, the Surface Guard system will be demonstrated at the US’s largest annual security convention ISC East, in New York City.  ATG’s American partner, Ameristar Security Products, will be exhibiting and showcasing the product.

Gary Hart, Ameristar Perimeter Security Director of Vehicle Barriers, notes: “We’ve seen first-hand the devastating trail of destruction and loss these attacks leave behind, but they keep happening time and time again. In the wake of the Manhattan attack, there have been calls to install old style physical protections around pedestrian areas and crowded places, but installing these types of permanent bollards and barriers will take several weeks or months to deploy.

“There is no need for municipalities to wait and leave popular, crowded areas unprotected. We can’t wait for another attack to happen. We have to put a stop to them now, and ATG Access ‘Surface Guard can do just that.”

For more information, please visit: www.atgaccess.com or watch the video of Surface Guard’s deployment here https://vimeo.com/223255295

General Dynamics Awarded U.S. Army Mission Training Support Contract

FAIRFAX, VA. - General Dynamics Information Technology, a business unitof General Dynamics (NYSE: GD), was awarded the Mission Training Complex Capabilities Support contract by the U.S. Army Contracting Command. The
multiple award, indefinite delivery, indefinite quantity contract has a ceiling value of approximately $975 million with a five year ordering period.

 Work under the contract will consist of simulation and training support including live, virtual, constructive and first-person gaming exercises.
Additional support will include technical, logistical and administrative services for designated mission training complexes.

 "As a leader in mission-command and integrated training capabilities,
General Dynamics is well positioned to support the active Army and the
National Guard in strengthening readiness," said Rich Farinacci, vice
president and general manager of General Dynamics Information
Technology's Professional Services and Training Solutions sector.

 For more than ten years, General Dynamics has supported the Army's
mission training complexes with integrated training capabilities. The
company continues to be a trusted partner in supporting the Department
of Defense and other federal agencies as a primary source of training,
network and system engineering, installation, maintenance and logistical
services.

 For more information about General Dynamics Information Technology,
please visit www.gdit.com [1].



Links:
------
[1] https://gdit.com/

Intelligo Group: Powerhouses of the US and Israeli Intelligence Communities Join Forces to Advance AI-powered Background Checks and Due Diligence Technology

Intelligo Group, a pioneer in automated background checks and due diligence technology, announced today that Michael McConnell, the former Director of the National Security Agency (NSA), and Pinhas Buchris, the former director of Israel's 8200 intelligence division, and former Managing Director of the Israeli Ministry of Defense, have joined its advisory board.

McConnell served 29 years in the Navy, most of that time as a career Intelligence Officer, and retired as a Vice Admiral. He was the Director of the NSA from 1992 to 1996 and served as the US Director of National Intelligence under the Bush administration. McConnell has also served as a member of the Director of Central Intelligence senior leadership team.

McConnell will advise Intelligo on matters concerning the US government, particularly the Office of Personnel Management and Department of Homeland Security. The US government has a security clearance backlog of more than 700,000 applicants, and is paying billions of dollars on these employees who are on payrolls, but have yet to be cleared.

"Intelligo is changing the status quo that exists in the way background checks are currently conducted by automating the process so that it is both faster and significantly more thorough than the manual method that has been used until now," said McConnell. "Background checks have traditionally been a tedious and costly process. Governments and companies have a lot to gain both in terms of security and cost savings by automating this process. Intelligo is the gold standard in this industry and I'm confident we will see rapid adoption of this technology in the market."  

Buchris served 27 years in the Israel Defense Forces (IDF) and retired as a Brigadier General. He is currently General Partner at State of Mind Ventures. During Buchris's army career, he founded the IDF's cyber initiative, led the army's largest technology information gathering unit and served as the Head of the 8200 division, Israel's signal processing intelligence unit. He also served as the Managing Director of the Israel Ministry of Defense from 2007-2010.

"What I have learned in all of my years of experience both in the military and in the private sector, comes down to one thing - people. Selecting the right people at the right time is critical," said Buchris. "When making investment decisions, companies must really know the people they are partnering with regardless of if it's a merger or a collaboration. Intelligo provides this information, allowing for total transparency throughout the due diligence process."

Through the use of AI and machine learning, Intelligo simplifies the entire background check and due diligence process by eliminating protracted turnover times and tedious manual compilation of reports that the US government and other industries have used for decades.

"We are honored to have Michael and Pinhas join Intelligo as Advisors, and look forward to leveraging their vast knowledge and experience," said Shlomo Mirvis, the CEO and Co-Founder of Intelligo Group. "Having two of the world's most veteran intelligence experts on our team will only strengthen our offering, continuing to insure that we provide our clients with the most accurate and effective findings, allowing them to protect their investments, in a fraction of the time it takes for manual checks."

About Intelligo
Intelligo is the first company to offer a SaaS based model for organizations to conduct automated due diligence and background checks. Users are able to access their searches and continuously monitor research subjects on a daily basis. Powered by AI and machine learning algorithms, the platform scours thousands of web sources, including premium data providers, social media, corporate records and news media. Intelligo Clarity's sophisticated engine then extracts relevant events and produces a decision-ready report that is easy to read, informed and actionable. For more information, please visit https://intelligo-group.ai

The Global Anti-Drone Market Is Expected To Grow With A CAGR Of 25.2% Over The Period Of 2017 - 2023

LONDON, Nov. 30, 2017 --The report on The global anti-drone Market provides qualitative and quantitative analysis for the period of 2015 to 2023.

Download the full report: https://www.reportbuyer.com/product/5223297

The report predicts The global anti-drone Market to grow with a CAGR of 25.2% over the period of 2017 - 2023. The study on anti-drone Market covers the analysis of the leading geographies such as North America, Europe, Asia-Pacific, and RoW for the period of 2015 to 2023.

The report on anti-drone Market is a comprehensive study and presentation of drivers, restraints, opportunities, demand factors, market size, forecasts, and trends in The global anti-drone Market over the period of 2015 to 2023. Moreover, the report is collective presentation of primary and secondary research findings.
Porter's five forces model in the report provides insights into the competitive rivalry, supplier and buyer positions in the market and opportunities for the new entrants in The global anti-drone Market over the period of 2015 – 2023. Further, IGR- Growth Matrix given in the report brings an insight on the investment areas that existing or new market players can consider.

Research methodology

• Primary Research
Our primary research involves extensive interviews and analysis of the opinions provided by the primary respondents. The primary research starts with identifying and approaching the primary respondents, the primary respondents are approached through

Key Opinion Leaders associated with Infinium The global Research
Internal and External subject matter experts
Professionals and participants from LinkedIn, Hoovers, Factiva and Bloggers
Our primary research respondents typically include

Executives working with leading companies in the market under review
Product/brand/marketing managers
CXO level executives
Regional/zonal/ country managers
Vice President level executives.
• Secondary Research
Secondary research involves extensive exploring through the secondary sources of information available in both public domain and paid sources. At Infinium The global Research, each research study is based on over 500 hours of secondary research accompanied by primary research. The information obtained through the secondary sources is validated through the crosscheck on various data sources. The secondary sources of the data typically include

Company reports and publications
Government/institutional publications
Trade and associations' journals
Databases such as WTO, OECD, World Bank, and among others.
Websites and publications by research agencies
Segments Covered
The global anti-drone Market is segmented on the basis of Application, Technology, and Vertical.

The global anti-drone Market by Application

Detection and Disruption
Detection
Positive Displacement
The global anti-drone Market by Technology

Traditional Kinetic System
Laser System
Electronics System
The global anti-drone Market by Vertical

Military and Defence
Commercial
Homeland Security
The global anti-drone Market by Regions

North America
Europe
Asia-Pacific
RoW
Companies Profiled

Thales Group
Lockheed Martin Corp.
Dedrone Inc.
Israel Aerospace Industries Ltd.
Raytheon Co.
Droneshield Ltd.
Theiss Uav Solutions, LLC
Saab AB
Blighter Surveillance Systems Ltd.
How this report delivers?

Comprehensive analysis of The global as well as regional markets of anti-drone Market.
Complete coverage of all the segments in anti-drone Market to analyze the trends, developments in The global Market and forecast of market size up to 2023.
Comprehensive analysis of the companies operating in The global anti-drone Market. The company profile includes analysis of product portfolio, revenue, SWOT analysis and latest developments of the company.
IGR- Growth Matrix presents analysis of the product segments and geographies that market players should focus to invest, consolidate, expand and/or diversify.
Download the full report: https://www.reportbuyer.com/product/5223297

BlueteamGlobal Announces Corporate Name Change to BlueVoyant

NEW YORK, Dec. 1, 2017 -- BlueteamGlobal, a global cybersecurity services firm launched earlier this year, today announced that it is changing its name to BlueVoyant, effective immediately.

Co-founded by CEO Jim Rosenthal, former Chief Operating Officer at Morgan Stanley, and Executive Chairman Tom Glocer, former Chief Executive Officer at Thomson Reuters, BlueVoyant will provide Advanced Cyber Threat Intelligence for large companies and Managed Security Services for smaller businesses. The company expects to launch its new generation of commercial products in early 2018.

BlueVoyant, which has raised more than $125 million from institutional and individual investors, was formed in part by the acquisition of three cybersecurity technology businesses—BitVoyant, K2G and K2 Cyber Defense. The company, which has offices in the U.S., the U.K. and Israel, has assembled an 85-person team of leading experts from international intelligence, law enforcement and private sector organizations.  

CEO Jim Rosenthal said the company chose the name for three reasons: to reaffirm our dedication to the "blue" side of cyber defense and to protecting company networks; to celebrate "voyant" and the successful integration of BitVoyant and our portfolio companies; and to create a shorter and more fully memorable name.

"Our new name embodies our purpose—to help defend businesses around the world against agile and well-financed cyber attackers by providing unparalleled visibility and insight," Rosenthal said. "Through our unique data assets, world-class human intelligence experts, and managed security services, BlueVoyant offers the private sector exceptional cyber defense capabilities."


The company's founding senior leadership team includes:

  • Daniel Ennis, Head of Threat Intelligence; he was formerly Director of the NSA's Threat Operations Center.
  • Ron Feler, Deputy Head of Threat Intelligence; he previously served as Deputy Commander of the Israel Defense Forces's Unit 8200 cyberintelligence unit.
  • Gad Goldstein, Head of Dark Web Intelligence; he served as a division head in the Israel Security Agency,
  • Shin Bet, in the rank equivalent to Major General.
  • Austin Berglas, Co-Head of Managed Security Service; he was formerly head of the FBI's New York Cyber Branch.
  • Milan Patel, Co-Head of Managed Security Service; he was formerly CTO for the Cyber Division at the FBI.
    The company today announced the addition of six senior executives to its leadership team.

Tal Blaustein recently joined the company as Head of Security Operations Center (SOC) Operations in Israel. The former Head of Cyber Defense Operations of the Israeli Defense Forces, Blaustein served in the IDF's J6/C4i information services unit and the Cyber Defense Directorate for 13 years, and previously served as the IDF's Home Front Command Chief IT Architect.
David Lessing is Head of New Products and Partnerships. He joins BlueVoyant from Beechwood Bermuda, a wealth management firm, where he was most recently Interim CEO. Previously, Lessing served at Morgan Stanley as Chief Operating Officer of its U.S. Wealth Management Group.
Brian Miller was named Head of Integration Engineering and Product Manager within BlueVoyant's Managed Security Services division. Miller joins the team from Secureworks, where he created new solutions in the Managed Security Services market.
Steven Spadaccini has been named Head of Threat Intelligence Products. Spadaccini joins BlueVoyant from FireEye, where he was responsible for product and marketing programs for intelligence, services and products.
Ed Martin was appointed Head of Technical Product Management for Managed Security Services. Martin comes to BlueVoyant from Secureworks, where he served as Senior Product Manager focused on the company's counter threat platform.
Chris Teekema has been named Head of Client Implementation and Quality Measurement. He comes to BlueVoyant from Dell SecureWorks, where he was Senior Network Security Manager for Managed Security Services.
About BlueVoyant
BlueVoyant is a provider of Advanced Threat Intelligence and Managed Security Services with offices in New York, the Washington D.C. area, London and Tel Aviv. More information on BlueVoyant can be found online at www.bluevoyant.com.

PhishMe Inc. and Wombat Security Technologies, Inc. Announce Settlement of Patent Dispute

LEESBURG, Va. and PITTSBURGH, Dec. 1, 2017 - PhishMe Inc. and Wombat Security Technologies, Inc.  announced today that they have settled their patent dispute and entered into an agreement resolving the claims at issue in the litigation.  The parties' litigation in the United States District Court for the District of Delaware will be dismissed, and the proceedings pending at the United States Patent and Trademark Office will be terminated.  As a part of the settlement, PhishMe granted a license to Wombat to the PhishMe patents involved in the litigation.

About PhishMe
PhishMe is a leading provider of human-focused phishing defense solutions for organizations concerned about their susceptibility to today's top attack vector — spear phishing. PhishMe's intelligence-driven platform turns employees into an active line of defense by enabling them to identify, report and mitigate spear phishing, malware and drive-by threats. Our open approach ensures that PhishMe integrates easily into the security technology stack, demonstrating measurable results to help inform an organization's security decision-making process. PhishMe's customers include the defense industrial base, energy, financial services, healthcare and manufacturing industries, as well as other Global 1000 entities that understand how changing user security behavior will improve security, aid incident response and reduce the risk of compromise.

About Wombat Security Technologies, Inc.
Wombat Security Technologies is a leading provider of information security awareness and training software to help organizations teach their employees secure behavior. Their SaaS-based cybersecurity education solutions include a platform of integrated broad assessments, as well as a library of simulated attacks and brief interactive training modules. Wombat's solutions help organizations reduce successful phishing attacks and malware infections up to 90%. Wombat is helping small and medium businesses as well as Fortune 1000 and Global 2000 customers in industry segments such as finance and banking, energy, technology, higher education, retail, and consumer packaged goods to strengthen their cybersecurity defenses.

Napatech to Showcase Joint Solution with Rohde & Schwarz Cybersecurity at Black Hat Europe 2017

COPENHAGEN, Denmark, Napatech™ (OSLO: NAPA.OL), the leading provider of reconfigurable computing platforms, today announced the showcasing of its joint solution with Rohde & Schwarz Cybersecurity, a leading IT security provider. The joint solution will feature at Black Hat Europe in London, December 4-7, and combines Napatech's FPGA-based Pandion recorder with a powerful R&S®Net Sensor deep packet inspection (DPI) engine and Splunk to improve incident response times.

Click to Tweet: [email protected] Showcases Joint #Cybersecurity Solution with Rohde & Schwarz Cybersecurity:
https://tinyurl.com/y8xe462t @BlackHatEvents #pcap #BHEU
One of the biggest challenges facing network operators today is the inability to forensically extract precise data and context about a logged security incident. Features of this joint solution include:
 

  • Better security, faster: Napatech's reconfigurable computing platform is based on a standard, low-cost server, accelerated with Napatech's smart NICs and software, bringing breakthrough network performance to cybersecurity applications.
  • Identify and detect both existing and new threats: Complete network visibility and insights from DPI, when combined with advanced analytics and machine learning technologies, can help detect both registered threats and new abnormalities in the network traffic that were previously unknown or unregistered.
  • Further boost SIEM functionalities: With the capture-to-disk capability, large pcap repositories can be created and maintained for extended periods of time, allowing SIEM tools to, at any required point in time, extract quickly and instantly the desired data for further analysis and investigation.
    Napatech will participate in the following activities at Black Hat:  
  • A demonstration of Pandion network recorder at Booth 205 exhibiting how Napatech's SmartNIC platform and software provide:
        ◦    100 percent capture up to 40G line rate for all packet sizes
        ◦    Nanosecond precision timestamp
        ◦    Lossless write to disk
        ◦    Sophisticated index, search and retrieval of precise information among massive volumes of data
  • Napatech's Dan Joe Barry and Rohde & Schwarz Cybersecurity's Irina Palade will present "From

Circumstantial Evidence to Hard Facts" on December 6 at 12:15pm in the Business Hall, Theater A.
Case study link
Irina Palade, product manager at Rohde & Schwarz Cybersecurity, said: "This joint solution with Napatech offers a comprehensive approach to threat analytics. It is a fine-grained network threat detection solution that provides detailed data to SIEM systems and threat intelligence platforms. It combines a real-time intrusion detection system and network traffic recording capabilities to detect known and unknown cyber threats early on, enabling faster response times."
Jarrod Siket, chief marketing officer at Napatech, said: "The ability to perform continuous network monitoring and analysis enables an adaptive security architecture framework. Adaptive security can prevent and detect attacks, as well as perform forensic analysis and proactively predict potential new attacks. Our reconfigurable computing platform based on a broad set of FPGA software supports a wide array of hardware and secures standard servers for leading IT applications. The addition of the Rohde & Schwarz Cybersecurity DPI engine and Splunk's machine data creates an advanced network threat detection solution."
About Napatech 
Napatech helps companies to reimagine their business by bringing hyperscale computing benefits to IT organizations of every size. We enhance open and standard virtualized servers to boost innovation and release valuable computing resources that improve services and increase revenue. Our reconfigurable computing platform™ is based on a broad set of FPGA software for leading IT compute, network and security applications that are supported on a wide array of FPGA hardware designs. Additional information is available at: www.napatech.com

Digital Transformation in the Australian Mining Industry, Untapped Opportunities for Sensors, Drones, Advanced Analytics, AI and Cybersecurity

This report provides a comprehensive update on how digital transformation is impacting the mining sector in Australia and discusses market drivers and restraints, market size and overview of trends, the digital mining ecosystem and digital transformation use cases across the Australian mining value chain. The study concludes with a summary of growth opportunities.

Read the full report: https://www.reportlinker.com/p05226030

 

The end of the mining super cycle in Australia has dampened demand for digital solutions in the mining industry. However, over the medium term, assuming no significant deterioration in commodity prices, mining digital solution expenditure is expected to recover. Long-term fundamentals for mining digital solutions remain positive.

Through digital infrastructure and IT-OT convergence, miners gain higher operational visibility and real-time monitoring that helps achieve safety, minimises downtime, reduces energy consumption, and facilitates optimal utilisation of mining assets.

In the current environment, with weakened demand for some mining commodities, customers are looking to optimise assets more through a strategic focus on asset reliability monitoring. This is achieved through increasing the leverage of sensors and data analytics. In addition, the ability of cloud-based solutions to provide solutions cost-effectively is helping drive their uptake among miners.

Declining ore grades and high input costs remain productivity challenges for miners. The need for accuracy and efficacy in defining ore body characteristics is driving the integration of ore-body model information with blast-hole drill data and online sampling. Automated haulage and drilling are fairly advanced, while automated blasting and shovelling are being explored.

Although digital transformation impacts the mining sector the most in operational areas, there is inadequate convergence between IT and OT. This is often because internal IT departments do not have the OT expertise to deliver enterprise-wide transformation benefits.

Many mines have disparate legacy systems in place and require a new network or application to be integrated with the existing legacy systems.

Effective integration and managed services remain unmet needs.

Start-ups are devising novel solutions to be integrated with cloud technologies, command and control, and other equipment to efficiently control and process data. Service and IIoT capabilities are expected to become critical competitive advantages. In achieving synergies, companies are likely to seek strategic partnerships with different participants in the ecosystem.

Over the long term, investment in cybersecurity solutions is likely to gain momentum as a more connected ecosystem provides more surfaces for cybercriminal hacks/attacks. Investment and improvement in data analytics are likely to grow to build more consolidated systems providing end-to-end integration of all functions in the mining process.

Read the full report: https://www.reportlinker.com/p05226030

Pages

 

Recent Videos

HID Global is opening the door to a new era of security and convenience.  Powered by Seos technology, the HID Mobile Access solution delivers a more secure and convenient way to open doors and gates, access networks and services, and make cashless payments using phones and other mobile devices. ...
Mobile device forensics can make a difference in many investigations, but you need training that teaches you how to get the most out of your mobile forensics hardware and software, and certifies you to testify in court. Read this white paper to learn how to evaluate mobile forensics training...
PureTech Systems is a software company that develops and markets PureActiv, its geospatial analytics solution designed to protect critical perimeters and infrastructure.  Its patented video analytics leverage thermal cameras, radars and other perimeter sensors to detect, geo-locate, classify, and...
PureTech Systems is a technology leader in the use of geospatial video, focusing on perimeter security.  When combining geospatial capabilities with video analytics and PTZ camera control, managers of critical facilities can benefit by allowing the video management system to aid them in the process...