DD
MM
YYYY

PAGES

DD
MM
YYYY

spot_img

PAGES

Home Blog Page 7442

How technology destroys value in some industries even though consumers benefit

0

This happens all the time. A new technology is introduced and you think more value will be created because of the innovation. But the reality is that most times, despite the efficiency, technology destroys monetary value for the industry even though the consumers benefit significantly.

Consider WhatsApp, it is destroying monetary value for telecoms in Africa even though WhatsApp itself, directly we may say, is not creating further value by making money (being profitable). Sure, the valuation of Facebook which owns the product is indirectly associated with the number of users but the hard fact is that WhatsApp is not translating the value destroyed to itself in simple revenue numbers.

In the past, Skype reduced the revenue base of most telecom operators in Europe on international calls. But Skype as a company did not absorb that lost revenue into its balance sheet. What happened was the value was destroyed even though customers enjoyed largely free product.

McKinsey Study

McKinsey, on the same construct, has the  view that the digital dawn in insurance actually destroys value—transferring power from the carrier to the customer and eroding profits.  In the United States, McKinsey estimates auto insurance premiums could decline by as much as 25 percent by 2035 due to the proliferation of safety systems and semi- and fully-autonomous vehicles.

For a long time, the traditional insurance business model has proved to be remarkably resilient. But it too is beginning to feel the digital effect. It is changing how products and services are delivered, and increasingly it will change the nature of those products and services and even the business model itself.

Data and analytics are changing the basis of competition. Leading companies use both not only to improve their core operations but to launch entirely new business models. Insurers have valuable historical data. Yet in a few years’ time, will they be able to keep pace and still add underwriting value when competing with newcomers that have access to more insightful, often real-time new data culled from the Internet of Things (IoT), social media, credit card histories, and other digital records. Knowledge about how fast someone drives, how hard they brake, or even (more controversially) what they get up to as displayed on social media is arguably more revealing data on which to assess risk than simply age, zip code, and past accident record. (Facebook recently moved to prevent its users’ online activity being used by insurers in the United Kingdom—proof of the potential power of access to good data.)

And what if those with the necessary data and analytical skills and platforms that reach millions—a Google or an Amazon—not only offered well-targeted, tailored products, but also began to cherry-pick low-risk customers? If they did so in significant numbers, the insurers’ business model, whereby premiums collected from low-risk policyholders contribute to the claims of high-risk ones, could fall apart.

Auto manufacturers are arguably close to changing the game for insurers. The fitting of connected devices as standard in cars is not far off, potentially giving manufacturers unique access to data that could accurately ascertain the risk of their customers, as well as ready-made access to drivers in need of an insurance product.

The Future

In the near future, it is possible that insurance may not need to be offered by insurance companies. Google has a better chance of selling home appliance insurance with all the sensors coming from Nest. The same argument that car companies can simply use the collected data from their OBD sensors to sell insurance to car owners.

What happens to insurance companies? They will be cut-off of the loop.

Insurance companies may need to aggressively redesign their business models to ensure they can compete in this age because while we need insurance, we do not necessarily need insurance companies.

 

Full text of EFCC Chairman Ibrahim Magu’s Response to Buhari/Attorney General Query

0

EFCC Ag Chairman Ibrahim Magu was asked to respond to a query on allegations tabled against him by the SSS as Nigerian Senate failed to confirm him the first time. The query originated from the Attorney General of the Federation and Minster of Justice under the instruction of the Presidency. (The Senate has since rejected the confirmation of Mr Magu the second time, based again on a  report from the SSS)

 

This is the full text of his response.

EFCC/EC/JUS/07/263 21st December, 2016
THE HONOURABLE ATTORNEY-GENERAL OF THE FEDERATION
& MINISTER OF JUSTICE
Federal Ministry of Justice,
Shehu Shagari Way,
Abuja.

RE: REQUEST FOR COMMENTS
RE: REPORT BY THE DEPARTMENT OF STATE SERVICES

I most respectfully refer to your letter referenced HAGF/EFCC/2016/Vol.1/23 dated 19th December, 2016, asking me to respond within 48 hours to the allegations contained in a report written by the Department of State Service, DSS, and which provided the basis for the non-consideration of my confirmation on December 15, 2016, by the Senate.

2. Having carefully considered all the issues, I hereby present a point-by-point response as follows:

i. Missing EFCC Files
It is true that my residence was searched on the orders of Mrs. Farida Waziri, shortly after she succeeded Mallam Nuhu Ribadu as Chairman of the EFCC and some documents relating to cases under investigation were found in my house. At the time of the raid, I was yet to formally hand over to my successor, Umar Sanda, as head of the Economic Governance Unit.

My schedule at the time warranted that I work round the clock and it was impossible to conclude all assignments without working at home. The documents found in my house were actually found in my office bag where I kept documents relating to investigations. I was in the process of handing over and it would be wrong to suggest that I willfully kept the Commission’s files at home.

Nevertheless, the incident was thoroughly investigated by the police as I was placed on suspension without pay for 20 months. But in the end, I was reprimanded, recalled and promoted to Assistant Commissioner of Police.

It is important sir, to draw your attention to the fact that some of us that worked closely with Ribadu were victimized after his exit. And my ordeal was orchestrated as punishment for being the chief investigative officer for most of the high profile cases involving politically exposed persons some of whom became very influential in government at the time.

ii. Return to EFCC under Lamorde
I was Assistant Commissioner of Police in Charge of Operations at the Anambra State Police Command when I was recalled to the EFCC in 2012. I did not lobby to return to the EFCC. It is preposterous for anyone to suggest that I was recalled to do a hatchet job for Lamorde as alleged in the DSS Report. My job schedule as Deputy Director, Department of Internal Affairs, under Lamorde, was simply handling issues of professional responsibility in the Commission. I had no inputs in core operations duties of the Commission.

iii. Tenancy of My Official Residence
I live in the official residence of the Chairman of the Economic and Financial Crimes Commission (EFCC). This accommodation, contrary to the report of the DSS is not my private home, neither was it rented and furnished for me by Commodore Umar Mohammed (rtd). It was rented and furnished by the Ministry of the Federal Capital Territory through the Abuja Metropolitan Management Council, under the safe house scheme.
It is also false that the house was rented for N20million per annum and furnished for N43million. The entire cost for both two-year rent and the furnishing of the house is N39.628million.
Details of the transaction are contained in the contract award letter and payment schedule which are attached to this letter.

iv. Expensive Air Travels
Honourable Minister, the claim that I have a penchant for expensive air travels in a private jet belonging to Commodore Mohammed is baseless The two times I can recall travelling in Commodore Umar’s aircraft, were on a trip from Kano to Abuja, and Abuja to Maiduguri. In the first instance, I had gone to Kano on an official assignment with two of my directors, and Mohammed who was on his way back to Abuja offered us a ride in his jet. The second occasion was when I was going to see my sick mother in Maiduguri. These, for me, were harmless gesture as we were both members of the presidential investigative committee on arms procurement. At the time I had no knowledge that he was under investigation for any alleged crimes.

Claims that I flew in Mohammed’s jet to Maiduguri in company of the Managing Director of Fidelity Bank, Nnamdi Okonkwo is false. I have never flown in a private aircraft with any managing director of any bank let alone one that was under investigation by my agency. I have no personal relationship whatsoever with him.

v. High Profile/Dual Lifestyle
The allegation that I live a flamboyant lifestyle is also surprising to me. While it is true that I did travel first class on Emirates Airline to Saudi Arabia for Umrah, this action to the best of my knowledge, did not contravene the directive of Mr. President on First Class travels as suggested by the DSS Report.

My trip to Saudi Arabia was a private journey to perform my religious obligation and it was not financed with public funds. More importantly, my decision to fly first class was not borne out of quest for luxury but compelled by necessity. The trip was made during the last ten days of the Ramadan and other classes of ticket were not availbale.I had no other choice

That I flew first class in one instance is not enough evidence to suggest an extravagant lifestyle as alleged by the DSS Report. It is also not enough to suggest a dual personality. Any one that has associated closely with me will attest to the fact that I am not known for ostentatious living. And my new office as acting chairman of the EFCC has not changed this.

vi. Mutually Beneficial Relationship with Commodore Mohammed Umar (rtd)
Sir, it is important to situate my relationship with Commodore Mohammed Umar (rtd), in proper perspective. Our paths crossed when we became members of the Presidential Committee on the investigation on arms procurement. He was instrumental in getting some of the information that helped the committee to make significant breakthrough in its assignment.

Beyond that, the relationship between Umar and myself is one of professional acquaintance, devoid of issues of conflict of interest. So, it comes to me with shock, the imputation by the DSS that we have a “mutually beneficial relationship”. This appears suggestive that Mohammed and I were involved in activities that could be said to be untoward. I certainly have no knowledge of such activities.
The claim that EFCC documents, including EFCC letters addressed to the Vice President and being investigation reports on the activities of Emmanuel Kachikwu and his brother Demebi Kachikwu, were found in his home during a search by the DSS came to me as a surprise. If that is correct, he should be made to disclose how he came by such documents. I never discussed my official duties with him let alone give him documents pertaining to investigations being conducted by the Commission.

Interestingly, Mohammed was detained for several months by the DSS. In all those months, did he claim that I mandated him to commit any crime or that I was an accomplice to any crime? If there is any such claim, I will wholeheartedly like to be confronted with the allegation.

It is interesting to note that when Mohammed was eventually charged to court, the charges against him were money laundering and illegal possession of firearms, and nothing related to my purported “shady” relationship with him.

vii. Perceived Reluctance to Arraign Vice Marshall Adesola Amosun
The DSS Report that the reason EFCC delayed the arraignment of a former Chief of Air Staff, Air Vice Marshall Adesola Amosun, was because Mohammed never wanted Amosun to be prosecuted is astonishing. Anyone familiar with the EFCC under my watch knows that I perform my duties with the highest sense of responsibility. The reason Amosun was not arraigned when the likes of Alex Badeh and Umar were arraigned was because he cooperated with the Commission in terms of assisting the process of recovering the proceeds of crime.

Indeed, among the suspects arrested over the arms procurement scandal, he was most cooperative. The Commission recovered N2.835billion cash from him, aside from property worth One Billion Five Hundred and Eighty One Million Naira (N1,581, 000, 000), Two Million One Hundred and Fifty Thousand United States Dollars ($2,150, 000) and One Million Pounds Sterling (£1, 000, 000).

Since a key focus of the investigation was to recover as much proceeds of crime as possible, the Commission took its time to ensure it had recovered what was possible before arraigning the suspect in court. This had nothing to do with the wish of any individual. Moreover, the suspect has since been arraigned before a court of competent jurisdiction.

viii. Alleged Vendetta Against Stanley Lawson
The suggestion by the DSS Report that Stanley Lawson, a former Group Executive Director of the Nigerian National Petroleum Corporation (NNPC) was placed on a watch list, to settle scores with him is strange. It may interest you to know that I do not know Stanley Lawson personally and could not be settling personal scores by framing somebody that I do not know.

Lawson’s encounter with the EFCC is in relation to the investigation into the mismanagement of $118million public funds for electioneering campaign involving former petroleum resources minister, Diezani Alison Madueke. It was discovered that he made payment of $25million into Fidelity Bank and also facilitated the purchase of Ogeyi Place Le Meridien Hotel in Port Harcourt for Mrs. Alison Madueke, for which he collected Ninety Four Million Five Hundred and Sixteen Thousand Naira (N94, 516,000) as commission. Lawson was arrested and he made a refund of the N94.5million traced to him. He was never placed on any watch list.

ix. Work through Police Cronies in EFCC
I do not understand what the report meant by working with cronies. If what was implied is that I have preferred officers that I work with and who go about their work in unethical manner, my response is that nothing of such exists in the EFCC. Officers who work with me know that the easiest way to lose your job is to be found to be involved in unethical or corrupt activities. Indeed, when I assumed office as acting chairman, my first action was to return police officers with integrity issues back to the Nigeria Police Force. If the DSS finds that there are police officers in the EFCC who are working closely with me and have properties that their incomes cannot support, the Service is at liberty to expose them.

3. Conclusion
Honourable Minister, Sir, I invite you to take notice of the fact that the DSS authored two separate vetting reports on me, one referenced SV.114/3 addressed to the Clerk of the National Assembly and the other referenced SV.114/3 addressed to the Senior Special Assistant to the President on National Assembly Matters (Senate). Both letters were dated 3rd October, 2016, and signed by the same Officer, Folashade Bello, on behalf of the Director General. While one of the reports advised the senate against my confirmation, the other asked it to favourably consider my confirmation. The two reports emanating from the same agency raises questions of sincerity and motive.

You will want to find out why they came up with two conflicting reports on the same subject on the same day.

It is important to note that in all this, I was not given the opportunity of fair hearing.

Above all sir, I am persuaded by my conviction in my innocence that in all the issues supposedly raised against me, no one has accused me of receiving gratification to act against my conscience or the interest of the country.

I have attached to this letter all supporting documents and materials that would enable you arrive at fair position on all the issues raised.

4. Be assured of my usual respect and highest consideration.

IBRAHIM MAGU
Ag. EXECUTIVE CHAIRMAN

This new prescription pill Trumpazer cures TIAD (Trump Induced Anxiety Disorder) for Americans

0

Today, a new prescription drug was launched to address a new market that has emerged since Donald Trump won the U.S. Presidency. Since Mr. Trump’s inauguration as U.S. president,  some U.S. citizens are experiencing major health crises. Time has reported that “calls to crisis support lines have gone up significantly” since the election.

Medical experts have diagnosed the symptoms. They call the disease vector Trump Induced Anxiety Disorder, or TIAD.

Dr Texash-Americana Patrotica noted that Trump is the cause of TIAD in this mode

 

Many drug companies sensing opportunities have been working on this new disease which is a serious healthcare problem.  Until today, no solution exists for TIAD..Trumpater provides immunity and guards the security of the minds of Americans when consumed in the right dose as presented by the drug maker.

Symptoms of TIAD

The major symptoms are feeling of hopelessness, exhibiting bouts of sudden rage or regularly arguing with friends and family. You may also experience subdued feelings when you meet nationals from Britain, Canada and Germany. You keep comparing your president with leaders of other OECD countries.

It has been established that some of Mr. Trump’s executive actions and his gyrating press conferences are the factors triggering these anxieties in Americans. Medical doctors are yet to diagnose this problem in non-Americans.

In a study in Texas, there is a small cohort of Mexican immigrants who are experiencing TIAD. However, majority of sufferers are Americans.

Triggers of TIAD

The following are some major triggers of TIAD:

  • Trump’s tweets that make Americans look stupid before the world
  • Press conference performances so bad that circuits inside cameras get hot after recording Trump
  • Executive order aimed at “reorganizing the executive branch” and intended to “make it less wasteful and more productive.”
  • Revised executive order of the extreme vetting and travel ban the administration rolled out on Jan. 27, 2017.
  • An executive order that reviews the Waters of the U.S. Rule and Clean Water Act of 1972
  • An executive order that establishes regulatory reform officers to implement regulatory policies and cut those that unduly burden businesses
  • An order that changes the order of succession in the Department of Justice, it lays out who takes over if the attorney general dies, resigns or is incapable of ably performing the job.
  • A series of interrelated orders that focus on crime and violence against police officers.
  • An order directing the Secretary of the Treasury to review the 2010 Dodd-Frank Regulatory Law.
  • An executive order that expands regulatory review and aims to cut two existing regulations for each new regulation proposed.
  • An executive order that strengthens restrictions on lobbying. Employees of the executive branch, including those now in the White House, are barred from lobbying the agency where they worked for five years.
  • Calls for extreme vetting of refugees from “terrorist countries” who are attempting to seek asylum in the United States.
  • A directive for the Secretary of Homeland Security to prioritize particular undocumented immigrants (including those with criminal convictions and those who have only been charged) for deportation
  • A directive for the Secretary of Homeland Security to: begin the process of building a wall along the U.S.-Mexico border, find federal funding for such a project, create border detention centers, add 5,000 Border Patrol agents to the current work force, cease
  • Expedites environmental reviews and approvals for “high priority infrastructure” projects.
  • An order minimizing the economic burden of the Patient Protection and Affordable Care Act pending repeal.

The Drug and Effect

Trumpazer is a prescription pill made by a U.S. based drug company which has come to the help of citizens for years with excellent drug for the security of human souls and assets. By taking this drug, an American develops immunity against TIAD security challenges in the mind.
It works on the metabolism transfiguring the central nervous system with parasympathetic nervous system with the result that endoplasmic hypothalamus moves to frontal lobe of the brain. When that happens, the efferent neurons are disconnected from the afferent neurons going to the intermediate neurons thereby disconnecting the synapses.
The effect is that the security threat in the mind is gone.

Order Trumpazer

To order Trumpazer, you must be at least 12 years old. Please schedule a visit for examination first. Click here today and you will be free of TIAD once Trimpazer begins to work on you after a week. It presents you with security of mind awareness to overcome all symptoms from TIAD.

What is Big Data? Beyond the “Three Vs”, The Additional “Four Vs”

0

The world generates data at an astonishing rate—about 2.5 quintillion bytes each day. Big data is huge and it is an emerging fascinating area.

But what is big data? That’s a good question. There seems to be as many definitions for big data as there are businesses, nonprofit organizations, government agencies, and individuals who want to benefit from it.

One popular interpretation of big data refers to extremely large data sets. A 2011 McKinsey study defined big data as “datasets whose size is beyond the ability of typical database software tools to capture, store, manage, and analyze.” Some have defined big data as an amount of data that exceeds a petabyte—one million gigabytes.

Another definition for big data is the exponential increase and availability of data in our world.

This data comes from myriad sources: smartphones and social media posts; sensors, such as traffic signals and utility meters; point-of-sale terminals; consumer wearables such as fit meters; electronic health records; and on and on.

Buried deep within this data are immense opportunities for organizations that have the talent and technology to transform their vast stores of data into actionable insight, improved decision making, and competitive advantage.

By harnessing the power of big data, healthcare systems can identify at-risk patients and intervene sooner. Police departments can predict crime and stop it before it starts. Retailers can better forecast inventory to optimize supply-chain efficiency. The possibilities are endless.

But to fulfill this promise, organizations need qualified professionals with the skills to extract meaning from the mountains of data—and these elusive data scientists are in short supply.

The “Three Vs” of big data

In 2001, industry analyst Doug Laney defined the “Three Vs” of big data:

  1. Volume

    The unprecedented explosion of data means that 90 percent of all the world’s data has been created in the past two years. The global digital universe now exceeds 2.7 zettabytes, and volume is expected to double every two years. Today, the challenge with data volume is not so much storage as it is how to identify relevant data within gigantic data sets and make good use of it.

  2. Velocity

    Data is generated at an ever-accelerating pace. Every minute, 571 new websites are created. Email users send 204,166,667 messages. Google receives more than two million search queries. The challenge for data scientists is to find ways to collect, process, and make use of huge amounts of data as it comes in.

  3. Variety

    Data comes in different forms. Structured data is that which can be organized neatly within the columns of a database. This type of data is relatively easy to enter, store, query, and analyze. Unstructured data is more difficult to sort and extract value from. Examples of unstructured data include emails, social media posts, word-processing documents; audio, video and photo files; web pages, and more.

Beyond the big three Vs

More recently, big-data practitioners and thought leaders have proposed additional Vs:

  • Veracity

    This refers to the quality of the collected data. If source data is not correct, analyses will be worthless. As the world moves toward automated decision-making, where computers make choices instead of humans, it becomes imperative that organizations be able to trust the quality of the data.

     


    IBM data scientists break big data into four dimensions: volume, variety, velocity and veracity. This infographic explains and gives examples of each.
  • Variability

    Data’s meaning is constantly changing. For example, language processing by computers is exceedingly difficult because words often have several meanings. Data scientists must account for this variability by creating sophisticated programs that understand context and meaning.

  • Visualization

    Data must be understandable to nontechnical stakeholders and decision makers. Visualization is the creation of complex graphs that tell the data scientist’s story, transforming the data into information, information into insight, insight into knowledge, and knowledge into advantage.

  • Value

    How can organizations make use of big data to improve decision-making? A McKinsey articleabout the potential impact of big data on health care in the U.S. suggested that big-data initiatives “could account for $300 billion to $450 billion in reduced health-care spending, or 12 to 17 percent of the $2.6 trillion baseline in US health-care costs.” The secrets hidden within big data can be a goldmine of opportunity and savings.

Bringing it all together

No matter how many Vs you prefer in your big data, one thing is sure: Big data is here, and it’s only getting bigger. Every organization needs to understand what big data means to them and what it can help them do. The possibilities really are endless.

 

{Image Credit and sources)

Microchip pioneers smart, connected and secure solutions with hardware cryptography-enabled microcontroller

0

Security threats are increasing exponentially in terms of frequency, targeted devices, malignancy and costs of attacks. In today’s vast interconnected world, the need to provide greater security within a customer’s product or system is becoming a standard requirement.

To stay one step ahead of the criminal element and prevent theft of software/hardware, intellectual property and data, or communications services, customers today are designing their products with an eye on providing robust, connected and secure systems.

We are in the golden age of IoT and security is increasingly moving to hardware. not just software.Microchip has unveiled a new product – CEC1702. The CEC1702 full-featured microcontroller streamlines security implementation for an increasingly connected world

Microchip CEC1702

The CEC1702 hardware cryptography-enabled microcontroller is now available from Microchip Technology Inc., a leading provider of microcontroller, mixed-signal, analog and Flash-IP solutions. The CEC1702 addresses the increasing need for security measures, such as secure boot, driven by the continual growth of Internet of Things (IoT) applications.

The CEC1702 is a full-featured ARM Cortex-M4-based microcontroller with a complete hardware cryptography-enabled solution in a single package. This low-power but powerful, programmable 32-bit microcontroller offers easy-to-use encryption, authentication, private and public key capabilities and allows customer programming flexibility to minimise customer risk.

The CEC1702 also provides significant performance improvements when compared to firmware-based solutions. The device’s hardware cryptographic cipher suite reduces compute time by orders of magnitude over software solutions, and, as an example, provides 20x-50x performance improvement for PKE acceleration as well as 100x improvement for encryption/decryption. This robust hardware-based feature set results in applications that can run security measures quickly, effectively and with significantly lower cost and power consumption.

Protecting system integrity has never been more important. Whether it’s being used as a security coprocessor or a standalone microcontroller, the CEC1702 delivers a multi-dimensional defense against attacks, including:

  • Pre-boot authentication of system firmware: Providing an immutable identity and a root of trust to ensure that the firmware is untouched and hasn’t been corrupted
  • Firmware update authentication: Verifying that the firmware update has not been corrupted and is from a trusted source
  • Authentication of system critical commands: Attesting that any system-critical command is from a known source with authorisation to make the given change, preventing potentially devastating actions
  • Protection of secrets with encryption: Safeguarding code and data to prevent theft or malicious activities

Boot Code Security

“The acceleration of the Internet of Things has brought higher visibility to the security considerations of new designs,” said, Ian Harris, vice president of Microchip’s computing products group. “One of the hardest challenges to solve in a connected system is the ability to ensure that the boot code has not been comprised. The CEC1702 eliminates this issue by making it easy for designers to verify pre-boot authentication and then provide firmware updated from known, trusted resources.”

Fasmicro Training

In West Africa, Fasmicro is an authorized training partner of Microchip. You can buy CEC1702 from Fasmicro. Also, Fasmicro  has stock of PICKit2 and PICkit3 and ship to any part of Nigeria.

Embedded Cybersecurity Training

First Atlantic Cybersecurity Institute (Facyber) offers embedded cybersecurity training covering technology among other areas. Interested learners can take advantage of the online program.