Tag: 上海后花园阿拉爱上海

Tomasa Del Real On Bringing Her Take On Reggaetón NeoPerreo To Coachella

last_img

McDonalds Scaling Back on Its Quarter Pounders Premium Chicken Sandwiches and Snack

last_img

TomTom Says Its Maps Are Destined for SelfDriving Cars

first_img 5 min read May 4, 2015 Free Workshop | August 28: Get Better Engagement and Build Trust With Customers Now Enroll Now for Free This hands-on workshop will give you the tools to authentically connect with an increasingly skeptical online audience. Dutch navigation company TomTom aims to become a main provider of technology for self-driving cars as it charts its way back to success after seven lean years, chief executive Harold Goddijn said.Goddijn told Reuters that an overhaul of TomTom’s digital mapping architecture lies behind a renaissance that has seen its automotive division win big contracts in recent months, prompting analyst upgrades and a 40 percent surge in its shares.He said carmakers are now betting on TomTom as one of the few companies besides Google capable of providing location data good enough and fast enough to meet the safety requirements for computer assisted driving — and ultimately, self-driving cars.”We are seen by our customers as the guys with the right ideas on how you do those things,” he said in a interview, relishing the company’s comeback story.A rare example of a global consumer electronics brand to come out of Europe in the 2000s, TomTom went into a tailspin after overpaying for digital map-maker TeleAtlas in 2008.The market for its main product, personal navigation devices, entered a brutal decline. Prices fell and margins were crushed as cheaper competitors entered an increasingly saturated market for dashboard-mounted GPS systems, and smartphone navigation apps offered an even cheaper substitute.With the PND market stabilizing, Goddijn thinks TomTom’s other business lines are poised for a new cycle of growth.Analysts’ enthusiasm has been fired by contract wins with carmakers, including two with Volkswagen this year as well as deals with Fiat, Hyundai and Kia.DiversificationBut TomTom’s revenue base has also diversified. Its consumer product offerings have expanded to include fitness watches and a line of ‘GoPro’-style action cameras launched this week.It also licenses its digital maps to tech giants. One of TomTom’s few bright moments during the dark years came in 2012, when Apple, seeking to end its reliance on Google, choose TomTom’s maps to use in its own navigation app, starting with the iPhone 6.And finally, TomTom has been quietly building up a “telematics” business, providing the telecommunications systems used in car fleet management, which has become the largest of its kind in Europe’s fragmented market.In the interview, Goddijn said the unit, which reported sales of 110 million euros ($124 million) in 2014, has the potential to grow sales at more than 20 percent per year for the coming five years without acquisitions.But TomTom’s mapping technology is at the core of investor demand that has given the company a 1.8 billion euro market capitalization despite 2014 profits of just 22.7 million euros.The company’s maps can now be redrawn on the fly, integrating feedback from cars on the road, and then shared immediately with other drivers.”No one else has that,” Goddijn said, flatly.’Exciting and Scary’Cars are increasingly equipped with multiple sensors, not only GPS positioning and mobile phone connections but radars, cameras and driver heart-rate monitoring systems. Lidar (reflected laser imaging) may also be added in future.Goddijn said the overhaul of TomTom’s digital mapping architecture “gives us a lot of confidence” this proliferation of data can be processed in a way that ensures users’ safety.”It’s exciting and it’s scary, because millions of cars will come and there’s tons of data going to be produced,” he said.The biggest question mark hanging over TomTom’s strategic future is Nokia’s plan, announced this month, to sell its map-making arm HERE, which has U.S. roots. Google, TomTom and HERE are the three major digital map-makers with the potential for use in self-driving cars.Though TomTom has won almost all major automaker contracts renewed in the past year, HERE still has more than 70 percent of the automotive market.Potential buyers include tech giants Apple and Uber, or less realistically, Microsoft, which could have taken HERE when it bought Nokia’s smart phone operations. Google is also mentioned although it already has its own technology.A consortium of automakers who view Google as an undesirable rival is also seen as a realistic possible buyer of HERE, as are private equity buyers who could build the business up — or wind it down. The worst case scenario for TomTom would probably be a takeover of HERE by navigation arch-rival Garmin Ltd.What does Goddijn think will happen?”That question is too complex to handle,” he said. “Even if I wanted to I couldn’t give you the answers, because a lot of it depends on who it is and how they want to handle it.”He said his focus for now is on continuing TomTom’s winning streak with automakers.”Let’s face it, our market share is not where it should be. There is an incumbent and we need to take market share away.”($1 = 0.8875 euros)(Editing by Catherine Evans) This story originally appeared on Reuterslast_img read more

Your Startup Should Think About Security From the Beginning

first_img Opinions expressed by Entrepreneur contributors are their own. February 15, 2017 Free Webinar | Sept. 9: The Entrepreneur’s Playbook for Going Global Growing a business sometimes requires thinking outside the box. 7 min read We live in the age of data where storage is a cheap commodity and data is of inestimable value. This means that you’re going to store the relevant data that will prop up your company for whatever it needs to build later — and everyone will be cool with that.The problem is that this abundance of data, collected largely from companies that don’t know how to store it properly, is why we’re seeing headlines every month about another major data breach.Related: 10 Data Security Mistakes Startups Can’t Afford to Make What you may not realize is that such breaches happen a lot. The occurrence rate is pretty much every day when you figure in companies that aren’t newsworthy or don’t even know they’ve been hacked.When a big retailer is breached, that event immediately causes a loss of trust with the company’s customer base. On top of that, the company can be sued by customers who have been damaged.If this happened to your startup, what would it cost you? Could you afford a class action lawsuit the way a Fortune 500 company could? Could you afford to lose the trust you worked so hard to build with your customers? What would happen if your proprietary information, algorithms or formulas were stolen and sold to the competition?Horrible things, no doubt.This illustrates how many startup founders aren’t security oriented. Even tech founders usually lack experience in security. And this is a potentially fatal mistake. The decisions you make in the first round of building your company can affect your next funding round or that big exit that you’ve been dreaming about.With all of this doom and gloom, however, there is still a silver lining. And that “lining” is that it’s pretty easy to get a basic level of protection on all of your digital assets from day one. First, it’s important to learn about the most valuable piece of data for a hacker: PII. PII, or personally identifiable information, is exactly what it sounds like. It’s what ties your customers’ names to a phone number, email address, mailing address, etc. This is the first thing that should be protected. Generally, it should be hidden as deeply as you can manage. This can be done by encrypting, “hashing” if you only use the data for verification or just not storing it at all if you don’t need it!  If you block this sensitive information out, a hack will be much less valuable. If you have to store it, there are some basic steps to take to make sure it’s safe and sound.Related: 11 Tips to Secure Mobile Devices and Client Data Encrypt data at rest.When your data is resting in your database or in a file somewhere, you should encrypt it. With a solid encryption plan, like AES-256, in place, you need a decryption key to see any of the data. If someone gains physical access to your files or database, he or she could be in trouble without that key.”Hash” and “salt” all passwords.For data that is only sent to you and isn’t from you — like a password — store it with a one-way encryption called “hashing.” This way, if someone steals the stored password, he or she can’t easily decrypt and use it. There’s a bonus if you add some text to the password before you store it — called “salting.” This makes it even harder to find out what the password is.Secure data in transit.This is the lowest-hanging fruit by far. HTTPS or SSL connections (that green padlock on the left of the address bar in your browser) will encrypt all data that is in transit between you and your customers. If someone intercepts it and steals it, he or she will have a hard time getting any value from it at all. If your valuable data is safe from being used if stolen, you’re looking good. To look great, make sure your servers can’t be breached at all. This involves securing your code, as well. In order to secure your code, you need to lock down the common vulnerabilities.Avoid “cross-site scripting.”This type of attack occurs when someone drops malicious code on your site or app that executes remote code. This can happen if someone puts some JavaScript into his or her user profile that executes some tracking code from this person’s super-secret hacking site.Avoid “injections.”This attack occurs when someone is able to inject some code straight into your database or onto your server.Avoid cross-site request forgeries.These attacks occur when someone steals a form off your page, customizes it and uses it to perform some action that the thief isn’t authorized to perform. An example would be changing an admin password.If you are using WordPress to power your web technology, you’re in luck. There is a plugin called BulletProof Security (BPS) that solves most of this problem for you. If you don’t have WordPress, get a pro to scan and fix these issues for you as soon as possible, because they are serious. There is also a pretty handy tool called CloudFlare that will stop many of these attacks before they ever reach your servers. I always recommend both, where applicable.The human side of hackingIt’s important to realize that behind every security breach, behind every hack, there are people. These are both people who are trying to get access and people who are letting them in. So, be overly cautious in your business. Change passwords regularly and require only authorized personnel to be near computers and documents.Don’t leave that new delivery person alone at the front desk. His presence probably isn’t a big deal, but he just might be trying to hack you and leaving him alone provides that window of opportunity.What it all boils down to is a security mindset. You need to be consciously thinking about security and training your team to be mindful of it at all times: not just for your company, not just for your team, but for your customers too. This is important for everyone.Following through on these points is generally enough to thwart most hackers. Add these actions with a security-first mindset and your empire is likely to be safe and sound. Your app can thrive. Your software will be secure. Your customers will trust you. Your data will be safe.Related: 4 Reasons You Need Developers With Cybersecurity Skills in All Tech Teams Getting your office, data, code and servers locked down early will save you from a world of hurt later on down the line. What are you doing right now to make sure your hard work isn’t taken down by some faceless hacker? Register Now »last_img read more

Powered by WordPress & Theme by Anders Norén