Tag: compliance

  • The Future Office Worker

    The Future Office Worker

    Aside from essential services personnel, millions of people are now working from home. The Covid-19 pandemic has prompted the growth of products to help the home office worker of today and tomorrow.

    Debunqed breaks down which cloud solutions to pay attention to and which to avoid while you adjust to a changing world of commerce.

    During the pandemic, one video conferencing service has exploded in popularity after years of trying on the wayside. This is the service operated by the NASDAQ-listed American group, Zoom.

    Zoom has become a service of choice especially for companies and staff which may have not used online conferencing before. This popularity has made the service a target and there are concerns around security and privacy issues.

    Before Zoom’s burst in interest, the most popular applications include Google’s Gsuite which offers online conferencing solution Meet, Microsoft 365 which includes competing conferencing solution Teams, and Slack.

    Slack which was formed in 2013 also offers chat services that multiple people can use at once in private groups and persistent chat rooms or channels, which are organized by topic as well as direct messaging.

    Zoom being hacked during quarantine might have made news headlines but it’s not the first time that technology services like these have been infiltrated by the wrong people.

    .

    web scanner

    Slack was hacked back in 2015. The data included email addresses, usernames, hashed passwords, and in some cases, phone numbers, and Skype IDs users had associated with their accounts. As a result, Slack added two-factor authentication to protect data in the future.

    Gsuite is the ‘OG’ of cloud-based business

    How does Gsuite work? G Suite which was founded in 2006 and was formerly known as Google Apps for Work is a suite of web applications created by Google for businesses. It’s still a decent offering 14 years later. A basic G Suite account gives you access to Gmail and 30GB of Google Drive storage per user.

    There are obviously Enterprise-level packages with beefed up security to match that offered by highly secured ‘on-premise‘ setups.

    The suite’s Meet service is a video conferencing app. It is the business-oriented version of Google’s Hangouts platform and is suitable for businesses of all sizes. The solution enables users to make video calls with up to 30 users per high-definition video meeting.

    Compared to other software, and due to familiarity and affiliation to Android Smartphones, G Suite is quick and easy to set up and use from the time you subscribe to it. It literally takes up to 15mins to start receiving emails and make video-calls!

    Still in the game

    Microsoft offers 365 which includes Teams. Teams is quickly becoming Zoom’s big competition. Several companies are using Teams for internal meetings and Zoom for external meetings. Microsoft gains its competitive edge from is strong data protection, GDPR, and comprehensive security measures. But others are slowly and sometimes painfully also having to jack theirs up.

    The crucial factor to Teams is that it is part of the Office 365 ecosystem. In this way, it can collaborate with different services offered by Office 365. Users gain access to several functions separated into four categories:

    MS Proplus

    Firstly, they have access to the main Teams application which lets them find and create channels to hold “on-the-spot meetings, have conversations and share files”. Secondly, they have access to a function called Meetings. You can plan, schedule, and track meetings.  This calendar syncs with Outlook, as an example of the deep Office 365 integration.

    Thirdly users have access to calls which includes VoIP calling as well as fourth, they have access to the Activity application. This application lets one access @mentions, unread messages, and replies.

    Other secure apps

    Then we have Signal, a very new addition to the saturated video calling and voice messaging application world. The non-profit organization, the Signal Foundation launched a stable version of Signal last month.

    Signal is a cross-platform encrypted messaging service. It’s an impressive entrant and it’s opensource too.

    It uses the Internet to send one-to-one and group messages. These may include text and audio files, voice notes, images and videos.

    It is also available through a mobile application that can also make one-to-one voice and video calls. We expect the Android version to become well-loved soon. It can operate as a replacement for the SMS app.

    Signal’s emphasis on messages being protected and voice and video calls being stable because of the push by hackers to infiltrate the plethora of online messaging and video applications coming online over the past few months since Covid-19 broke out.

    This will become more and more important in 2020 and beyond as working from home becomes more common.

    The German government has encouraged people to work from home offices beyond the Covid-19 pandemic. This call is gaining impetus after the country saw a rise in Covid-19 infections after it started to ease it is locked in marked ways.

    With so much choice around cloud-based solutions, it’s best to try a few for yourself and see what works for you. But don’t waste too much time. Many of them are free and you’d really want to just get on with whatever your business is.

    A key is to use strong passwords which you change regularly as well as other measures to protect yourself from hackers.

    Read more about how to make your online accounts safer.

    Find out more about online office collaboration tools on our resources page

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the nature of work they engage in is considered ground-breaking and has a positive impact on our lives – it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’. Nor that it is simply because it is fascinating and therefore must be an excellent product. This project actually has a value proposition for you!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers, and its fragility when used and abused by unscrupulous third-parties for their financial gain.

    The issue of data security is, however, quite a serious one. You just need to pay attention to the news to become even more aware.

    Data breach incidents

    In Europe, where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked. Several hundreds of thousands of customers’ personal data compromised.

    These were followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked. This left vulnerable passengers terrified and stuck high up in the air. And all this happened probably to the amusement of the pranksters (hackers).  

    Can you imagine the chaos and commotion that would be caused if their control systems of driverless cars were to be hacked? 

    The digital intrusion gets even more sophisticated...

    This time affecting the very wealthy:  private yachts are now being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    Data security 

    On the issue of data security, you often hear about extra protection but not just anti-virus and anti-phishing software. The more secure and heavily encrypted Blockchain technology is, however, making waves in the digital sphere.

    It is mainly for the escalation of its once shining star by-product designed for discreet transacting – Bitcoin.

    Blockchain technology has also triggered several other technologies based on its digital cryptology technology. The aim is to ensure that your information is kept safe from prying eyes while stored, used, or transferred online.

    Blockchain products such as cryptocurrencies, however, are not completely safe from hackers.

    A solution

    Zortrex400x400

    The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization. It will be using it to ensure that your highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details. Instead the hackers ran off with the date of birth; passport numbers; financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.

    Brown’s background in data privacy systems as well as her devoted passion for the protection of PII, financial and healthcare data led her to start up and chair Zortrex. 

    The law on data

    Thanks to new laws like the European GDPR law, which enforces the protection of data, breaches are now met with hefty financial penalties.

    “Companies have disrespected your data for over 25 years, and if left unattended, there will be nothing left to protect,” Browns says.

    Companies now have to think twice about getting your consent and how to use and share your data digitally. But is it enough? The simple answer is no.  

    The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches.

    We have ingeniously invented systems that automatically align with financial messaging, payments and securing information. All of which require data. 

    “However, we need to go a step further to secure all the PII details with tokenization. This is so that in the event of a hack, the cookies and trackers will only be following a ‘useless’ token will be no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenize all healthcare data. This way, vulnerable those of you living outside of major cities can also feel assured that your privacy is protected.

    Using Blockchain

    The application of the all-powerful blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with your data – especially the most sensitive ones.

    A business angel or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope.

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector.

    A tokenized supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would allow the police to “talk” to the prison service. They,  in turn, will communicate with the legal sector or public health institutions (NHS).

    Forensic evidence would in such instances be tokenized and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which could replace some lawyers) can spark off legal aid assistance to you.

    Your court cases will be heard quicker and be more efficient.  Protection registers can also be guarded using tokenization – rendering them more secure.

    Blockchain technology offers quality assurance making sure that no shortcuts are taken.

    This will enable the monitoring and tracking if any of your data is shared with third parties once tokenized. The third-party apps would only gain access to your data once the trigger has been activated.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenized, might seem far-fetched.

    Zortrex wants to use its technology to put the hackers out of business! 

    Tokenisation cannot be mathematically reversed and thus it will least it will keep the hackers busy for a while.

    Scalability

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability. This is the ability of a network or software to grow and manage increased usage.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, however, have massive scalability issues.

    The growth in demand for DApps is also crippling (slowing down) those systems. They need to investigate the incorporation of alternative technologies, upgrade or split their platforms to cope with such high demand.

    Someone must take the first step in securing this data forever. You should be able to purchase what you want without being harassed by trackers and cookies.

    The need for tokenization is endless and further, down the line, celebrities and government official’s PII can be secured by it to protect them from damaging schemes, ‘bad press’, and scandals.

    In a previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Get a vault for your data!

    Get a vault for your data!

    It’s not often that we readily endorse a product or company. However, when the type of work they engage in is considered groundbreaking – and one with the potential to have a massively, positive impact on our livelihoods, it most certainly warrants a mention.

    The rationale for considering such tech-driven projects as highly significant is neither due to ‘gut feeling’ nor that it is cutting-edge/fascinating and therefore must be an excellent product – it actually has a value proposition for everyday people!

    We are indeed well into the information age and while we have written extensively about data, its importance to marketers and its fragility when used and abused by unscrupulous third-parties for their financial gain, the issue of data security is quite a serious issue – we must just pay attention to the news to become even more aware.

    In Europe, the where security is supposedly more advanced, we have seen the likes of renowned airline British Airways, being hacked – with several hundreds of thousands of customers’ personal data compromised. This was followed by hacks on other major airlines such as Cathay Pacific.  Aside from airlines, other business outfits have suffered a similar fate.

    The perpetrators are getting a lot more brazen and very recently, a cable car, used as public transport in Moscow was hacked, leaving vulnerable passengers terrified and stuck high up in the air – probably to the amusement of the pranksters (hackers).  We all know about driverless buses and cars coming to the market soon.

    Can you imagine the chaos and commotion that would be caused if their control systems were to be hacked?  The hacks get even more sophisticated: this time, affecting the very wealthy –  private yachts are being hacked and taken into the pirate waters, all via uniquely coded signals, reading data from their antennas!

    On the issue of data security (with almost full anonymity); we have also heard about extra protection (and not just anti-virus and anti-phishing software) but the more secure and heavily encrypted Blockchain technology that is making waves in the digital sphere. Mainly for the escalation of its once shining star by-product designed for discreet transacting – the Bitcoin.

    It has also triggered several other technologies based on its digital cryptology technology to ensure that information is kept safe from prying eyes while stored, used or transferred online.

    Zortrex400x400The company we chose to highlight uses a unique vault system and is called Zortrex. It has adopted one of such Blockchain technologies dubbed tokenization – and will be using it to initially ensure that highly sensitive data online is kept safe.

    “Our tokenised solution would have protected their customers’ personal identification information (PII) details, instead the hackers ran off with the date of birth, passport numbers, financial data etc,” says Susan Brown, Chairperson of Zortrex – relating to the British Airways incident.

    “Tokenization is the process of converting rights to real-world assets into a digital token on a blockchain.”

    The establishment of this start-up company was due to Brown’s background in data privacy systems as well as her devoted passion for the protection of PII and financial/healthcare data.  In her view, companies have disrespected their customer data for over 25 years, and if left unattended, there will be nothing left to protect.

    Thanks to new laws like the European GDPR law which is now imposing the data protection; data breaches and abuse of customer data is now met with hefty financial penalties. Companies now think twice about consent and how to use and share customer’s data digitally – but is it enough? The simple answer is a no.  The authorities just do not have the resources to investigate every complaint nor to actively enforce all data breaches – yet.

    “We have ingeniously invented systems that automatically align with financial messaging, payments and securing information, all of which require data. However, we should and need to go a step further to secure all the PII details with tokenisation so that in the event of a hack, the cookies and trackers will only be following a useless token as there is no real identification on it,” Brown explains.

    Zortrex would naturally like to tokenise all healthcare data so that vulnerable people living outside of major cities can also feel assured that their privacy is protected. In a previous blog, we wrote about the new Internet of things (IoT). For all those devices being built for it, their IP addresses and the serial numbers can be tokenised to avoid the terrifying thought of the whole Internet being compromised.

    N26_banner-160x600-EN

    The application of the all-powerful Blockchain is not limited to use in the financial sector and will be applied via the supply chain to all industries that deal with customer data – especially the most sensitive ones.

    An angel investor or any investor for that matter looking to get onto the next best thing since Amazon would therefore be unwise to pass up the opportunity to back the Zortrex venture given its scope!

    Furthermore, regulations are currently being implemented primarily in the pharmaceutical sector and a tokenised supply chain such as what Zortrex offers would be ideal for this new law which is planned to be implemented by 2023.  A judiciary blockchain, for instance, would enable the police to “talk” to the prison service,  who in turn, will communicate with the legal sector and public health institutions such as the UK’s NHS.

    Forensic evidence would in such instances be tokenised and kept secure (away from tampering) during legal hearings.  In another practical scenario, Smart Contracts (which are touted to replace lawyers) can spark off legal aid assistance, so that court cases can be heard quicker, more efficient than currently pertains.  Protection registers can also be protected with tokenisation rendering it more secure.

    Blockchain technology offers quality assurance with every process being undertaken making sure that no shortcuts happen; as the smart contracts trigger any possible malfeasance. This will enable the monitoring/tracking of any data sharing to third parties once it is tokenised. The third party apps would only gain access to the data once the trigger has been activated.

    The company will be providing numerous business blockchain platforms; Asset Chain, Supply Chain, Accountancy Chain, Debt Chain, Life Cycle Management Chain, Outsourced Worker Chain; the list is endless, and all will be adequately secured.

    Like other pioneers and visionaries, Brown’s futuristic hope that every child being born will have their name, date of birth, blood type data being tokenised, might seem farfetched – but may we remind you of the need for data protection taking into consideration the growth rate of massive data breaches.

    Zortrex is aiming high and wants to use their technology to put the hackers out of business!  Tokenisation cannot be mathematically reversed and thus it will least it will stop the hackers for a while.

    Brown explains further that as they move with their education; other information can be added on to the token, as with all their healthcare; any allergies tokenised; what injections they have had right through their life cycle until the day no more data can be tokenised.

    For such high ambitions, the creators of Zortrex’s software have adequately ensured that the technology used is fully scalable. One stumbling block many Blockchain projects now face is what is referred to as scalability – which in tech terms, is the ability of a network or software to grow and manage increased demand.

    This image has an empty alt attribute; its file name is 250x250.gif

    Cryptocurrencies like Bitcoin and Ethereum specifically – which is used to build a lot of Distributed Applications, has massive scalability issues. The growth in demand for DApps is crippling those systems and they are having to investigate the incorporation of alternative technologies, upgrade or split their platforms and accompanying cryptocurrencies to cope with such high demand.

    Someone must take the first step in securing this data forever. Citizens should be able to purchase what they want without being harassed by trackers and cookies. The need for tokenisation is endless and further, down the line, celebrities and government official’s PII can also be secured to protect them from damaging schemes, ‘bad press’ and scandals.

    In another previous blog, we “prophesized” that data is the new commodity – like gold or oil. However, the actual value with that data will lie in its privacy, the ability to store it securely and unlock it only with legal permission by its rightful owner.

  • Criminal mindedness

    Criminal mindedness

    One fundamental and often ignored view within economics is that humans have the propensity to display irrational behaviour in the decision-making processes.

    Based on this notion, one can conclude that we have a fundamental tendency to act corruptly and be generally criminally-inclined except maybe the virtuous few.

    How advanced our economy or society is, depends on what measures or incentives we enforce to deter or punish criminals.
    In most cases, we find that in countries where punishment is severe (e.g. in Central Europe or Nigeria), the criminals end up moving to less strict countries.
    The economics of crime, especially violent crime experienced in countries like South Africa and Brazil, is something that requires adept research if anything is to be done.
    In the US, studies were conducted to access the impact of legalized abortion on the level of crime. This was discussed in detail in a best-selling book by Levitt and Dubner’s called Freakonomics.
    The study found that legalizing abortion (seen by many as legalized killing equivalent to death sentences) reduces the level of drug abuse and subsequently other criminal activity.

    The real problem

    Perhaps there is no relevance here but for instance, abortion is legal in South Africa yet a high crime rate prevails. So, what’s the problem then?
    Part of the problem lies in the fact that the incentives/benefits of committing crime far outweigh the “costs” and chances of being caught and convicted by the judiciary.
    25046_200x300
    John Nash through his renowned works (well at least amongst economists), devised what he called “game theory” or “the prisoner’s dilemma”.
    Cheating occurs through degrees of severity from a classroom test or examination all the way to the plotting and execution of murder or indirectly killing individuals by selling users addictive drugs.
    Then you have your white-collar crime such as insider trading, corporate espionage (unlawfully acquiring recipes, formulas, and technologies from rival companies).
    Or simply ‘cooking the books’ or siphoning off profits from a company’s coffers.
    Nash’s rationale for such cheating behaviour boils down to the attitude of: ‘if I don’t, someone else will, and leave me with the short end of the stick – so given the option, I’ll always cheat’.
    His explanation is one ‘formally proven’ reason for human ‘irrational’ behaviour – or rather, could we say it is rational if the outcome is to favour the decision-maker in the short or long term? This is instinct is innate in human behaviour of not such a few.

    Crime and law enforcement

    Back to the subject of crime: higher than usual levels has often been blamed on the poverty caused by poor and exclusionary fiscal, social and monetary policies.
    There are of course more layers and underlying factors unique to the history of political climate and resource allocation.
    Further studies (such as that in the Freakonomics book) need to be carried out such as the potential effects of police presence in deterring crime in the diagram below:
    Police officers per 100,000 population by regions and sub-regions (medians)

    Crime deterrant

    Source: www.unodc.org

    Also, highly recommended if you are a law enforcer, economist, government official, or student, is a book entitled Economics of Crime by Erling Eide, Paul H Rubin & Joanna M Shepherd.
    This book covers the theory of public enforcement including probability and severity, fines and imprisonment, repeat offenders, incentives of enforcers, enforcement costs and enforcement errors.
    It might shed some light as to how criminally-inclined people can be dealt with once and for all. Because as we know – whatever government is doing to fight crime now is clearly not really working!

    “When crimes are left alone long enough to fester, a second economy is borne.”

    The proceeds from a ‘secondary’ economy because of criminal activity never benefit society. Even though people like Pablo Escobar were seen by locals (in his Colombian town) as philanthropists, their assistance came at a price. Such contributions which are naturally tax-free generally are referred to in economics as ‘social ills‘.
    A third market is formed – one comprised of the need to feel secure.

    Dealing with the scourge

    But fighting fire with fire (with more guns & police who are sometimes corrupt themselves) will not alone solve the problem.
    Criminals simply become more aggressive when met with a more confrontational approach as seen in South Africa. The Jeppestown (Johannesburg) shoot-out in 2006 for example, left several police officers and criminals dead.
    It’s time to get ’smarter’ about crime and look to the accuracy and conclusive study of human behaviour and the use of incentives.
    As crimes continue to ravage communities, cities and countries, we can question why government officials have relatives who own or have stakes in security companies.
    It basically places less of an ‘incentive’ for officials to do much about crime.
    So, conceivably, those with such vested interests in the third economy would need to be weeded out of the system for crime to be curbed.

    That would be the first major step in order to bring about some rationality to society.
  • Life hacks using tech

    Life hacks using tech

    We often do things out of routine without considering if there is an easier way to achieve the same result quicker and even more effectively. In a larger company or organization, this is the job of the business analyst.

    What if we applied this to other daily activities and tasks that shape the way we live?

    This would give us more time to partake in the things we love.
    It’s hard enough for most working-class adults to spend most of their days in the week behind a PC. This is usually followed by hours behind the wheel in traffic or commuting via public transportation.
    This makes the task of going shopping or even attending a doctor’s check-up after an 8-hour work stint more of a burden or chore. Worse over if you must queue further to get the service.


    This very example came to mind when a relative complained about having to go from one doctor to another. When referred to a specialist they had to then book another appointment by calling that specialist’s practice.


    Now granted, this is basically a ´first world problem’. Because having a specialist attend to a back problem after your doctor recommends it during an initial check-up is a luxury. One that third world citizens could only dream of having in the first place!

    Problem-solving scenario

    So, in the case of the referral to a specialist, a simple unified medical system can resolve this. A CRM database linking all the medical practitioners including their schedules can save you the time taken to arrange the new appointment.
    This system would also have a secure high-tech scanning and attachment add-on so that X-rays, scans, diagnoses and the attending doctor’s notes can be attached. All for the attention of the specialist.
    The times for the new appointment can be chosen quickly while the patient is at the doctor’s practice.  When convenient, you could then go to the specialist directly.

    The concept explained

    This is one very basic and rudimentary example of how an automated, centralized software solution can help schedule appointments.
    To achieve maximum optimization the system would clearly require several tests before implementation.

    Too often systems analysts and developers do not consider the end users. The user experience (UX) is the most crucial aspect of software development and should be the first step in building an automated system or it will never achieve its purpose.

    It doesn’t have to be used as a national health solution. This is because centrally planned systems, as mentioned in a previous blog, can lead to inefficiencies.
    It would need to be localized in order to make the system easier to maintain and be updated with contact details.  This especially when information can change on a weekly or monthly basis.


    Naturally, and for decades, health insurance companies have utilized card systems to document patient visits to practitioners. This also helps you and practice to easily claim back medical costs.


    But this only serves a singular function and is laborious to run. What is being proposed in this blog post is something to resolve this in a more secure and decentralized manner.

    Application and security

    Cloud security has become a huge requirement and will be a necessity for all businesses and services in the very near future. Europe, for instance, is implementing compliance laws for storage of data under its new GDPR regulation.


    Countries like Sweden also have similar compliance laws to handle financial (with a lot of banking going mobile) and medical data stored in the cloud.


    So, security would become less of a concern for businesses when it comes to data storage and automated CRM systems in the future.

    Shopping and housing convenience

    smart-home-3096219_640

    The burden of shopping can also be alleviated with initiatives such as cashless processes. We first saw this introduced in Asia (China) and now adopted in the West through Amazon’s new cashless´ and cashier-less grocery stores.


    While shoplifters might not see the innovation in this ‘new method’ of shopping; it saves you time spent queueing to pay and will invariably help resolve the scourge of shoplifting.


    It will, however, require more reliance on technology for surveillance, to monitor and track the scanning of the goods and keep a database of records on a server.


    This helps you with the inventory management and other back-office processes and is managed by an automated ERP solution (and not a person).
    We are still waiting for massive roll-outs of the so-called smart houses equipped with smart chips that help regulate temperature, turn off energy-consuming devices when not in use.


    Some are even equipped with fridges that remind you when food is expiring or simply needs to be replaced.


    Designing such systems would naturally require careful observation into the various steps needed to reach the desired result. Details in every step from how you go from point A (selecting a product); to point Z.


    Point Z being you walking out of the shop with a fully paid item. All without using cash or the need for a cashier.

    Tweaking the solution

    The system analyst’s job would be to engage or even simulate the processes using different test subjects and not just the best practice.
    There is the possibility that you might forget to pay for the milk after checking out of a security area. That could result in an embarrassing scenario for all.


    These are just two examples of countless scenarios that can help us benefit from the use of automation and AI.
    There are many other subtle examples such as in the motor industry. This includes the use of computers to diagnose a ‘sick car’.


    There can be a solution for every bottlenecking problem. Addressing this is now has become a new field of study. Computerization and the use of robotics to handle manual labour and repetitive blue-collar jobs will be new highly lucrative career paths.

    Many new start-ups already exist purely to develop system automation.

    Welcome to the future!

     

Translate »

This website uses cookies. By continuing to use this site, you accept our use of cookies.