Radical Open Innovation News week 35-2019

Welcome to our biweekly selection of digital innovation news. Created using our opinionated automated selection algorithm with a twisted text rank summary creator. We present some top innovation news items to get you thinking, debating and take action in order to make our world even better.

1 Can we avoid the Internet of Trash?

I definitely don’t have many answers myself, but here are a few thoughts. Findability Can we implement a standard for locating embedded devices, even if their power supply has died? You pay a small deposit for many bottles and cans, maybe we could do the same for embedded devices? Right now my best guess is that there are 250 billion embedded systems active in the world, with 40 billion more being shipped every year. The printed circuit boards, batteries, chips, and other physical components that make up these devices are going to become litter. Those benefits are only half the story though, so I’ve been doing my best to think through what the unintended consequences of a change this big might be.

(Pete Warden’s blog)

2 The Intelligent Edge revolution

The Intelligent Edge and Intelligent Cloud platform that’s already out there for everyone to use is already quite capable. But while this shift is impacting PCs, we will still see a few years where the power and compute capabilities of Intelligent Edge devices will continue to improve exponentially without much increase in cost. A year ago, I shared my belief that the Intelligent Edge would unfold as a platform over the next several years in ways that would surprise us by its breadth and diversity. But one thing that’s become very clear to me as I build this machine is this: The Intelligent Edge parts of the device are neither especially hard nor expensive. IoT devices that are part of the Intelligent Edge provide businesses with invaluable insights on how to transform processes for operational efficiencies, such as improving the maintenance of vital of equipment before a costly shutdown and accelerating innovation while simultaneously improving safety, for example.

(Microsoft)

3 Artificial intelligence could help data centers run far more efficiently

Doing so could help today’s power-hungry data centers run far more efficiently. Their system’s “agent” is a scheduling algorithm that leverages a graph neural network, commonly used to process graph- structured data. Data centers can contain tens of thousands of servers, which constantly run data- processing tasks from developers and users. They may, for instance, code the algorithm to get certain jobs done quickly or split resource equally between jobs. Cluster scheduling algorithms allocate the incoming tasks across the servers, in real-time, to efficiently utilize all available computing resources and get jobs done fast.

(MIT Reseach CS)

4 Topic polarization and push notifications

In the fake news era, a combination of politics, big technology, and fear and animosity are blamed for the media mistrust and filter bubbles that are entrenching fragmentation in the public sphere. A partisan divide in the media and extreme political disagreements are nothing new, but new technology, such as social media and mobile push notifications, influences these years-old phenomena and plays an important role in current concerns. This paper explores how stories are represented differently by topic and across platforms, examining representation, polarization, and objectivity. Specifically, this paper looks at those issues from a novel perspective: through sentiment analysis of push notifications generated and archived from the Breaking News App on disasters, gun violence, and terrorism. Results indicate that partisan news organizations (1) emphasize different stories; (2) label the same events as categorically different; (3) hyperbolize and emotionalize different types of stories; and, (4) represent different categories of breaking news stories to different degrees of subjectivity.

(First Monday)

5 Cybersecurity Engineering for Legacy Systems: 6 Recommendations

Legacy systems continue to play a key role across many organizations. Engineering cybersecurity into these legacy systems presents some unique challenges. In many cases, the original design team is no longer available, leaving the current team with the challenge of changing poorly- and/or un-documented designs and software. Over the years, these systems can become so outdated that they are unable to keep up with new software patterns and development technologies, including the ability to patch known security or design flaws. This blog contains six recommendations to help keep legacy software secure.

(Software Engineering Institute )

6 The Engine expands, responding to rapid growth of “tough tech”

The Engine launched its portfolio in 2017 with investments in seven tough-tech companies. This framework clears a path to commercialization for companies by providing capital, infrastructure (labs, equipment, office space, and more), and a support network. This tough-tech hub will be a new center for The Engine, and a focal point of the innovation ecosystem inspired and cultivated by MIT. For more information about The Engine, please see its first report for the period 2016 -2018.

The Engine, built by MIT, invests in early-stage tough-tech companies. These companies have long been underserved by the traditional investment ecosystem, leaving many breakthrough ideas stuck in the lab.

(MIT Reseach Innovation)

7 Entropic: a federated package registry for anything

War in Javascript NPM land. But one good solution is always innovation forward. So learn of Entropic (especially how, when and why now!). npm is centralized private and so has many disadvantages… So time to take control back!

Complicating matters: we live in a flawed, capitalist society, so a smaller-yet subset of people will be responsible for maintaining a registry and will be liable for paying the bills. We will call this (un-?)happy group of people ADMINISTRATORS.” This group may be further subdivided into administrators primarily concerned with supporting the registry: identifying and removing spam and spammers, resolving disputes, and ensuring the health of the community by answering questions and responding to abuse reports. VC funding may run out someday and in any case has untowards effects on such the NPM registry. CALAMITY is on the horizon.

(Entropic)

The Radical Open Innovation weekly overview is a brief overview of innovation news on Digital Innovation and Management Innovation from all over the world. Your input for our next edition is welcome! Send it to [info] at [bm-support]dot[org]