Blog Posts

Evaluating Your Startup Idea – Part 2

In my previous post, I shared a list of eight things you can do to objectively evaluate your startup idea, before you go running to build that super cool product that you just know is gonna Rock The World. I want to simplify that list. Why? you might ask. Well, I had the pleasure of visiting the company of a dear friend yesterday. He shared a problem his company and his industry is experiencing, and his idea that a software

Continue Reading

Evaluating Your Startup Idea

Got a new idea for a startup company? I know, it’s pretty exciting! But before you go running off to dropout out of school or quit your job, there are somethings you should think through. Recently a mentor of mine shared these questions that I’ll like to pass on. To help you evaluate your idea, reflect on and answer these questions: What is the specific problem that you see and are trying to solve? Who are the customers and specifically

Continue Reading

Understand Machine Learning Strategy

Have you ever wondered about… How to structure machine learning projects properly? How to lead machine projects and teams effectively? How to reduce the error and improve the performance of your machine learning systems? Well, I did too, and with the Coronavirus situation I had more time available since I’ve been doing much less driving or traveling! I found, completed, and quite enjoyed the course, Structuring Machine Learning projects, via Coursera. This course is part of a Deep Learning Specialization

Continue Reading

Learning about IoT Security and Privacy

A few days ago my book titled “The IoT Architect’s Guide to Attainable Security & Privacy” was released. I had the pleasure of writing it with my friends, David M. Wheeler and JC Wheeler. In the book, we describe how to architect and design IoT (Internet of Things) systems that preserve security and uphold privacy. I’d like to give a brief overview of what we share in the book and what a reader can learn, but before we go into

Continue Reading

Pirating AI: How to Copy Premium Machine Learning Services

*This article was first published by Edward Dixon, Alex Ott, and Damilare Fagbemi on Medium. Machine Learning As A Service (MLaaS) is the latest variation in the trend of offering software services via the cloud. From the software vendor’s perspective, a significant advantage of the cloud model of software delivery, is the prevention of software piracy. Software delivery via the cloud eliminates the need to deliver software binaries or code directly to end users. This usually means that vendors need

Continue Reading

Basic Video Privacy and Security Requirements from GDPR

The General Data Protection Regulation (GDPR) is a regulation in EU law on data protection and privacy for all individuals within the European Union (EU) and the European Economic Area (EEA). It also addresses the export of personal data outside the EU and EEA areas. The GDPR aims primarily to give control to citizens and residents over their personal data and to simplify the regulatory environment for international business by unifying the regulation within the EU. Importantly, the GDPR also

Continue Reading

Security Recommendations for Cloud Computing Infrastructure and Apps

I recently came across the Cloud Security Alliance (CSA) and their comprehensive guide for securing cloud computing. CSA is a non-profit with about 80,000 members, that’s been in existence for almost a decade and has chapters across the world. NIST (the US National Institute for Science and Technology) defines Cloud computing thus: Cloud computing is a model for enabling ubiquitous, convenient, on-demand network access to a shared pool of configurable computing resources (e.g., networks, servers, storage, applications, and services) that

Continue Reading

On writing… Designing Secure IoT Systems

It has been a while since I’ve had a chance to blog, and I have missed it. However, a good chunk of my writing cycles have been spent chugging away at a book! It’s titled, you guessed it… Designing Secure IoT Systems. The promise of the Internet of Things (IoT) is that computers combined with sensors can help us to effectively analyze, understand, and respond to a variety of situations in our daily lives and work. IoT, with its network of  powerful

Continue Reading

IoT Security: Old Problems + New Situations = New Problems

A few days ago, news broke concerning the unintended exposure of US Military around the world, due to a fitness tracker which allows it’s users to share their exercises and exercise locations. Perhaps even more disconcerting is that in this case, the fitness tracker or wearable (which is paired with the user’s smartphone) seems to have default settings that enable such sharing. Privacy problems introduced by location aware technology is not new. Research into mobile applications have revealed privacy concerns

Continue Reading