Connect with us

Technology

Robots and Humans Working Hand in Hand

Published

on

Though workers may be concerned that automated systems or warehouse robots could replace them on the job, implementing automated systems within warehousing and manufacturing will improve the lives and jobs of everyone who works there – from labourers to the foreman and even the company owner. Worker safety is enhanced and morale can benefit too, when automated devices handle stressful, repetitive tasks, thereby freeing workers to focus on more value-added activities.

Technology is changing the nature of how warehouses operate. It reduces the physical demands. Some technologies even reduce the need for employees or consultants to be on-site – critical in a time of social distancing.

In efforts to implement social distancing guidelines, warehouse managers are working towards becoming more digital and finding alternative ways of ordering and receiving products.

Digital supply chains will be the dominant supply chain model within the next five years making use of technologies such as robotics, wearables, and autonomous vehicles increasing worker efficiency and taking over aspects of warehouse work that are tedious or dangerous.

Implementing the ideal automated warehouse system and solution for a business can appear daunting and difficult. But now that the opportunity exists to increase efficiency through automation – barcode scanning, handheld tablet computers, automated storage and retrieval systems – the benefits of warehouse automation is undeniable.

Technology

Healthbridge brings world-class technology to South Africa

Published

on

The rapid advancement of technology today is propelling digital disruptions in many industries and the Healthcare industry is no exception. To operate a great business, a medial practice cannot thrive without the right technology.

According to Luis da Silva, MD of Healthbridge, the present business model for medical practitioners is under strain. “Too much time is spent on administrative duties. For example, if a doctor could rather spend that time on seeing an extra patient a day working on the average 15-minute consultation, his bottom-line would increase by 10%.” he says.

With regards to the medical field, these practices are crucial. Healthcare software myMPS is abreast of the latest cloud-computing technologies that allow it to deliver faster and smarter solutions. By placing the innovative platform in the cloud, clients can connect not only to Healthbridge’s own exciting technologies, but also to other partners for more value, at far greater speeds. This encourages industry-wide interconnectivity, meaning everyone can thrive together. 

myMPS utilizes cutting-edge technology that has been used for around 7 years. Healthbridge is an innovative and forward-thinking healthcare company at the frontline of healthcare solutions.

Continue Reading

Technology

The Future of Machine Learning and Road Safety

Published

on

Millions of deaths occur from traffic accidents every year with many efforts trying to reduce the frequency and severity of these traffic accidents.  The most effective way to tackle this problem is by means of an extensive program of road safety management, in which road safety modelling plays an essential part.

The modelling process attempts to adjust a model to the crash data, the geometric and operational characteristics of the road, and the environmental conditions, incorporating the most important factors. Numerous modelling techniques have been developed to improve the representation of reality, allowing for the employment of techniques that are more appropriate to the problems.

There have been limitations to these approaches, allowing for new opportunities, such as machine learning that SANRAL is currently exploring.  This allows to improve road safety, reduce congestion and information infrastructure development.

Machine learning can be used to detect and segment objects within the camera frame.  These objects can then be classified based on pre-trained image classification.  Which ultimately allows for the detection and classification of different types of vehicles, pedestrians, different types of animals, cyclists, etc.  The possibilities are infinite, based on the data available. 

Currently, there is ample data on the above-mentioned classification types.  While this is still in the exploratory phase within South Africa, it does come with significant risk and efforts are being made to understand how to effectively use this technology, while maintaining strict compliance with legislation as it relates to the privacy of the road users.

Continue Reading

Technology

The Unseen Attacker: Cybercrime

Published

on

According to experts within the industry, the SUNBURST cyber attack appears to be one of the most complex and sophisticated cyberattacks in history.  The SolarWinds-Sunburst campaign is the first major supply chain attack of its kind and represents a shift in tactics where nation-State threat actors have employed a new weapon for cyber-espionage, and the use of a supply chain attack has changed the way one needs to defend against these cyberattacks.

These types of attacks impact not only private companies but also pose a threat to individuals and their families, given that in todays highly interconnected homes, a breach of consumer electronics could result in attackers accessing smart devices like smart phones to steal information or to act as a gateway to attack business.  Unlike government networks, that store classified information on isolated networks, private organisations often have critical intellectual property (IP) on networks with access to the internet making these attacks even more dangerous.

Hackers make us of trusted software to bypass cyberdefenses, then infiltrate the organisations and steal data, destroy data, hold critical systems for ransom, orchestrate system malfunctions or simply implant malicious content through the organization to stay in control even after the initial threat appears to have passed.

Another observation has been made on the threat that they can also use social networks, such as LinkedIn, WhatsApp, Facebook, and twitter to engage and develop relationships with and then compromise corporate employees, through who they compromise the broader enterprise.

While enterprises assert security controls over corporate issued devices and place restrictions on how consumer devices access IT assets, user activity on social network platforms are not monitored and controlled in the same way making it somewhat more difficult.

There has been a forecast that social network platforms attacks are becoming more common in the years to come, particularly among most advanced actors.

Continue Reading

Trending