Skip to Content

Double Eagle

Double Eagle

Fittingly there are two topics for today’s title, and let me say it's great to talk about something lighthearted and comical for a change.

What’s so funny you ask? Well, if you hadn’t guessed from the golf related title I’m talking about the spectacular (pun intended) tackle of Canadian golfer Adam Hadwin by a security guard while trying to celebrate the tournament win of friend Nick Taylor. The still picture is better than the video and worth a thousand words, though I’ll give it a few less here. There’s just something magical about the celebration in the background opposite a flailing man being thrown to the ground while a bottle of champagne majestically erupts in his hand.

In light of some less comical security incidents in recent years I think we can go ahead and give that security guard a pass on this faux pas. That, and per Hadwin’s wife on Twitter, the Canadian golfer apologized to the security guard that tackled him. A little Happy Gilmore moment to start your week off right.

The second eagle for this week’s blog is Eagle Eye Networks (EEN) and the infusion of money they’ve received courtesy of an investment from SECOM. $100 million will almost certainly do a lot to advance the company’s work in AI technology via the continued development of their cloud video surveillance solutions. As EEN CEO Dean Drako points out both AI and the cloud have done a lot in shaping the current video surveillance industry and will continue to do so. The third part of that trinity is security.

Cloud and AI technology are both secure and insecure, and I’m not being cute with that statement I promise. Cloud centralization of data and the increased number of resources available for it places cloud security as more or less equally secure to more traditional systems, but its also more complex, and the more complicated a thing the easier it is to break. AI is the same way, in a short period of time users have both worked with AI to generate complex security protocols and advanced recognition programs, while others have used it to break encryption and manipulate information.

The development of these technologies therefore must continue to go hand in hand with an ever-changing security industry (especially cybersecurity), lest it become a burden hung around the neck of a burgeoning field of enterprise.

Coincidentally, another name for a double eagle, is an albatross.

Comments

To comment on this post, please log in to your account or set up an account now.