Tampa Bay Tech Member News

Longevity Risk: Living Longer And The Increasing Retirement Burden

OVERVIEW Centenarians – those individuals who reach 100 years of age or more – used to make headlines. Living to 100 years used to be a somewhat rare occurrence, but recent research suggests the world’s centenarian population is likely to accelerate. Such changing demographic patterns are significantly altering how governments and the private sector forecast …

Longevity Risk: Living Longer And The Increasing Retirement Burden Read More »

The Economics of Hurricanes: Preparing for Hurricane Season

Overview Each year, researchers at Colorado State University predict Atlantic hurricane season activity. Their forecast taps 60 years of historical data on sea surface temperatures, wind-shear levels, ENSO phase and other factors. Their initial forecast for last year’s hurricane season predicted a slightly below average season, but subsequent forecasts suggested increasing odds of more storms. …

The Economics of Hurricanes: Preparing for Hurricane Season Read More »

Leading-Edge Logistics: How Tech Can Strengthen The Supply Chain

OVERVIEW Technological revolutions never happen in isolation, and they are only successful if they are adopted by consumers and spark innovation by other organizations. Consider the Global Positioning System (GPS). Launched by the U.S. Department of Defense, GPS started as a military navigation technology, but, once it found its way into civilian use, the way …

Leading-Edge Logistics: How Tech Can Strengthen The Supply Chain Read More »

Beyond The Cyber Basics: Bug Bounties And Simulated Attacks

Overview This month marks the one-year anniversary of the WannaCry ransomware attacks, which Wired called the “worst digital disaster to strike the internet in years.” By exploiting an operating system vulnerability, the ransomware corrupted data on some 200,000 computers across 150 countries, then demanded payment for restored access. The cost of damages has been estimated …

Beyond The Cyber Basics: Bug Bounties And Simulated Attacks Read More »