Ahmed Banafa

About Me

Prof. Ahmed Banafa, Faculty at San Jose State University, has extensive research work with focus on IoT, Blockchain, cybersecurity and AI. He served as an instructor at well-known universities and colleges. He is the recipient of several awards, including Distinguished Tenured Staff Award, Instructor of the year and Certificate of Honor from the City and County of San Francisco. He was named as No.1 tech voice to follow, technology fortune teller and influencer by LinkedIn in 2018, featured in Forbes, IEEE-IoT and MIT Technology Review, with frequent appearances on ABC, CBS, NBC, BBC, and Fox TV and Radio stations. He is a member of MIT Technology Review Global Panel. He is the author of the book “Secure and Smart Internet of Things (IoT) using Blockchain and Artificial Intelligence (AI)”.

Ten Myths about Cloud Computing

Cloud supports rapid experimentation and innovation by allowing companies to quickly try and even adopt new solutions without significant up-front costs. The #Cloud can be a highly agile wrapper around different systems, different behavior and bringing it all together in an engagement cycle. By changing the way people interact with technology, cloud enables new forms of consumer engagement, expand collaboration across the value chain and bring innovation to companies’ core business models. However, there are myths surrounding cloud computing and clouding the reality of the cloud.

Blockchain and AI: A Perfect Match?

The combination of blockchain technology and Artificial Intelligence is still a largely undiscovered area. Even though the convergence of the two technologies has received its fair share of scholarly attention, projects devoted to this groundbreaking combination are still scarce. Putting the two technologies together has the potential to use data in ways never before thought possible. Data is the key ingredient for the development and enhancement of AI algorithms, and blockchain secures this data, allows us to audit all intermediary steps AI takes to draw conclusions from the data and allows individuals to monetize their produced data.

Twelve Myths about Blockchain Technology

Blockchain technology is young and changing very rapidly; widespread commercialization is still a few years off. Nonetheless, to avoid disruptive surprises or missed opportunities, strategists, planners, and decision makers across industries and business functions should pay heed now and begin to investigate applications of the technology. Blockchain ensures that data has not been tampered with, offering a layer of time stamping that removes multiple levels of human checking and makes transactions immutable. However, it isn’t yet the cure-all that some believe it to be.’

Ten Trends of IoT in 2020

The year 2020 will hit all 4 components of IoT Model: Sensors, Networks-Communications, Analytics-Cloud, and Applications, with different degrees of impact. By 2020, the Internet of Things (IoT) is predicted to generate substantial revenues, as well as to drive substantial cost reductions. IoT and smart devices are already increasing the performance metrics of major industries. The following 10 trends explore the impact of many technologies on IoT and predict what is next for IoT.

Ten Trends of Blockchain in 2020

Blockchain technology will stimulate people to acquire new skills and traditional business will have to completely reconsider their processes to harvest the maximum benefits from using this promising technology. In addition, blockchain will revolutionize operations and processes in many industries and governments agencies if adopted, but its adoption requires time and effort. The implementation of this technology has a rapid growth which will create a situation for the demand of Blockchain experts by 2020. The following 10 trends will dominate blockchain technology in 2020.

Quantum Computing and Blockchain: Facts and Myths

The quantum computer, following the laws of quantum physics, would gain enormous processing power through the ability to be in multiple states, and to perform tasks using all possible permutations simultaneously.  While the native encryption algorithms used by Blockchain’s applications are safe for now, the fact is that the rate of advancements in quantum technology is increasing, and that could, in time, pose a threat. The biggest danger to Blockchain networks from quantum computing is its ability to break traditional encryption.

First Line of Defense for Cybersecurity : AI

With all the hype surrounding AI we tend to overlook a very important fact. The best defense against a potential AI cyber-attack is rooted in maintaining a fundamental security posture that incorporates continuous monitoring, user education, diligent patch management and basic configuration controls to address vulnerabilities. In the security world AI has a very clear-cut potential for good. The industry is notoriously unbalanced, with the bad actors getting to pick from thousands of vulnerabilities to launch their attacks, along with deploying an ever-increasing arsenal of tools to evade detection once they have breached a system. All explained in this article.

The Harvard Innovation Lab

Made in Boston @

The Harvard Innovation Lab


Matching Providers

Matching providers 2
comments powered by Disqus.