Virtual Reality and Augmented Reality Are Changing The Way Resource Industry Works

Virtual Reality is changing the resource industry. With tech giants like Facebook, google, apple and Microsoft leaping on VR & AR, the industry and technology have evolved, from just a gimmick in its infancy to becoming a beneficial technology for other industries as it matured. Both terms VR & AR have even been combined into what is now known as Extended Reality(XR) or Mixed Reality. This Term was coined by Microsoft when they released the HoloLens back in 2016.

So why does VR, AR & XR matter and why is it such a beneficial innovation for the Mining & Engineering sectors?

Let’s start with engineering. With the obvious changes in the workplace over the recent year collaboration, travel and multi-company projects have been delayed or put on hold altogether, and as the future remains unclear, new innovations come into play to bring back productivity to the workplace. We still need to collaborate and meet deadlines wherever we are. Microsoft is leading innovation in the XR space with recent announcements at the Ignite conference around their new Mesh platform, “Here can be anywhere”.

 

Mesh allows for collaboration in an immersive virtual form from anywhere in the world. Say you have a team of engineers working on a modification to some mining machinery and their goal is to make the machinery more robust for the specific mining environments within far north Queensland. The team is local, 20% of them working from home and they have reached a roadblock and need to bring in an engineer with more experience with parts of the OEMs systems and they are located in Sydney. Mesh allows for the office team, the work from home team and the engineer from Sydney to collaborate in one space via HoloLens’. With Mesh, teams can interactively manipulate 3D objects that you can add yourself. In this case the office team has put the part in question into Mesh, the work from home team and the guest engineer has joined and are displayed via 3D virtual avatars. Suddenly it’s as if you are all there, all be it with a few uncanny virtual faces. Now your team have put together a solution and there has been minimal extra spending.

Microsoft Mechanics actually released a demonstration on the “collaborative mixed reality experiences” Which shows how it works.

Microsoft Mesh isn’t restricted to just the design and engineering section of the company, it can also benefit the training process, meetings and other similar processes that require collaboration and with obvious cost reduction benefits and the technology itself maturing past the point of novelty XR are the future for the resource industry.

6 ways you can keep your devices secure while not working in the office

 

Ah the office, remember the days when you knew exactly when you were meant to start, what you needed to get done and that you could get it all done on a secure network? Those were the days but now we are in the remote working era. So how do you stay secure whilst not working in the office?

Let us give you some tips so you can keep working securely.

1.    The correct password

Everyone is guilty of sticking with a password. It’s so much easier than trying to remember all the different credentials for each account but why do you need to have multiple passwords. Here’s an example. Your Facebook account has a breach and now they know your password, this is also the same password to your work accounts and your work is listed on your Facebook profile, now that person has access to way more than just selfies from 2010.

We understand that it sucks to have multiple passwords but there are easy ways to store them that are secure. Your browser can save your credentials in a secure location on your corresponding account, so you can auto-fill rather than give up security for convenience.

2.    Two-factor authentication

I know, you’re probably sick of seeing every app you own tell you to activate two-factor authentication but it really does nullify the risk of a breach. It has been proven that this method of security block %100 of automated bots, %99 of bulk phishing attacks and 66% of targeted attacks according to Googles research. The way this works is you attach a contact method, such as text, email or push notification and you then have to either approve through the notification or input a code sent to you to then access your account. This means you have full control over the access to your account as it contacts a device that you own.

3.    Pick a good workplace

If you’re in a situation where you are able to work from a café or somewhere similar, make sure you pick a private workspace. You should always be aware of your security online but a lot of people forget about the security of their devices from a more analogue perspective.

There are a few simple ways you can increase privacy and security in public spaces whilst working. Find a private spot in your chosen work environment, this will allow you to keep an eye on who is around and also allow you to keep your work private.  Wear some in-ear or noise-cancelling headphones whilst in meetings, the last thing you need is someone listening in on your meetings and writing down credentials. Lock your device if you step away from it. This is super simple but it’s very important and was built into operating systems for a reason. A quick way to do so would be hitting the Windows logo key + L (Windows) or control + command + Q (Mac) to swiftly lock your computer.

4.    Only use encrypted networks

Free WIFI, it has the word free in it but is it really? Free WIFI is a quick way to open up your data to anyone who wants it. Due to the lack of encryption, anyone can join and anyone can access the devices on that network with the correct technical know-how. Make sure that the network your connecting to is WPA-2 or higher. This is a network encryption type and is commonly used on most home networks and private networks. To find out if a network is encrypted, go to the internet icon on your taskbar, select the network you want to check and click properties. This will give you a rundown of network settings along with it’s encrypting type. Don’t let the idea of free WIFI draw you in, because it may cost you more than it’s worth.

5.    Use a VPN

A virtual private network, also known as a VPN is a virtual network that allows you to connect to a network securely even if it’s open. VPN’s create an encrypted tunnel for your data to flow through, meaning that virtually no one can track, steal or breach your data or system. This tunnel then connects to secure servers and bounces it around so one can see it let alone do anything. If you enjoy working from cafés or public spaces with free WIFI please invest in a VPN as it will save you dealing with any breaches in regards to private data or work data and we all know the boss doesn’t want the companies files just flapping in the virtual wind.

6.    Know your scams

Scams are extremely common events on the internet. From a so-called long-lost lover asking from $7000000 to be wired to them to a fake tech support page telling you that your device has been breached. If you don’t know what you’re looking for it’s easy to fall for these. Do not under any circumstances let someone take control over your computer or ask for access to your device’s accounts. Unless you have asked someone to do this, no self-respecting company would request access to your system without a formal request beforehand. For our Aussie readers we will link to a government recourse Scamwatch so you can further educate yourself on online scams.

 

Cloud Migration Checklist What You Need to Consider

Cloud Migration Checklist  What You Need to Consider

Thinking of moving to the cloud? Migrating your business to the cloud can be daunting, We have created a cloud migration checklist so you can easily figure out the steps you need to take to get your cloud from on-premises to the cloud.

The Importance of Creating Governance in a Time of Crisis

The Importance of Creating Governance in a Time of Crisis

It seems like such a long time ago that we went about our everyday working in our office settings or onsite with clients to sudden lockdown. The “new way of working” is presenting us with a number of new challenges, ones that we never saw working in the traditional office, such as "Zoom bombing". The combination of loose security on meetings and so many people online with nothing to do leads to bored individuals disrupting meetings for fun. Even in a time of crisis, these challenges need to be addressed.

The Remote Worker..

The Remote Worker..

Remote working is not something new to many organisations. In fact, it has been a buzz word in many industries for several years, starting with the Gen-Y revolution through to the current COVID-19 outbreak. For some of us, remote working is nothing new and is already a key part of many businesses work practices. Personally, working in regional centres where travel is often required, I encounter many employees from different organisations who have made remote working the new normal.