borwell

Space, GIS & Cyber: applications in agri-tech

Agritech

During May this year the borwell team prepared  a series of  presentations which investigated data & GIS, security, and innovation in Agritec in collaboration with Pershore College. We sought to provide an answer as to why we need to be precise in Agritech and to explore the impact of being secure, and innovative.  

The first presentation looked at data & GIS. We explored how GIS (Geographic Information Systems) aimed to make spatial data more useful.  We looked at data collected from satellites & drones, including multispectral, resolution Sentinel 2 data and other satellite datasets. We also looked at the differences between satellite data and drone data, types of datasets available and how they can be combined.  

Topics covered included: 

  • GIS systems for agriculture. 
  • Use of a GIS for fertilizer mapping of crops. 
  • What is needed to collect data for a GIS fertilizer map? 
  • Variable rate fertilizer spreading. 
  • NIR Cameras. 
  • Compare different types of drone. 
  • Different types if satellite. 
  • Satellite data options. 
  • Pros and cons of satellite data 
  • Machine learning and it’s role in the collection and analysis of data. 
  • Crop Surveys. 
  • Crop health – NDVI. 

 

The second presentation looked at Cyber Security. Cyber tools that will best respond to the challenges within the farming sector and why it is good to learn about how to be more secure. Our training offered advice on the most pertinent threats to business and was delivered by our in-house security analysts who see, exploit, and advise on these current threats. With a tailored approach for Agritec, our team covered: 

  • Safe ways of working and communicating with others. 
  • An opportunity to improve your team's cyber-hygiene. 
  • Learning new skills and tactics and share best practices with others. 
  • Awareness training on new threats and tactics used by hackers. 
  • Essential reminder of existing and current threats. 

We explained which vectors attackers are most likely to use to compromise business in your industry, and how you can find effective ways to eliminate these.  

 Technical topics covered included: 

  • Technology specific – what is ‘encryption’, and how do we use it? 
  • What is the ‘OWASP Top 10’ and how does Web Application security fit into your business? 
  • What types of phishing are there, and how do these vary? 
  • How can we effectively introduce actions to reduce risk to staff and technology? 

 

 

Finally, we prepared a session on Innovation. We sought to ask how Innovative your business is, are you focused on your customers and 'Is your business innovation ready?' 

Discussion topics included: 

  •  'is your business a SMART and Sustainable organisation?' 
  •  'is your business really customer focused?' 
  •  'are you embracing the potential of 4th industrial revolution’.  
  •  'what are your production and service delivery processes?' 
  •  'how rigorously do you need to adhere to them?'  
  •  'does success mean are you allowed to fail’.  
  •  'is your leadership facilitating innovation?' 
  •  'how does your organisational culture support innovation' 
  •  'protecting intellectual property rights’. 
  •  'what are your supply chain practices’.  
  •  'do you promote collaborative working practices treating your suppliers as partners?' 
  •  'the importance of an innovation ecosystem'   

 

Exit mobile version