Toggle light / dark theme

Does the connected self driving car, mean a connected work car as well?


SAN FRANCISCO — In the balancing act between business and pleasure, the modern connected car is mostly about pleasure. Drivers can easily stream music from the Internet and dictate text messages to friends, but staying connected to the office is still cumbersome, as anyone who has tried to join a teleconference while driving can attest.

People tired of checking corporate email around the clock may prefer it that way. After all, a request from the boss can still be reasonably deflected with a simple: “Sorry, I’m driving.”

Yet for Microsoft Corp., which dominates the workplace software market with its Office 365 suite, in-car productivity is a huge, untapped opportunity. Many people use cars as mobile offices, and as cars become more automated, putting together a slide deck behind the wheel may go from unsafe to commonplace.

Read more

A story from Salon on transhumanism:


While we have a rare combination of candidates with a real chance of taking the White House — a woman, a Jewish socialist and a real estate magnate — there’s another you probably haven’t heard about: a Transhumanist.

Zoltan Istvan, 43, the leader and founder of the Transhumanist party, has entered the race as a third-party candidate promising the “facilitation of immortality.” Istvan, who lives in California, first made headlines when he set out on a cross-country campaign tour in a bus shaped like a hearse last September. His main philosophy: enliven America’s technological advancement by combining humans with machines, to improve and prolong life.

In U.S politics, the two traditional parties have consistently dominated the electorate. In fact, Sen. Bernie Sanders is the only Independent in Congress, every other House member belongs to either the Democratic or Republican Party. But historically the country has had a history of fringe candidates, which typically get a few thousand votes in presidential elections. In 1992, billionaire businessman Ross Perot, who ran on the Reform Party, won 18.9% of the vote, the best finish by a non-major party candidate in a presidential election since Teddy Roosevelt won 27.5% of the vote in 1912. While Perot’s Reform Party, like practically all third parties, has failed to emerge as a contender since then, candidates like him have had a significant impact on electoral outcomes.

Zoltan Istvan is still an ambiguity for most of the political world, and the Transhumanist party in its early stages of development, but there is something to be said about how his policies could predict the way the political landscape might change in the decades to come.

Read more

VR experience with SCM, CRM, etc. Imagine the improved connected customer experiences with VR.


Envelop VR, a software company that is leading businesses to immersive computing, announced today that it has hired Jeff Hansen as Vice President of Business Development. Jeff’s primary role will be to engage with enterprise customers wanting to solve for real business challenges by utilizing a virtual reality environment, including improving their work flow processes and efficiencies, visualizing data, or collaborating on engineering or product development. Envelop VR solutions enable enterprise customers to unlock the tremendous benefits and advantages of working and collaborating in a three-dimensional virtual environment.

This Smart News Release features multimedia. View the full release here: http://www.businesswire.com/news/home/20160218005289/en/

Read more

I will admit; AR is more practical than VR in areas of SCM, etc. However, it is interesting to see how both play and evolve in the enterprise/ corporate models and connected customer experience areas of business. Also, overtime some of the small AR shops could be buying opportunities for mid-tier enterprise software companies.


Here’s where small tech companies can challenge the big guys in the world of virtual and augmented reality.

Read more

This is a good baseline around common known issues — the real problem is cyber terrorists (as I call them) learns from each attack they instigate and like an artist, they constantly are fine tuning their own skill. So, the attacker’s approach and execution may be done one way, and by the next attack they can easily have changed their whole attack model completely which makes it very cumbersome for experts to trace at times. If we believe this is bad now; wait until AI is more widely available and adopted. Or, Quantum ends up in the hands of these guys.


Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability. As business owners, online shoppers, students, employees and even house wives, we remain at high risk for intrusion of our virtual systems. In this digital day in age, our personal data is used everywhere from when we make an online banking transaction to buying a new shirt at the mall, and even working on a project at the local coffee shop. It is hardly responsible to think that your information is safe anywhere.

Protecting Yourself

Lucky for us, there are many effective and efficient opportunities for protecting ourselves virtually. When it comes to building a good defense against malicious cyber attackers the best mode of attack is a good offense. This means, educating yourself and setting up parameters that protect your system and therefore your personal data from all angles. In the grand scheme of things, knowledge is power and the more power you have, the more you can leverage such as a way to build a good defense against cybercrime. Here are five facts about cybercrimes that you might not be aware of:

Read more

HYDERABAD: Telangana police and Assam police nabbed an online fraudster in Guwahati on Thursday, even as the culprit tried to open fire at the police party.

A team of Cyberabad Cyber wing police had been camping in Guwahati for the last two days to nab one Vipul, wanted in a Rs 76-lakh online fraud case. He would send emails promising to get contracts in corporate companies, but after collecting money he would cheat the aspirants. The Cyberabad police party called Vipul on the pretext of some business deal to trap him. Crime wing officials and Assam police were waiting in a car for Vipul, who arrived in a Scorpio car.

However, Vipul got alert after seeing the police party and sped away from the location. On seeing the culprit slipping from the location, police chased his car.

Read more

Fujitsu Laboratories today announced that it has developed deep learning technology that can analyze time-series data with a high degree of accuracy. Demonstrating promise for Internet-of-Things applications, time-series data can also be subject to severe volatility, making it difficult for people to discern patterns in the data. Deep learning technology, which is attracting attention as a breakthrough in the advance of artificial intelligence, has achieved extremely high recognition accuracy with images and speech, but the types of data to which it can be applied is still limited. In particular, it has been difficult to accurately and automatically classify volatile time-series data–such as that taken from IoT devices–of which people have difficulty discerning patterns.

Now Fujitsu Laboratories has developed an approach to that uses advanced to extract geometric features from time-series data, enabling highly accurate classification of volatile time-series. In benchmark tests held at UC Irvine Machine Learning Repository that classified time-series data captured from gyroscopes in wearable devices, the new technology was found to achieve roughly 85% accuracy, about a 25% improvement over existing technology. This technology will be used in Fujitsu’s Human Centric AI Zinrai artificial intelligence technology. Details of this technology will be presented at the Fujitsu North America Technology Forum (NAFT 2016), which will be held on Tuesday, February 16, in Santa Clara, California.

Background

In recent years, in the field of , which is a central technology in artificial intelligence, deep learning technology has been attracting attention as a way to automatically extract feature values needed to interpret and assess phenomena without rules being taught manually. Especially in the IoT era, massive volumes of time-series data are being accumulated from devices. By applying deep learning to this data and classifying it with a high degree of accuracy, further analyses can be performed, holding the prospect that it will lead to the creation of new value and the opening of new business areas.

Read more

Better ditch the watch and shirt.

Wearables invite Cyber Security Risks in the office.


Smart wearable technology has a future-is-now feel to it. Unfortunately, it also has a your-data-is-vulnerable feel as well. Here’s how smart wearables are putting your company’s cyber security at risk.

Read more

One thing that will remain with tech for many years is jobs in cyber security — even with the layer of security that Quantum technology brings in the next 10 years; there is always a migration and retirement state that can (depending on the business and systems involved) could go on for years after Quantum platforms and networks are installed.


Then in December, aided and abetted by a Republican-controlled Congress, he eradicated those minor restrictions and replaced mindless austerity with clueless profligacy.

It proposes lifting the limits entirely from 2018. “It adheres to last year’s bipartisan budget agreement, it drives down the deficit, and includes smart savigs on health care, immigration and tax reform”.

Even with the increased taxes, Obama’s budget projects sharply higher deficits in coming years, totaling $9.8 trillion over the next decade.

Read more

What would it mean if you lost all of your personal documents, such as your family photos, research or business records? How much would you pay to get them back? There’s a burgeoning form of cybercrime that hinges on the answers to these questions.

You have probably heard of viruses and malware. These dangerous pieces of software can make their way into your computer and wreak havoc. Malware authors are intent on stealing your data and disrupting the proper functioning of your digital devices.

Then there is ransomware. This is crafted by cyber-criminals for extorting data from innocent users, and is rapidly becoming a threat to individuals, small business and corporate users alike.

Read more