Always Providing You With Ongoing Information

Archive for the ‘Cloud Computing’ Category

Some Humor When The Haters Push Your Buttons

Emerging Trends In Technology

 

Emerging Technologies Bio Sensors

Next-Generation Batteries

The newest developments show that using sodium, zinc, and aluminum constructed batteries make the mini-grid a solid possibility for providing 24-7, reliable and clean energy to entire small rural towns.

2-D Materials

New materials such as Graphene are emerging and are going to change the world forever. Think about the Bronze Age…the Iron Age—these newest materials each contain a single layer of atoms and are two-dimensional. The potential positive impacts of evolving materials are limitless and bound only to the reach of scientists and how far they choose to push.

Autonomous Transportation

Self-driving cars are already in the here-and-now, but just how soon will  be helping to improve the lives of handicapped and elderly will change the quality of life for millions.

Personal AI

From your own personal robot assistant that can anticipate your every need and perform tasks at your whim, to entire AI environments—this could be affordable to everyone with the emerging availability of Open AI ecosystems.

Afrotech 17

Snapshot_139

1000 Black techies, thought leaders, and entrepreneurs in 1 room for 2 days on the water in San Francisco? AfroTech, the largest black tech conference in Silicon Valley!

With two full days of the latest technologies and hottest startups, you will have a chance to learn from some of the best, and connect with fellow innovators.

CLICK HERE

 

 

FBI Alerts Parents On Toys With Cloud Backed Features

capri10_001

The FBI say, many toys sporting cloud-backed features such as speech recognition or online content hosting “could put the privacy and safety of children at risk due to the large amount of personal information that may be unwittingly disclosed.

“Security safeguards for these toys can be overlooked in the rush to market them and to make them easy to use,” the FBI warns. “Consumers should perform online research of these products for any known issues that have been identified by security researchers or in consumer reports.”

This comes after a number of kids’ toys were found to be indirectly spying on kids by collecting and storing data, including audio conversations and personal information, without parents’ knowledge.

My Friend Cayla and i-Que robot

Germany’s Federal Network Agency, or Bundesnetzagentur, has banned Genesis Toys’ Cayla doll as an illegal surveillance device.

More Reading 

Hackers @IOT Def Con Event Focus On Connected Devices

business suit2_001

A new hacking event called DEF CON aims to drive improvement in so-called Internet of Things (IoT) devices, generally defined as traditionally analog devices that are now connected to the internet, by hacking them to discover security vulnerabilities. One of their goals is to solve the massive privacy and security issues that are introduced by connected devices. IoT Village runs August 6-9, 2015 at DEF CON 23, co-located between Paris and Bally’s casinos in Las Vegas. The village will be comprised of hacking contests, including capture the flag, zero-day discovery and sudden death. Organizers will also host multiple talk tracks, as well as workshops and other tutorials.The village organizers are a group of security researchers and consultants who also ran the first-ever router hacking contest at DEF CON, which delivered 15 new, previously unknown, critical vulnerabilities to the research community. The researchers plan to expand the scope to include not just routers, but all connected devices, ranging from thermostats to TVs, printers to video surveillance equipment, implanted medical devices to drug refrigeration equipment, and everything in between.

ISE was founded in 2005 out of the PhD program at the Johns Hopkins’ Information Security Institute, is a security consulting firm comprised of hackers, computer scientists, reverse engineers, and cryptographers who help companies defend against sophisticated adversaries by utilizing a perspective typically perpetrated by the adversary. ISE is widely recognized for being the first company to hack the iPhone, and more recently for the discovery of the vulnerability epidemic in wireless routers.

DEF CON started in 1993 and is one of the largest and oldest annual hacker conferences. The conference has a wide range of activities, including speeches, capture the flag, contests, lock picking, and official music events. Unique to DEF CON, are their research topics ranging from cryptography to lockpicking. There are currently only seven Villages, including the newest venue, IoT Village.

World’s Largest Electronics Show To Debut January 6-9 2015

Snapshothat8new5_001

The 2015 International CES, one of the world’s biggest electronics fairs will be held in Las Vegas January 6-9. The ‘Internet of Things’ is the hottest topic in tech right now. On view will be the newest and biggest television displays featuring “ultra high definition” that is catching on with consumers.So-called 4K television sets are coming down in price and becoming mainstream, and some reports suggest the show may feature newer, even more realistic “8K” displays.

More here

business suit1_001

China expected have a new homegrown operating system by October to take on imported rivals such as Microsoft Corp, Google Inc and Apple Inc, Xinhua news agency said on Sunday.

 

Computer technology became an area of tension between China and the United States after a number of run-ins over cyber security. China is now looking to help its domestic industry catch up with imported systems such as Microsoft’s Windows and Google’s mobile operating system Android.

The operating system would first appear on desktop devices and later on to smartphone and other mobile devices, Xinhua said, citing Ni Guangnan who heads an official OS development alliance established in March.

true

Ni’s comments were originally reported by the People’s Post and Telecommunications News, an official trade paper run by the Ministry of Industry and Information Technology (MIIT).

“We hope to launch a Chinese-made desktop operating system by October supporting app stores,” Ni told the trade paper. Some Chinese OS already existed, but there was a large gap between China’s technology and that of developed countries, he added.

He said he hoped domestically built software would be able to replace desktop operating systems within one to two years and mobile operating systems within three to five years.

In May, China banned government use of Windows 8, Microsoft’s latest operating system, a blow to the U.S. technology firm’s business which raised fears China was moving to protect domestic firms. Microsoft is also under investigation for anti-trust violations.

In March last year, China said that Google had too much control over China’s smartphone industry via its Android mobile operating system and has discriminated against some local firms.

Mutual suspicions between China and the United States over hacking have escalated over the past year following revelations by Edward Snowden that U.S. intelligence planted “backdoor” surveillance tools on U.S.-made hardware.

The U.S. Justice Department, meanwhile, indicted five Chinese military officers in May on counts of extensive industrial espionage.

Ni said the ban on Windows 8 was a big opportunity for the Chinese sector to push forward its own systems, but that the industry needed further development and investment

Companies Are Displaying Their Data Through Art

Snapshotupdo_001

As companies hired Data Scientists, large tech companies such as Microsoft and Google are bringing in the data artists from museums and galleries and putting them to work with developing new visualizations that can help explain their message, promote company awareness, and help out with the marketing efforts.

See Video

See Video

Tech Summer Camps Booming In Popularity

Snapshot_142

 

Tech summer camps are growing in popularity particularly around the Pacific Northwest.

iD Tech Camp is holding several summer tech camps at the University of Washington.Video games are very popular. At iD Tech Camps, kids ages 7-to-17 are learning how to code, program, and develop video games and apps. They also get hands-on training in Photoshop, web design and popular robotics classes.

Camp counselors are trying to get young people trained in Science, Technology, Engineering and Math (STEM) programs. iD Tech Camp points says more than one million jobs in STEM fields are expected to go unfilled by 2020. Yet, 9-out-of-10 high schools don’t offer computer science classes. Computer Science is a field where the females are  outnumbered by males. Still at the tech camps there are more boys than girls.

Major tech companies like Twitter, Facebook, Google, Yahoo, LinkedIn released their workforce diversity figures this week after much pressure. According to USA TODAY, males outnumbered female staff by an average of 70% to 30%. The majority of workers were white followed by Asian.

 

Twitter’s Figures & Stats

 

diversity

Twitter’s diversity figures, by ethnicity. Graphic via Twitter.

More Stats Here

Google’s Stats

Facebook

Pinterest

Yahoo

 

Healthcare Technology & Privacy Issues

Snapshotnavy7_001

Fitness devices , health monitoring applications and advancements in social media and mobile device technology provide new opportunities for health care providers, but also raise some pertinent privacy issues. According to a report from the California HealthCare Foundation by health economist and consultant Jane Sarasohn-Kahn, proliferation of extremely large databases of health information challenge regulators’ and society’s ability to ensure individuals’ data rights and privacy. For example, while personal health information held by health care providers and insurers is protected under the Health Insurance Portability and Accountability Act (HIPAA), many other sources of consumer data are not covered and can be disclosed to third parties. The report notes user-generated data that could be used in health profiling are held by gyms, Websites, banks, credit card companies, cosmetic medicine groups, fitness clubs, home testing labs, massage therapists, nutrition counselors, alternative medicine practitioners, disease advocacy groups, and marketers of non-prescription health products and foods. – The report warns data shared on a social networking site can become a “digital tattoo” for a consumer, which is  impossible to remove. 

Tools are being developed such as the Personal Data Locker for consumers to control their user-generated data. Former chief medical officer of Practice Fusion, Dr. Robert Rowley, is developing FlowHealth, a communication platform for care teams and patients, facilitating transitions of care, and aggregating patient-centered data from the sources where it is found. –

A report earlier this year from Accenture revealed that the vast majority of U.S. patients want to control their health data; however,(55 percent) believe they do not have very much—or any—control over their medical information. – 

Robotics & Healthcare

Snapshot_029

 

Last year, scientists at the University of Maryland School of Medicine in Baltimore developed a creepy-crawly device inspired by the  maggot that zaps tumours with electricity and sucks up the debris.

The finger-like prototype has multiple joints allowing it to move in several directions. The project was funded by the  National Institute of Biomedical Imaging and Bioengineering.

Scientists in Singapore created a tiny robot which can access a person’s stomach via the throat to cut up tumors using miniature claws.One robotic arm holds the tumour while the other slices away.

Engineers across the globe are racing to design the lightest, most autonomous robotic exoskeleton, not only to restore movement to disabled people but also to boost the strength and endurance of those who carry heavy cargo or walk very far, like soldiers or rescue workers.

Strapped to the lower body, such devices are powered by motors that take some of the strain off the muscles — similar to the brain-controlled suit that helped a paraplegic kick a football at the World Cup opening ceremony.

Several prototypes have been developed, but many battle to meet the key challenge of compact, long-lasting, carry-on power supply.

The Internet Of Things: A New & Upcoming Trend

According to industry research firm IDC, the IoT market is expected to hit $7.1 trillion by 2020,” said John Maddison, vice president of marketing at Fortinet.

Completed in June 2014, the survey asked 1,801 tech-savvy homeowners questions relating to the Internet of Things as it pertains to the connected home. These were the top findings:

The Connected Home is a reality – A majority (61 percent) of all respondents believe that the connected home (a home in which household appliances and home electronics are seamlessly connected to the Internet) is “extremely likely” to become a reality in the next five years. China led the world in this category with more than 84 percent affirming support.

  • In the U.S., 61 percent said that the connected home is extremely likely to happen in the next five years.

Homeowners are concerned about data breaches – A majority of all respondents voiced their concern that a connected appliance could result in a data breach or exposure of sensitive, personal information. Globally, 69 percent said that they were either “extremely concerned” or “somewhat concerned” about this issue.

  • Sixty-eight percent of U.S. respondents said that they were “extremely concerned” or “somewhat concerned.”

Privacy and trust are concerns – When asked about the privacy of collected data, a majority of global respondents stated, “privacy is important to me, and I do not trust how this type of data may be used.” India led the world with this response at 63 percent.

  • Fifty-seven percent in the U.S. agreed with this statement.
  • Data privacy is an extremely sensitive issue – Respondents were also asked how they would feel if a connected home device was secretly or anonymously collecting information about them and sharing it with others. Most (62 percent) answered “completely violated and extremely angry to the point where I would take action.” The strongest responses came from South Africa, Malaysia and the United States.

Silicon Valley Startups Flocking To Dublin

typing3_001

Silicon Valley companies are flocking to Dublin, as their gateway to European and global success.  Business writer Heather Somerville on the website http://www.contracostatimes.com reports; the start-ups don’t qualify for the tax breaks available to multi-nationals simply because they only apply to profits.

Start-ups are following Apple, Intel, Google and Facebook to Europe because it makes good business sense. Somerville reports that these startups are setting up their first overseas offices in the hope that the booming tech city of Dublin will become their launchpad to global success. San Francisco data software start-up New Relic have just made the commitment to Ireland. Chief marketing officer Patrick Moran says “It feels a little bit like a mini-San Francisco. All of our startup friends are there.”

New Relic opened a Dublin office in February and plans to hire about 50 employees at their first office outside the US.Chris Cook, president and chief operating officer at New Relic, added: “Dublin is the launching point for our European strategy and an essential part of our global expansion plans.”

Fellow San Francisco-based companies like Airbnb, cloud software company Zendesk and file storage and sharing startup Dropbox are also new to Dublin.

Yelp  and Survey Money have announced plans to open a 100-person Dublin office.

Mark Harris is chief financial officer of Malwarebytes, an anti-virus software company in San Jose is expected to  open in Ireland next year.

More Here

 

The Word Through The Grapevine

business suit3_001

The word in the grapevine- Google product strategist Scott Jenson  stormed out of a conference in San Francisco Tuesday, 30 minutes before he was scheduled to deliver a keynote address—a week after inviting himself onto the program via Twitter.

“He told a woman working at the registration desk of the IoT Expo. “I am Google, I do not speak to small groups.” He then walked out. The IoT Expo was an event devoted to the concept of the Internet of Things. Analysts believe that the Internet of Things will grow to become a multi-trillion-dollar market in the future. Google recently entered the Internet of Things market in grand style by acquiring Nest, the maker of networked thermostats and smoke alarms, for $3.2 billion in January.

 

Trends & Revolutionizing Healthcare

Snapshotpink3_001

Smartphones-Smartphones will continue to improve data access for the medical staff, which will improve healthcare. Today, information can be obtained anytime and anywhere, resulting in quicker medical decisions. New medical apps are transforming the smartphone into a medical device with the ability to send relevant patient data to the electronic medical record (EMR).

Wi-Fi
At many hospitals the wireless LAN (WLAN) now connects more devices than the wired LAN. It started with workstations on wheels (WoWs) and now encompasses medical devices, phones, video units, realtime locating systems (RTLS), and guest Internet access. Wi-Fi availability is the norm as we geer towards a digital space with mobile adoption.

Bring Your Own Device (BYOD)
Smartphones + hospital Wi-Fi = the need for a BYOD policy and mobile device management. BYOD has greatly influenced how technology solutions are evaluated and implemented by hospital IT. The consumer market is now driving corporate adoption. The days of the rigid corporate standard for hardware are gone, as a result of  cloud infrastructure that is capable of supporting a range of devices dictated by the consumer. Thanks to BYOD, the medical staff can choose a device that they are familiar with, reducing costs and training requirements.

Government Mandates
Mandates like HITECH, HIPAA, and ICD 10 have forced healthcare institutions to invest heavily in IT infrastructure, talent, and application systems. These regulatory changes are moving us towards transparency and integration. The goal is to drive the widespread adoption and meaningful use of electronic health records (EHRs) to improve heathcare quality, safety, and efficiency; and reduce health disparities and costs.

Voice over IP (VoIP)
The emergence of VOIP has allowed healthcare institutions to leverage a single IT infrastructure backbone for both data and voice traffic. More importantly, it has created a unified communication flexibility that started with mobility and has now evolved into applications. Anyone can be contacted anywhere at any time from any device. This means that the medical staffs are available 24×7.

Social
Social media, such as Twitter and Facebook, provides a platform that is transforming healthcare. Hospitals can now reach out to staff, patients, younger audiences, and the general public in new ways. Not only does it improve patient engagement, but it provides a means to manage population health.

Mobile Health (mHealth)
With the increasing focus on decreasing healthcare costs, mHealth provides a spectrum of ways to leverage mobility to improve clinical work flows and outcomes. These range from video remote interpretation, to telemedicine and remote care use cases. The next step will be adoption of wearable technologies.

We are in a mobile world and with mHealth, medical professionals have the ability to make clinical decisions based on telemedicine technology and wearables. mHealth allows access to medical care from anywhere anytime. Rural areas can be provided with the same quality of care as the metropolitan population. With wearable devices and sensors individuals will be able to monitor their health the same way we monitor our cars, to stay on schedule with regular maintenance. This is a big step that offers individuals the benefits of personal big data.

Big Data
Data is everywhere and the challenge is to use that data to make meaningful decisions and provide better care. Imagine using wearables to track fitness, vitals, sleep patterns, etc. Personal big data helps individuals understand their health to make lifestyle improvements and live healthier lives.

 

Firefox Has A Big Update

Operation Clandestine Fox

 

Snapshotgreen dress7_001

Over the weekend, Microsoft admitted to a huge vulnerability in Internet Explorer that allows hackers to set up malicious websites in order to gain complete access to visitors’ PC, provided they visited the page with a IE (version 6 and up). There on, hackers can install apps, break into other accounts and generally use the computer as their own.

The flaw has been dubbed  “Operation Clandestine Fox” by security firm FireEye — the best thing to do at this time is to stop using Internet Explorer until Microsoft patches it. Other browsers, such as Google Chrome and Mozilla Firefox, don’t have the problem, and you can export your bookmarks and other settings to those browsers very easily.

 Homeland Security issues warning

Europe’s Online Games For The Unemployed

 

Snapshotpink3_001

— Amsterdam wants to create an online game to get unemployed young people engaged in finding jobs across Europe. The cities are among 21 finalists vying for millions of euros in a new government-innovation contest was devised by former New York Mayor Michael Bloomberg, his foundation announced Wednesday. The finalists come from 11 European countries and include sprawling capitals and modest-sized cities, their climates and cultures as different as those of Stockholm, Sweden, and Barcelona, Spain.

Asked for projects that could solve major social or economic problems or make government more effective, the cities “stepped up with bold and creative ideas,” Bloomberg said in a statement.

After the finalists hone their proposals, winners of a 5 million euro — nearly $7 million — grand prize and four 1 million euro awards will be announced in the fall.

Modeled on a competition that Bloomberg Philanthropies held for U.S. cities last year, the European contest was open to cities of 100,000 or more residents and drew 155 entries.

Several European finalists looked to improve residents’ lives with technology: auditory alerts to help blind people get around Warsaw, Poland; new systems for Londoners to monitor their health; and methods for making energy out of the heat thrown off by Madrid’s underground infrastructure, for example.

Other proposals are more interpersonal. Barcelona aims to make aging less lonely through social networking the old-fashioned way: identifying a team of relatives, friends, social workers and volunteers for each elderly person. Sofia, Bulgaria, suggests dispatching “mobile art units” where local residents could lend a hand to rejuvenating underused public spaces. Kirklees, in England, imagines getting citizens to pool resources ranging from cars to unused space to untapped expertise.

The Welsh city of Cardiff intends to help residents take small steps to be more productive, the Dutch capital of the Hague is proposing to let citizens choose how part of their taxes will be spent, and Stockholm wants to get people producing biochar, an organic, charcoal-like material that can improve soil quality and purify water, among other environmental benefits.

 

Broadcasters Sue Over Infringement of Copyright

Snapshot_139

 Broadcasters  that own U.S. television networks are in a  a legal fight,  against a startup business that uses Internet-based technology to give subscribers the ability to watch programs anywhere they can take portable devices. Broadcasters including ABC, CBS, Fox, NBC and PBS have sued Aereo for copyright infringement, saying Aereo should pay for redistributing the programming the same way cable and satellite systems do.  Aereo Inc., which takes free television signals from the airwaves and sends them over the Internet to paying subscribers in 11 cities. Aereo, backed by billionaire Barry Diller, has plans to more than double that total.

  Aereo has a data center in Brooklyn, NY with thousands of dime-size antennas. When a subscriber wants to watch a show live or record it, the company temporarily assigns him an antenna and transmits the program over the Internet to the subscriber’s laptop, tablet, smartphone or other device.

The antenna is only used by one subscriber at a time, and Aereo says that’s much like the situation at home, where a viewer uses a personal antenna to watch over-the-air broadcasts for free. The broadcasters and their backers argue that Aereo’s competitive advantage lies not in its product, but in avoiding paying for it.

Easter

In Western Christianity, Easter marks the end of Lent, a 40-day period of fasting, repentance, moderation and spiritual discipline in preparation for Easter. Lent begins on Ash Wednesday and ends on Easter Sunday. Eastern Orthodox churches observe Lent or Great Lent, during the 6 weeks or 40 days preceding Palm Sunday with fasting continuing during the Holy Week of Easter. Lent for Eastern Orthodox churches begins on Monday and Ash Wednesday is not observed.

Because of Easter’s pagan origins, and also because of the commercialization of Easter, many Christian churches choose to refer to the holiday as Resurrection Day. In Western Christianity, Easter is always celebrated on the Sunday immediately following the Paschal Full Moon. Beginning in 325 AD with the Council of Nicea), the Western Church decided to established a more standardized system for determining the date of Easter.

In 2013, for example, Easter was celebrated on March 31 by Western churches and May 5 by Orthodox churches. But in 2014, the two celebrations occur on the same date, April 20.  Western churches use the Gregorian calendar, the standard calendar for much of the world, and Orthodox churches use the older, Julian calendar.

That much is straightforward. But actually calculating these dates involves a bewildering array of ecclesiastical moons and paschal full moons, the astronomical equinox, and the fixed equinox— and that’s in addition to the two different calendar systems.

The two churches vary on the definition of the vernal equinox and the full moon. The Eastern Church sets the date of Easter according to the actual, astronomical full moon and the actual equinox as observed along the meridian of Jerusalem, site of the Crucifixion and Resurrection

The Eastern Orthodox Church also applies the formula so that Easter always falls after Passover, since the Crucifixion and Resurrection of Christ took place after he entered Jerusalem to celebrate Passover. In the Western Church, Easter sometime

A meeting was organized by the Council of World Churches (in Aleppo, Syria, March 5–10, 1997) Where a solution was proposed and thought to be favorable to both East and West: both methods of calculating the equinox and the paschal full moon would be replaced with the most advanced astronomically accurate calculations available, using the meridian of Jerusalem as the point of measure. Since that meeting, however, no further progress has been made and the problem remains.

Fasika (Orthodox Easter)
April 15, 2012; May 5, 2013; April 20, 2014; April 12, 2015; May 1, 2016

Fasika is Ethiopian Easter and is celebrated in conjunction with Orthodox Easter celebrations around the world.  Fasika is the most important holiday in the Ethiopian Orthodox calendar and follows a long 55-day fast, where no meat or dairy products are consumed.  Strict followers generally consume one meal of vegetables and lentils during this time.  Church services are attended on the eve before the holiday, where revelers participate in a colorful service lit with candles.  The following day, families and friends celebrate Fasika with special feasts that mark the end of the long fast. Doro wat, a spicy chicken stew, is the most traditional food served in all households. Celebrations continue for the following week, with an unofficial “second Fasika” the following weekend.

Axum has a colorful procession for Palm Sunday (known as Hosanna), the week before Fasika which is well worth a visit.  Like most holidays, the celebration takes place the night before the actually holiday (Saturday night).

Since the beginning of the 20th century, a proposal to change Easter to a fixed holiday rather than a movable one has been widely circulated, and in 1963 the Second Vatican Council agreed, provided a consensus could be reached among Christian churches. The second Sunday in April has been suggested as the most likely date. precedes Passover by weeks

The Easter Bunny

Some believe, rabbits were associated with the Teutonic deity Eostra, the goddess of spring and fertility, for their especially high reproduction rate. Eggs, and especially their hatching, are another symbol of spring with roots in pagan tradition, according to History.com.

Germanic, pagan, spring traditions and Christian resurrection tradition were quickly melded together as Roman Catholicism became the dominant religion in the region around the 15th century, according to Discovery. As a result, the Easter Bunny tradition in America takes its roots in the German settlers of Pennsylvania

According to some sources, the Easter bunny first arrived in America in the 1700s with German immigrants who settled in Pennsylvania and transported their tradition of an egg-laying hare called “Osterhase” or “Oschter Haws.” Their children made nests in which this creature could lay its colored eggs

 

 

Dropbox & Microsoft Office: Project Harmony

corporate office2_001

Users of select Microsoft Office applications will soon be able to work simultaneously on the same documents with Dropbox.

Dropbox unveiled ‘Project Harmony’, a feature which mimicks the collaboration abilities of Google Docs, and brings Dropbox-powered editing and collaboration tools to software applications, starting with three Microsoft Office products.

Project Harmony will allow Microsoft Excel, PowerPoint and Word users to work at the same time on the same documents, converse with the other document editors, and keep copies in sync.

Within Harmony, once Dropbox files sync, the company’s trademark green tick appears within the application (PowerPoint etc) to notify the user a document has been uploaded. 

Google, Apple Wage Fixing Trial Slated For may 27, 2014

Snapshotbluecoat3_001

United States District Judge Lucy Koh has denied the final attempt by Apple, Google, Intel, and Adobe to have the class action lawsuit involving the “Techtopus” hiring collusion scandal tossed out. Each of the defendants in the landmark class-action wage-theft lawsuit — Apple, Adobe, Google, and Intel — had their own team of lawyers in attendance. The three defendants who had already settled — Pixar, Intuit and LucasFilm — also brought their legal team to the hearing. The lawyers representing each firm acted both independently and jointly.Before wrapping up the hearing, Judge Koh asked a handful of questions to the attorneys. The first question,Why did the plaintiffs choose to sue only the seven firms—Apple, Adobe, Google, Intel, Intuit, LucasFilm and Pixar— when internal Google and Apple documents show that the wage-theft cartel included dozens more companies?

 

Hackers Forcing ATMs To Spew Out Cash

typing3_001

 

Just By Texting

There is a calling for businesses and home users to upgrade their Windows XP systems. there is a new technique surfacing in Mexico whereby hackers are able to tap into ATMs by texting.

ATMs are computers that control access to cash, and about 95 percent of them run on versions of Windows XP.  Windows XP is slated end April 8, 2014 and the banking industry is facing a serious risk of cyberattacks aimed at their ATM fleet. Hackers are targeting ATMs with increasingly sophisticated techniques. 

ATM malware in Mexico, allowed hackers at ATMs to spew cash on demand using an external keyboard. That threat was named Backdoor.Ploutus. Some weeks later, it was discovered that a  new variant which showed that the malware had evolved into a modular architecture. The new variant was also localized into the English language, suggesting that the malware author was expanding their franchise to other countries. The new variant was identified as Backdoor.Ploutus.B. The variant of Ploutus  allowed hackers to  send an SMS to the compromised ATM, then walk up and collect the dispensed cash.  This technique is being used in a number of places across the world at this time.

ATM_blog_infographic_fig1.png

Modern ATMs have enhanced security features, such as encrypted hard-drives, which can prevent these types of installation techniques. However, for older ATMs still running on Windows XP, protecting against these types of attacks is more challenging, especially when the ATMs are already deployed in all sorts of remote locations. Another difficulty that needs to be addressed is the physical security of the computer inside the ATMs. While the ATM’s money is locked inside a safe, the computer generally is not. Without adequate physical security for these older ATMs, the attacker has the upper hand.  

Ways to make it difficult for hackers include

  • Upgrading to a supported operating system such as Windows 7 or 8
  • Providing adequate physical protection and considering CCTV monitoring for the ATM
  • Locking down the BIOS to prevent booting from unauthorized media, such as CD ROMs or USB sticks
  • Using full disk encryption to help prevent disk tampering
  • Using a system lock down solution such as Symantec Data Center Security: Server Advanced (previously known as Critical System Protection)

ER Doctors,Clinicians, Google Glass, QR Codes , & BYOD

Snapshotpink3_001

A tech-savvy hospital in Boston developed a custom information-retrieval system for Google Glass, allowing ER Doctors to scan a QR code on the wall of each room to call up information about patients. When a clinician walks into an emergency department room, he or she looks at a bar code (a QR or Quick Response code) placed on the wall. Google Glass quickly recognizes the room and then the ED Dashboard sends information about the patient in that room to the glasses, appearing in the clinician’s field of vision. The clinician can speak with the patient, examine the patient, and perform procedures while seeing problems, vital signs, lab results and other data.

More Here

BYOD medicine

Physicians aren’t waiting for their central IT departments, they’re finding their own ways to get access to the information they need, when they need it.  One of the most visible signs of change is the adoption of the iPad and other mobile devices by physicians. The iPad has become an essential tool for clinicians. Last October, the Department of Veterans Affairs moved to open up its network so that doctors could use their own mobile devices. While other health systems have been slow to officially adopt the iPad and other devices, John Kornak, Director of Telehealth at the University of Maryland Medical Center says, “A BYOD (bring your own device) mentality is starting to take shape among physicians, and more mobile apps are starting to find their way into use.”

There is a strong push from doctors to find mobile apps that make it easier and more seamless for them to connect to health data such as charts and radiology images.

One of the most obvious applications for the high-resolution screen of the latest iPad is displaying medical imagery. By pulling up images from CT scans and MRI scans on their iPads, Hopkins’ Dr. Fishman says surgeons now use the iPad to explain procedures to patients more effectively. “Doctors can look at their cases in real-time. Now clinicians can look at the information generated as it’s created. They can pull down CT slices in 2 seconds. It’s very fast and interactive. They can bring the image to the bedside or in the office.

Ex-Microsoft Employee Arested

corporate office2_001

 

A former Microsoft employee was arrested this week stealing trade secrets after he allegedly leaked early copies of Windows 8 to a French blogger. Alex Kibkalo was employed by Microsoft – first in Russia and then in Lebanon – for seven years. He provided the documents to the blogger in 2012, just prior to the launch of Windows 8. According to a complaint filed on Monday in a Washington district court, Kibkalo received a poor performance rating in 2012 and was asked to resign shortly thereafter. The information in question included Windows 8 RT software updates, which were distributed only to manufacturing partners, as well as the Activation Server software development kit (SDK).

It seems that Kibkalo uploaded the documents to his SkyDrive (now OneDrive) account in August 2012, and provided the French blogger with links to these documents.

Mobile World Congress

 

corporate office2_001

View here

 

 

Facebook Purchases WhatsAPP

 

business suit3_001

 

The world’s largest social networking conglomerate said Wednesday that it is paying $12 billion in Facebook stock and $4 billion in cash for WhatsApp. In addition, the app’s founders and employees — 55 in all — will be granted restricted stock worth $3 billion that will vest over four years after the deal closes. It was mentioned that Facebook  likely prizes WhatsApp for its audience of teenagers and young adults who are increasingly using the service to engage in online conversations outside of Facebook, which has evolved into a more mainstream hangout inhabited by their parents, grandparents and even their bosses at work. Facebook said it is keeping WhatsApp as a separate service, just as it did with Instagram, which it bought for about $715.3 million nearly two years ago.  The app is currently adding a million new users a day

 

 

More Here

WhatsAPP

New Mexico Has The First Bitcoin Vending machine

Snapshot1000_001

 

Albuquerque, New Mexico has the first bitcoin vending machine located in a cigar shop. The vending machine allows people to insert cash  for a  digital stash of the increasingly popular cryptocurrency. A  Bitcoin may soon be in the making. Robocoin, a Las Vegas-based company that installed its first Bitcoin ATM in Vancouver last year, has said it intends to install the first U.S. Bitcoin ATMs later this month. The Robocoin machines allow for both cash-to-Bitcoin and Bitcoin-to-cash transactions. Prospective Bitcoin vending machine operators have been trying to bring the devices to New York and San Francisco, for some time, but they’ve faced regulatory hurdles.

Aside from Bitcoin’s reputation for use in illicit transactions, users of the  new Albuquerque machine should also beware because the price of Bitcoin has been extremely volatile during the past four months. It climbed to all-time highs in January before falling due to a system-wide glitches last week.

Russian Biometric Passports To Begin 2015

Snapshotpink3_001

Russians applying for biometric passports for foreign travel will be fingerprinted beginning in 2015. The fingerprints will be added to a digital record. The  biometric data is to include prints of two fingers of the passport holder’s hands, the order published Wednesday said. Diplomatic missions abroad, which also process passport applications, will have until Jan. 1, 2016 to implement the new rules, depending on how soon they receive the necessary equipment and software.

Russia began a trial run of fingerprinting for biometric passports in Moscow and St. Petersburg last year, and the Federal Migration Service said that the practice would be implemented on a mass scale in 2015. The service currently issues two kinds of passports for foreign travel — the 10-year biometric passport and a simpler and less expensive five-year passport, which does not include biometric data.

Snapshotsnow_001

Funding To Prevent Spying On Spies-Big Brother Is Still Listening

Snapshotwinter7_001

 

Research is being funded to prevent phone company employees or eavesdroppers from seeing whom the U.S. is spying on. The Office of the Director of National Intelligence has paid a minimal of at least five research teams across the country to develop a system for high-volume, encrypted searches of electronic records kept outside the government’s possession. The project is among several ideas that would allow the government to discontinue storing Americans’ phone records, but still search them as needed. U.S. data mining would be protected by secret coding that could conceal identifying details from outsiders and even the owners of the targeted databases. The Justice Department and leading Internet companies agreed to a compromise with the government that would allow the firms to reveal how often they are ordered to turn over information about their customers in national security investigations. The deal with Google Inc., Microsoft Corp., Yahoo Inc., Facebook Inc. and LinkedIn Corp. would provide public information in general terms. Other technology companies were also expected to participate.

New documents leaked by former NSA contactor Edward Snowden suggest that popular mapping, gaming and social networking apps on smartphones can feed the NSA and Britain’s GCHQ eavesdropping agency with personal data, including location information and details such as political affiliation or sexual orientation. The reports, published by The New York Times, the Guardian and ProPublica, said the intelligence agencies get routine access to data generated by apps such as the Angry Birds game franchise or the Google Maps navigation service

U.S.Credit Cards Soon To Have Memory Chips

 

Snapshotwinter10_001

Companies are moving from magnetic strips, seen on nearly all credit cards in the United States to cards with memory chips like those used elsewhere in the world. It seems that the memory chips will not prevent All fraud. One vulnerability is at the point of sale. If the card terminal or register is hacked, thieves could acquire data embedded in the memory chip that is stored when customers pay. In addition, because it will take retailers time to acquire equipment to read the memory chip, cards will include both chip and strip for some time. Security experts say the dual-embedded data will still present a risk. U.S. cards with EMV will not be required to include PINs, which further upsets critics who contend that PINs on credit and debit cards make transactions more secure.

Tag Cloud