Wednesday, February 18, 2015

I wonder what they would make if they actually spent money on security?
Sony sees 25-fold profit jump by 2018; could exit TVs, phones

Japan Sees 25 billion Cyberattacks in 2014: Govt Agency
The National Institute of Information and Communications Technology (NICT), which has a network of a quarter of a million sensors, said there were 25.66 billion attempts to compromise systems, according to a report by Kyodo News.
A Russian report released Monday said cyberattacks since 2013 have cost banks around the globe up to $1 billion.

Is Barbie about to become another “Thing” that captures information about your child in order to sell ads? (Article 2)
Hello Barbie Gets Her Smarts
Mattel is developing a new Barbie that can actually interact with her owners in a meaningful way. Hello Barbie, as the model is tentatively known, can converse with her owners using ToyTalk’s PullString technology, which is similar to the technology used by Siri and Cortana.
ToyTalk CEO Oren Jacob revealed, “The most requested thing that kids have wanted to do with Barbie, and Mattel’s done unbelievable amounts of research over the course of decades, is to talk to Barbie. That’s the number one request over all demographics, over all geographies, of all time. For the first time we’re doing that for real now.
Hello Barbie will recognize speech patterns and respond accordingly, even remembering past conversations to suggest she’s getting to know her owner. According to Fast Company, Hello Barbie will be connected to the Internet and constantly updating to add new topics of conversation and pop culture references.
A prototype of Hello Barbie was on show at the North American International Toy Fair this past weekend, which is where ChipChick shot the video embedded above. Hello Barbie could be released in time for the 2015 holidays, with Mattel said to be chasing an aggressive timetable.

(Related) Will you allow Barbie to connect to your WiFi?
IoT Requires Changes From Identity and Access Management Space: Gartner
In November, Gartner predicted 4.9 billion devices would be Internet-connected in 2015. Securing those devices however remains a challenge that consumers, IT departments and vendors will have to face. This is particularly true when it comes to the subject of authentication, and according to Gartner analyst Earl Perkins, current IAM solutions cannot meet the scale or complexity that IoT demands of the enterprise.
"IAM leaders must reconsider how traditional approaches to cybersecurity and IAM work in a world where devices and services are so abundant, in so many different forms and positioned at so many different points within the IT ecosystem," said Perkins, research vice president at Gartner, in a statement.
Next month, Gartner plans to dive into this and other issues at the Gartner Identity & Access Management Summit in London. According to Gartner, the explosion of the Internet of Things means that IAM solutions must have a way of defining and managing not only the identities of people, but also "entities" within a single framework. IoT is not only about the introduction of different forms of networked devices into enterprises, it is a transformational approach to viewing and implementing processing, analytics, storage and communications, according to Gartner.

You vision of the world is the basis of your strategy. (and this from a Blackberry fan?)
Obama: We Created The Internet And EU Companies 'Can't Compete With Ours'
Following an interview with Re/code late last week, president Obama has managed to upset officials in Europe for a couple of rather blunt comments regarding America's success with the Internet. For starters, Obama claims that the EU's actions towards regulating the Internet is 'commercially-driven', and is the result of their companies being unable to compete with 'ours'.

(Related) ...but the “Official Position” is that North Korea pulled off the Sony hack. Imagine what China or Russia could have done!
Obama Ranks North Korea Cyber Capabilities As Not So Good
Iran is "good," China and Russia are "very good," but North Korea's cyberattack capabilities are actually not that great, according to an impromptu ranking by US President Barack Obama.
In an interview with online site "re/code" published Tuesday, Obama used North Korea's relative lack of electronic prowess to underscore how dangerous even less skilled cyber attackers can be.
Obama slapped sanctions on North Korea last month following the hacking of Hollywood studio Sony Pictures' computer network.

This is important to my Data Analysis students.
Big data vendors to forge a common Hadoop base platform
A number of the largest big data vendors, including IBM, Hortonworks and Pivotal, have banded together to specify a unified base platform for the open source Hadoop data processing software.
The Open Data Platform will identify the specific versions of Apache Hadoop and its supporting software that will run together as a seamless whole, potentially reducing the work required on the part of enterprises to build and maintain complex Hadoop-based data analysis systems.
… In addition to IBM, Hortonworks and Pivotal, other companies that have signed on to the initiative include General Electric, Infosys, SAS, Altiscale, Capgemini, CenturyLink, EMC, Splunk, Verizon Enterprise Solutions, Teradata, and VMware.

For my Business Intelligence students. What we should be telling our “customers” about Tweeting
A Quick Tip on Publishing Twitter Replies
One of the most frequently asked questions in my course on Blogs & Social Media for Teachers is along the lines of, "how do I get more people involved in a conversation?" A simple way to get more people to see your "@" replies in a conversation is to put a period in front of the "@." In the video embedded below I explain and demonstrate how this works.

Better research means better students?
How to Search for Publicly Shared Google Docs, Slides, and Spreadsheets
Searching by file type and searching by domains is a great way for students to refine their Google searches. Searching for and within a DOC, a PPT, or XLS file can lead students to resources that they might not otherwise have seen. But increasingly a lot of us are creating our documents, slides, and spreadsheets in Google Drive. Many of us are then publishing those files for anyone in the world to see. Thanks to the Google for Education Google+ page, today I was reminded that you can perform a Google search to look for publicly shared Docs, Slides, and Spreadsheets. The screenshots below illustrate how to do this.
To search for a public Google Document: enter after your search term.
To search for a public Google Slides presentation: enter after your search term.
To search for a public Google Drive Spreadsheet: enter after your search term.

No comments: