I
wonder what they would make if they actually spent money on security?
Sony
sees 25-fold profit jump by 2018; could exit TVs, phones
Perspective
Japan
Sees 25 billion Cyberattacks in 2014: Govt Agency
The
National Institute of Information and Communications Technology
(NICT), which has a network of a quarter of a million sensors, said
there were 25.66 billion attempts to compromise systems, according to
a report by Kyodo News.
…
A
Russian report released
Monday said cyberattacks since 2013 have cost banks around the
globe up to $1 billion.
Is
Barbie about to become another “Thing” that captures information
about your child in order to sell ads? (Article 2)
Hello
Barbie Gets Her Smarts
Mattel
is developing a new Barbie that can actually interact with her owners
in a meaningful way. Hello Barbie, as the model is tentatively
known, can converse with her owners using ToyTalk’s PullString
technology, which is similar
to the technology used by Siri
and Cortana.
ToyTalk
CEO Oren Jacob revealed, “The most requested thing that kids
have wanted to do with Barbie,
and Mattel’s done unbelievable amounts of research over the course
of decades, is to talk to Barbie. That’s the number one request
over all demographics, over all geographies, of all time. For the
first time we’re doing that for real now.”
Hello
Barbie will recognize speech patterns and respond accordingly, even
remembering past conversations to suggest she’s getting to know her
owner. According to Fast
Company, Hello Barbie will be connected to the Internet and
constantly updating to add new topics of conversation and pop culture
references.
A
prototype of Hello Barbie was on show at the North American
International Toy Fair this past weekend, which is where ChipChick
shot the video embedded above. Hello Barbie could be released in
time for the 2015 holidays, with Mattel said to be chasing an
aggressive timetable.
(Related)
Will you allow Barbie to connect to your WiFi?
IoT
Requires Changes From Identity and Access Management Space: Gartner
In
November, Gartner predicted 4.9 billion devices would be
Internet-connected in 2015. Securing
those devices however remains a challenge that consumers, IT
departments and vendors will have to face. This is particularly true
when it comes to the subject of authentication, and according to
Gartner analyst Earl Perkins, current IAM solutions cannot meet the
scale or complexity that IoT demands of the enterprise.
"IAM
leaders must reconsider how traditional approaches to cybersecurity
and IAM work in a world
where devices and services are so abundant, in so many different
forms and positioned at so many different points within the IT
ecosystem," said Perkins, research vice president at Gartner, in
a statement.
Next
month, Gartner plans to dive into this and other issues at the
Gartner Identity & Access Management Summit in London.
According to Gartner, the explosion of the Internet of Things
means that IAM
solutions must have a way of defining and managing not only the
identities of people, but also "entities" within a single
framework.
IoT is not only about the introduction of different forms of
networked devices into enterprises, it is a transformational approach
to viewing and implementing processing, analytics, storage and
communications, according to Gartner.
You
vision of the world is the basis of your strategy. (and this from a
Blackberry fan?)
Obama:
We Created The Internet And EU Companies 'Can't Compete With Ours'
Following
an interview with Re/code late last week, president Obama has managed
to upset officials in Europe for a couple of rather blunt comments
regarding America's success with the Internet. For starters, Obama
claims that the EU's actions towards regulating the Internet is
'commercially-driven', and is the result of their companies being
unable to compete with 'ours'.
(Related)
...but the “Official Position” is that North Korea pulled off
the Sony hack. Imagine what China or Russia could have done!
Obama
Ranks North Korea Cyber Capabilities As Not So Good
Iran
is "good," China and Russia are "very good," but
North Korea's cyberattack capabilities are actually not that great,
according to an impromptu ranking by US President Barack Obama.
In
an interview with online site "re/code"
published Tuesday, Obama used North Korea's relative lack of
electronic prowess to underscore how dangerous even less skilled
cyber attackers can be.
…
Obama
slapped sanctions
on North Korea last month following the hacking of Hollywood
studio Sony Pictures' computer network.
This
is important to my Data Analysis students.
Big
data vendors to forge a common Hadoop base platform
A
number of the largest big data vendors, including IBM, Hortonworks
and Pivotal, have banded together to specify a unified base platform
for the open source Hadoop data processing software.
The
Open Data
Platform will identify the specific versions of Apache Hadoop and
its supporting software that will run together as a seamless whole,
potentially reducing the work required on the part of enterprises to
build and maintain complex Hadoop-based data analysis systems.
…
In addition to IBM, Hortonworks and Pivotal, other companies that
have signed on to the initiative include General Electric, Infosys,
SAS, Altiscale, Capgemini, CenturyLink, EMC, Splunk, Verizon
Enterprise Solutions, Teradata, and VMware.
For
my Business Intelligence students. What we should be telling our
“customers” about Tweeting
A
Quick Tip on Publishing Twitter Replies
One
of the most frequently asked questions in my course on Blogs
& Social Media for Teachers is along the lines of, "how
do I get more people involved in a conversation?" A simple way
to get more people to see your "@" replies in a
conversation is to put a period in front of the "@." In
the video embedded below I explain and demonstrate how this works.
Better
research means better students?
How
to Search for Publicly Shared Google Docs, Slides, and Spreadsheets
Searching
by file type and searching by domains is a great way for students to
refine their Google searches. Searching for and within a DOC, a PPT,
or XLS file can lead students to resources that they might not
otherwise have seen. But increasingly a lot of us are creating our
documents, slides, and spreadsheets in Google Drive. Many of us are
then publishing those files for anyone in the world to see. Thanks to
the Google
for Education Google+ page, today I was reminded that you can
perform a Google search to look for publicly shared Docs, Slides, and
Spreadsheets. The screenshots below illustrate how to do this.
To search for a public Google Document: enter
site:docs.google.com after your search term.
To search for a public Google Slides presentation: enter
site:docs.google.com/presentation/ after your search term.
To search for a public Google Drive Spreadsheet: enter
site:docs.google.com/spreadsheets/ after your search term.
No comments:
Post a Comment