Saturday, September 22, 2018

There are many ways to learn what should be done. Why is it still so common to find managers who don’t bother to check what they have done?
Eileen Yu reports:
Investigation into Singapore’s most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations.
The findings were revealed on the first day of hearings led by the Committee of Inquiry (COI), a team set up to probe a July 2018 security breach that compromised personal data of 1.5 million SingHealth patients. The incident also compromised outpatient medical data of 160,000 patients that visited the healthcare provider’s facilities, which included four public hospitals, nine polyclinics, and 42 clinical specialties.
Read more on ZDNet.




Is it really possible to ‘opt out’ of face scanning technology? Every face is scanned. They may ask for alternative identification, but if it does not agree with what the face scanner tells them, what will they do?
Ben Mutzabaugh reports:
Delta Air Lines is set to introduce what it’s calling the “first biometric terminal in the U.S.”
The carrier says it’s equipping the Atlanta airport’s international terminal (Terminal F) with face-scanning technology that will allow international passengers to use facial recognition technology “from curb to gate.” It also will be available to passengers flying nonstop from Atlanta on Delta partner airlines Aeromexico, Air France-KLM or Virgin Atlantic.
Delta says the biometric updates will fully roll out to the terminal “later this year,” though it adds the process will be “optional.”
If customers do not want to participate, they just proceed normally, as they’ve always done, through the airport,” Delta says in a statement.
Read more on USA Today.




Useful in every course I teach.
One of the most overused expressions thrown around by wannabe “Wall Street Rambos” is business is war. But sometimes war tactics really can help in business.
Among these tactics is CARVER, a system for assessing and ranking threats and opportunities.
… It can be both offensive and defensive, meaning it can be used for identifying your competitors’ weaknesses and for internal auditing. In addition, many security experts consider it the definitive assessment tool for protecting critical assets. In fact, the U.S. Department of Homeland Security has recommended it as a preferred assessment methodology.




Will this stir a debate? Can we assume a free, uncensored Internet will be more useful than a carefully censored one?
Ex-Google CEO: Internet will split in two, with China controlling half
“I think the most likely scenario now is not a splintering, but rather a bifurcation into a Chinese-led internet and a non-Chinese internet led by America,” Schmidt told tech-heads at a private event in San Francisco on Wednesday, organized by investment firm Village Global VC.
Schmidt warned that a Chinese-controlled internet would be subject to the Chinese government's censorship.


(Related) Just to stir things up a bit.
Marc Randazza Is Fighting To Keep Nazis And Trolls On Twitter In The New Speech Wars. Here’s Why.




If companies are forced to provide backdoors, there will be a market for simple to use encryption software that can be controlled by individuals. Like PGP. Since I can write the code myself, what will “the five eyes” have to do to make me write a backdoor?
Five Eyes Want Access to Data from Tech Companies
The “Five Eyes”, the consortium of intelligence agencies from the predominant English-speaking countries, has put the tech industry on notice. The agencies are suggesting that major tech companies such as Google voluntarily build encryption-circumventing measures into their products to provide them with unlimited access to data, or they may eventually be forced to by law.




My students will design the software architecture for this.
Is Amazon Preparing to Disrupt Fast Food and Fast Casual?
… in a market where success is driven at least partly by speed, there's room for disruption. And that disruption may not come from the restaurant or convenience store sectors. Instead, it could come from Amazon.
The online retail leader has dipped a toe in these waters by launching a handful of cashierless convenience stores. Some of its early Amazon Go stores offer selections not unlike those of a 7-Eleven (albeit fresher) with prepared meals, sandwiches, and salads alongside a limited selection of groceries and snacks.
However, two Seattle-area Amazon Go locations carry only ready-made meals and snacks. That makes them less an upscale version of a convenience store, and more of a variation on the fast food/fast casual dining model – but with a self-serve, no-wait twist that offers an unprecedented level of ease for consumers.


(Related) Everything will change as new technology integrates. This is an inadequate model. Can we (my students and I) develop a better one?
How can the IoT transform the sports business?
The business of sports is continuously evolving – from fan expectations and venue operations to player insights and analytics. Having instant access to all the relevant information is crucial to winning, and the Internet of Things (IoT) is helping create a competitive advantage for owners, leagues and teams. Here are four ways that IoT is transforming sports via smart venue technology.


(Related) We’re putting a lot of faith in Jeff Bezos.
Amazon Is Invading Your Home With Micro-Convenience
The company’s new line of voice-automated products, including a wall clock and a microwave, could help it amass an enormous database of consumer behavior.




Something for my students to play with. And I’ll work it backwards to ensure I’m teaching the right (most marketable) skills.


No comments: