There are many ways to learn what should be done.
Why is it still so common to find managers who don’t bother to
check what they have done?
Eileen Yu reports:
Investigation into Singapore’s most severe cybersecurity breach has uncovered several poor security practices, including the use of weak administrative passwords and unpatched workstations.
The findings were revealed on the first day of hearings led by the Committee of Inquiry (COI), a team set up to probe a July 2018 security breach that compromised personal data of 1.5 million SingHealth patients. The incident also compromised outpatient medical data of 160,000 patients that visited the healthcare provider’s facilities, which included four public hospitals, nine polyclinics, and 42 clinical specialties.
Read more on ZDNet.
Is it really possible to ‘opt out’ of face
scanning technology? Every face is scanned. They may ask for
alternative identification, but if it does not agree with what the
face scanner tells them, what will they do?
Ben Mutzabaugh reports:
Delta
Air Lines is set to introduce what it’s calling the “first
biometric terminal in the U.S.”
The
carrier says it’s equipping the Atlanta airport’s international
terminal (Terminal F) with face-scanning technology that will allow
international passengers to use facial recognition technology “from
curb to gate.” It also will be available to passengers
flying nonstop from Atlanta on Delta partner airlines Aeromexico, Air
France-KLM or Virgin Atlantic.
Delta
says the biometric updates will fully roll out to the terminal “later
this year,” though it adds the process will be “optional.”
“If
customers do not want to participate, they just proceed normally, as
they’ve always done, through the airport,” Delta says
in a statement.
Read more on USA
Today.
Useful in every course I teach.
One of the most overused expressions thrown around
by wannabe “Wall Street Rambos” is business is war. But
sometimes war tactics really can help in business.
Among these tactics is CARVER, a system for
assessing and ranking threats and opportunities.
… It can be both offensive and defensive,
meaning it can be used for identifying your competitors’ weaknesses
and for internal auditing. In addition, many security experts
consider it the definitive assessment tool for protecting critical
assets. In fact, the U.S. Department of Homeland Security has
recommended it as a preferred assessment methodology.
Will this stir a debate? Can we assume a free,
uncensored Internet will be more useful than a carefully censored
one?
Ex-Google
CEO: Internet will split in two, with China controlling half
… “I think the most likely scenario now
is not a splintering, but rather a bifurcation into a Chinese-led
internet and a non-Chinese internet led by America,” Schmidt
told tech-heads at a private event in San Francisco on Wednesday,
organized by investment firm Village Global VC.
Schmidt warned that a Chinese-controlled internet
would be subject to the Chinese government's censorship.
(Related) Just to stir things up a bit.
Marc
Randazza Is Fighting To Keep Nazis And Trolls On Twitter In The New
Speech Wars. Here’s Why.
If companies are forced to provide backdoors,
there will be a market for simple to use encryption software that can
be controlled by individuals. Like PGP. Since I can write the code
myself, what will “the five eyes” have to do to make me write a
backdoor?
Five Eyes
Want Access to Data from Tech Companies
The “Five Eyes”, the consortium of
intelligence agencies from the predominant English-speaking
countries, has put the tech industry on notice. The agencies are
suggesting that major tech companies such as Google voluntarily build
encryption-circumventing measures into their products to provide them
with unlimited access to data, or they may eventually be forced to by
law.
My students will design the software architecture
for this.
Is Amazon
Preparing to Disrupt Fast Food and Fast Casual?
… in a market where success is driven at least
partly by speed, there's room for disruption. And that disruption
may not come from the restaurant or convenience store sectors.
Instead, it could come from Amazon.
The online retail leader has dipped a toe in these
waters by launching a handful of cashierless convenience stores.
Some of its early Amazon Go stores offer selections not unlike those
of a 7-Eleven (albeit fresher) with prepared meals, sandwiches, and
salads alongside a limited selection of groceries and snacks.
However, two Seattle-area Amazon Go locations
carry only ready-made meals and snacks. That makes them less an
upscale version of a convenience store, and more of a variation on
the fast food/fast casual dining model – but with a self-serve,
no-wait twist that offers an unprecedented level of ease for
consumers.
(Related) Everything will change as new
technology integrates. This is an inadequate model. Can we (my
students and I) develop a better one?
How can the
IoT transform the sports business?
The business of sports is continuously evolving –
from fan expectations and venue operations to player insights and
analytics. Having instant access to all the relevant information is
crucial to winning, and the Internet of Things (IoT)
is helping create a competitive advantage for owners, leagues and
teams. Here are four ways that IoT is transforming sports via smart
venue technology.
(Related) We’re putting a lot of faith in Jeff
Bezos.
Amazon Is
Invading Your Home With Micro-Convenience
The company’s new line of voice-automated
products, including a wall clock and a microwave, could help it amass
an enormous database of consumer behavior.
Something for my students to play with. And I’ll
work it backwards to ensure I’m teaching the right (most
marketable) skills.
No comments:
Post a Comment