Tuesday 22 December 2015

ERP System Provides Flexibility and Security

For many organizations, enterprise resource planning (ERP) is the glue that holds together the fabric of the organization. It provides the data, insight and automation that are essential for operating effectively in today's digital business environment.

At Synalloy, a manufacturer of products and systems incorporating metals and chemicals, the need for a more flexible and agile ERP framework had moved to center stage a few years ago. "We required an ERP system that would help us manage operations and aid in acquisitions," explains Mike Padden, corporate director of IT.

The company, which operates facilities in Georgia, South Carolina, Tennessee and Texas, manufactures items for industries ranging from consumer goods and food producers to automotive and oil and gas companies. Because Synalloy relies on a shared services model and aggressively targets other firms for acquisition, it operates with different companies and divisions.

Consequently, "We needed a system that offered greater flexibility, so that employees could log into each individual company and handle various functions without encountering problems," Padden explains. "We have very different types of businesses with different needs, but we require a standardized set of processes."

In the past, the organization tapped a mix of ERP vendors, and this led to a complex, unwieldy and expensive IT and business framework. It also boosted demands on the IT department.

In many cases, employees attempting to handle tasks had to use four or five different ERP systems and handle processes manually. When they required data in a particular system, it could require lengthy load times.


Super-sharp 3D cameras may come to your smartphone

Many 3D cameras and scanners produce rough images, especially as they get smaller and cheaper. You often need a big laser scanner just to get reasonably accurate results. If MIT researchers have their way, though, even your smartphone could capture 3D images you'd be proud of. They've developed a technique that uses polarized light (like what you see in sunglasses) to increase the resolution of 3D imaging by up to 1,000 times. Their approach combines Microsoft's Kinect (or a similar depth camera), a polarized camera lens and algorithms to create images based on the light intensity from multiple shots. The result is an imager that spots details just hundreds of micrometers across -- you'd be hard-pressed to notice any imperfections.

The concept would need significant tweaking for a smartphone-sized 3D camera, since it revolves around a mechanical filter. You'd likely have to use grids of polarization filters over the sensor, and that would drop the effective resolution. You wouldn't get 23-megapixel cameras for a while, folks. However, it would still be good enough that you could snap a photo of an object from your phone and get a high-quality 3D printout.



Read More: http://www.engadget.com/2015/12/02/polarized-3d-imaging/

Big Data and Hadoop Development 2016

What is Big Data?

Let’s demystify this concept. Simply put, Big Data can be defined as the compilation of huge datasets that can’t be processed making use of conventional computing methodologies. It is neither one single tool nor a procedure. It rather engages multiple areas of technology and business.

Big Data Management & It’s Significance

For companies of every size, data management has gained an added dimension over the years. From being considered as a core competency today it is viewed upon as a crucial differentiator that holds the key to verify market winners. In the recent times, the government bodies as well as Fortune 1000 organizations have immensely benefited from the enhancements brought upon by the web pioneers. Furthermore, these companies are also outlining fresh and revolutionary practices and re-estimating the present strategies to review the methods in which they can convert their businesses with the usage of Big Data. This attempt has made them realize the basic nature and importance of Big Data. Forward thinking organizations today have understood that Big Data indicates a harmonious blend of innovative initiatives and technologies that involves data that is fast-changing, extremely varied and colossal.

However, in this highly developed and high-tech era, that makes it possible for companies to realize the real utility and value that Big Data management entails. For instance, modern day retailers have the choice to keep a track of user web clicks in order to recognize and outline the customer behavioural trends. This in turn allows them to ideate better and enhance their existing marketing and promotional campaigns, pricing structure as well as the stockage. The utilities are able to track the levels of household energy usage and forecast the energy outages and also emphasize on effective consumption of energy. Even government bodies and brands like Google using Big Data management can track and spot the surfacing of disease outbreaks through the social media signs. Furthermore, leading oil and gas corporations can derive the result of sensors in drilling devices in order to arrive at secure and effective drilling decisions.

The Big Data Benefits

Therefore, some of the visible core benefits of Big Data across multiple industry verticals usually include:

Making use of important data in social media platforms like the preferences and product awareness of customers, product organizations and how the retail companies are planning production

Marketing agencies are efficiently utilizing the vital data that is stored in social networking sites like Facebook and constantly updating their know-how about their campaign responses, promotions as well as the advertising channels

Hospitals make use of big data concerning the previous medical history of chosen patients in order to offer fast and improved service

Read More: http://www.smartdatacollective.com/node/365113

Monday 21 December 2015

Is self-driving technology becoming commoditized?

NEW YORK (Bloomberg) -- George Hotz’s claim that he built a driverless car in his garage has created a debate on Wall Street about the future for automotive technology suppliers such as Mobileye.

The 26-year-old hacker boasted in a Bloomberg Businessweek article that he developed a cheaper alternative to Mobileye technology used by Tesla Motors Inc. and that Elon Musk offered him a “multimillion-dollar bonus with a longer time horizon that pays out as soon as we discontinue Mobileye.” The revelation sent the stock down 7.2 percent that day and wiping out this year’s gains.

While Hotz’s exploits certainly highlight that the computing know-how for autonomous driving is becoming cheaper and more accessible, that doesn’t mean Mobileye’s business model is in trouble, according to research firm Gartner Inc. Mobileye has also locked in contracts with nearly all the top automakers from General Motors to Ford Motor Co.

Hotz’s achievement “demystifies the blackbox surrounding these technologies, and it will continue to increase the commoditization of the components,” Thilo Koslowski, vice president and automotive practice leader at Gartner, said by phone. “The magic still exists in putting it all together and doing it reliably.”

Mobileye’s edge 

That involves having the financial firepower to deal with insurance liabilities, regulatory hurdles, the threat of cyber attacks on connected cars and the absolute perfection of the automated driver-assistance system, he added.

Musk said as much in a tweeted rebuttal to Hotz’s claim: “Getting a machine learning system to be 99% correct is relatively easy, but getting it to be 99.9999% correct, which is where it ultimately needs to be, is vastly more difficult.”

Mobileye co-founder and Chief Technology Officer Amnon Shashua, a computer science professor at the Hebrew University of Jerusalem, called Hotz’s claims “nonsense,” arguing that any student of his could achieve the same in six months.

Read More: https://www.autonews.com/article/20151220/OEM06/151229999/is-self-driving-technology-becoming-commoditized?

5 Massive Trends Firing Up Technology Stocks In 2016

Technology stocks outperformed the stock market this year. Some massive trends should continue firing up the tech sector in 2016 and beyond.

The Technology Select Sector SPDR exchange-traded fund (XLK) and Vanguard Information Technology ETF (VGT) — the two largest tech ETFs — both returned about 3% in this year while the SPDR S&P 500 ETF (SPY) lost 0.7%, according to Morningstar. The biggest drivers in both ETFs were Microsoft (MSFT), +19% gain year to date; Facebook (FB), +33%; and Alphabet (GOOGL), +43%. Apple (AAPL), the biggest holding in both ETFs, shed 2%.

First Trust Dow Jones Internet ETF (FDN) rallied an eye-popping 21% this year. In addition to Facebook (FB) and Alphabet (GOOGL), it has to thank Amazon (AMZN) and Netflix (NFLX) for its outsized pop. The online retailer and video streaming service rocketed a mind-blowing 114% and 142%, respectively, in 2015.

iShares North American Tech-Software (IGV) surged 10% this year. Microsoft (MSFT), +19% year to date; Adobe (ADBE), + 26%; and Salesfore.com (CFM), +30%, led the charge.

Based on fourth-quarter estimates and actual results earlier this year, the technology sector’s sales growth was almost nonexistent at +0.1%, according to FactSet. But it was superior to the S&P 500 (SPY)’s, 3.4% dip. The tech sector is on track to grow earnings by 3.5% for 2015 while S&P 500 (SPY) earnings fall 0.5% .

Read More: http://www.forbes.com/sites/trangho/2015/12/20/5-massive-trends-firing-up-technology-stocks-in-2016/

Technology can keep people in touch

This is the fifth in a series about how technology affects child growth and skill development.

Q: What are some positive effects of technology on child growth and skill development?

A: The Washington Post released a survey of teens in 2012 stating they have incorporated social media sites and texting into their daily lives but still prefer face-to-face communication. They believe these social media technologies have enabled them to keep in touch with more friends, to get acquainted with other students at their schools and to connect with students with whom they share interests. One in five stated using social networking helps them feel more popular, confident and sympathetic toward others.

This national study of more than 1,000 youth between 13 and 17 years of age by the child advocacy group Common Sense Media generally contradicts the myth that using social media is harmful because of the risks of bullying by peers, isolation, online predators and the release of private/personal information. However, the report talked about “Facebook fatigue.” Forty-one percent of cellphone users said they are addicted, and 36 percent would like to return to a time before Facebook was invented.

Many teens expressed weariness from the constant pressure from texting and posting on social media. Teens have mixed feelings about digital communication and online technology. Research about the developmental and behavioral effects of technology on youth is scant.

Teens still favor texting in communicating online, with two-thirds stating they text everyday. Facebook is the preferred social site over Twitter, Google and MySpace. More teens think social networking helps their friendships than those who feel it does not — 50 percent vs. 4 percent. Half of all the teen respondents surveyed preferred real-life communication.

Our collective embrace of the Internet, social media sites and mobile-mediated devices is obvious in public places. Most individuals are connected on media to others, not talking to the person or persons with whom they are sitting. Dr. Keith Hampton, a communications professor at the University of Pennsylvania and principal author of the Pew Research study “Social Networking Sites and Our Lives,” articulated concerns about technology and social relationships.

Read More: http://www.hdnews.net/lifestyle/community/technology-can-keep-people-in-touch/article_8fa055a0-f093-5ef4-99b3-bbbca54fd48e.html

Thursday 17 December 2015

How to measure the value of big data

Data itself is quite often inconsequential in its own right. Measuring the value of data is a boundless process with endless options and approaches – whether structured or unstructured, data is only as valuable as the business outcomes it makes possible.

It is how we make use of data that allows us to fully recognise its true value and potential to improve our decision making capabilities and, from a business stand point, measure it against the result of positive business outcomes.

There are multiple approaches to improving a business’s decision-making process and to determine the ultimate value of data, including data warehouses, business intelligence systems, and analytics sandboxes and solutions.

These approaches place high emphasis on the importance of every individual data item that goes into these systems and, as a result, highlight the importance of every single outcome linking to business impacts delivered.

Big data characteristics are defined popularly through the four Vs: volume, velocity, variety and veracity. Adapting these four characteristics provides multiple dimensions to the value of data at hand.

Essentially, there is an assumption that the data has great potential, but no one has explored where that might be. Unlike a business intelligence system, where analysts know what information they are seeking, the possibilities of exploring big data are all linked to identifying connections between things we don’t know. It is all about designing the system to decipher this information.

The rise of robots, virtual reality coming soon

Virtual reality and robots could soon become more commonplace in U.S. homes if recent predictions for 2016 play out.

Technology improvements, new gear rollouts and lower costs are expected to spark greater interest in virtual reality technology from Facebook's Oculus, Google as well as Sony, HTC and others, according to Juniper Research.

Two consumer devices are already available: A VR headset made by Oculus for Samsung Galaxy smartphones, and Google Cardboard, which works with any smartphone. Juniper expects those devices and competing gear to get even more popular over the next five years.
"The technology is now poised to transform the entertainment industry, including games and video, in the next few years, whilst offering the potential to quickly expand into other markets such as industrial and healthcare," according to a recent Juniper report.

"We might get to a point where there's enough ubiquity of virtual reality where you can really build a company in this market today," Box CEO Aaron Levie said in an interview with CNBC. Levie's firm sells enterprise software for content management and file sharing.

There are already more than 200 companies developing virtual reality technology including hardware and software, and they're worth a combined $13 billion, according to research from VB Profiles.

Read More: http://www.cnbc.com/2015/12/11/the-rise-of-robots-virtual-reality-coming-soon.html

China Wants to Replace Millions of Workers with Robots

China is laying the groundwork for a robot revolution by planning to automate the work currently done by millions of low-paid workers.

The government’s plan will be crucial to a broader effort to reform China’s economy while also meeting the ambitious production goals laid out in its latest economic blueprint, which aims to double per capita income by 2020 from 2016 levels with at least 6.5 percent annual growth. The success of this effort could, in turn, affect the vitality of the global economy.

The scale and importance of China’s robot ambitions were made clear when the vice president of the People’s Republic of China, Li Yuanchao, appeared at the country’s first major robotics conference, held recently in Beijing. Standing onstage between two humanoid entertainment robots with outsized heads, Li delivered a message from China’s leader, Xi Jinping, congratulating the organizers of the effort. He also made it clear that robotics would be a major priority for the country’s economic future.

Many of the robots on show at the conference’s exhibition hall were service or entertainment robots such as automated vacuum cleaners, cheap drones, or quirky looking machines designed to serve as personal companions. But there were also many industrial robots that signaled the real impetus for China’s robot push: its manufacturing sector.

China is already the world’s largest producer of everything from clothes to electronics, but much of it depends on low-cost, low-skill labor. And even as economic growth has slowed, wages continue to rise across the country as the economy evolves. The Chinese government is also eager to see its workforce diversify and its manufacturing industries become more technologically advanced.

Read More: http://www.technologyreview.com/news/544201/china-wants-to-replace-millions-of-workers-with-robots/

Tuesday 15 December 2015

Robotics teams compete in first ever league play

Learning a new language between the start of term and Dec. 12 can be daunting, but the Midland High School’s robotics teams are confident it’s not out of their league. Teams from both Midland High and Lee High are competing today in the First Tech Challenge with robots programmed using Java, a change-up from last year.

“The competition changed platforms for both electronics hardware and software this year requiring teams to use Java as a new language as they build apps (applications),” said Cory Callaway, Midland High’s robotics adviser. “Midland High’s teams have been working furiously to design, build, test, redesign, and modify our robots to meet the challenges of this year’s competition.”

Teams compete from 9:30 a.m. to 2 p.m. today at the Permian Basin Petroleum Museum.

Java is considered mainstream in the tech and programming world because of its user-friendly language. The apps act as software pieces for Android phones, which are the “"brains” of the students’ robots, according to Callaway.

“We’re an engineering community, and ... engineering is continuing to incorporate more robotics technology,” he said. “College students are learning programming and coding when they’re not exposed in high school, so those exposed in high school are ahead. It’s a competition that fits the academic side of the growth in the industry right now.”

It marks the first time for the Panhandle and Plains Region to incorporate “league play,” which lets teams compete in events and accumulate points that determine the seeding for invitational qualifier matches. It also marks a first for the Petroleum Museum hosting a robotics event.

“While working with the Petroleum Museum over the past couple of years, our conversation took a natural turn toward working together to help provide more opportunities to the students of Midland,” Callaway said.

Stacie Hanna, the museum’s director of education, said it was a step toward the museum’s desire to incorporate more science, technology, engineering and mathematics (STEM) into its education curriculum.

Read More: http://www.mrt.com/news/education/article_8eabd836-a08e-11e5-9fe3-df1e4eb1ee2e.html


Robotics, data driven technologies and futuristic design: Work is complete on ‘the most advanced factory in the world’

The £48m Factory 2050 is now open at the University of Sheffield’s new advanced manufacturing campus on Sheffield Business Park.

It is the first building to complete on the 50-acre Advanced Manufacturing Research Centre (AMRC) with Boeing site, which will eventually create 1,800 jobs and is a step towards the development of the UK’s first Advanced Manufacturing Innovation District.

The glass-walled “reconfigurable” Factory 2050 will be used in research programmes designed to revolutionise the manufacturing process, and has been designed by architects Bond Bryan, who worked with the concept of creating a circular factory first mooted in 2005, but not achievable due to budget constraints.

Factory 2050 will be home to the AMRC’s Integrated Manufacturing Group (IMG), which is currently installing cutting edge manufacturing and assembly technologies, advanced robotics, flexible automation, next generation man-machine interfaces and new programming and training tools that will drive its research, ready for it to be fully operation in spring next year.
The factory has been designed to rapidly respond to the demands of its customers, switching production between different high-value components and one-off parts - but aesthetics were also at the forefront of the design process.

Bond Bryan Architects, which has a history of designing Advanced Manufacturing Research Centres nationally, said the building’s modern design proved that flexibility does not need to rely on traditional building form and layout.

Read More: http://www.yorkshirepost.co.uk/future-yorkshire/research/robotics-data-driven-technologies-and-futuristic-design-work-is-complete-on-the-most-advanced-factory-in-the-world-1-7619165

European colocation market growth buoyed by M&A and Safe Harbour, says CBRE

The European datacentre colocation market continues to go from strength-to-strength, with investment in the sector nearing $9bn in 2014, according to research from global property advisor CBRE.

The organisation cited the rise in mergers and acquisitions in the colocation sector during the second quarter of 2015 as a key investment driver, and has fuelled market growth by 6% overall in 2015.

The second half of 2015 has seen Equinix make a $3.6bn bid to acquire fellow colocation provider Telecity Group, a deal that looks set to shake up the competitive landscape across Europe in 2016. This is particularly in the wake of the European Commission’s ruling that both firms must sell-off some of their facilities in London, Amsterdam and Frankfurt for the deal to go ahead.

Aside from mergers and acquisitions (M&A) activity, the research picks up the uptick in interest from large-scale IT infrastructure and web companies in opening datacentres in Europe, with London emerging as the most popular location.

“IT infrastructure companies are dominating the European datacentre market. We’ve seen overall demand dynamics mirror what these firms are doing,” said Andrew Jay, head of datacentre systems at CBRE.

“The implications are wider as well, with operators seeing proof that deploying an on-off ramp to the cloud in a datacentre will attract enterprise customers, so securing the IT Infrastructure providers to your premises is becoming vital.”


Read More: http://www.computerweekly.com/news/4500258245/European-colocation-market-growth-buoyed-by-MA-and-Safe-Harbour-says-CBRE

Monday 14 December 2015

As BYOD becomes common, the importance of Internet Security

Today's workforce is reliant on computers, laptops and smartphones as the infrastructural extensions of an organization. These devices, endowed with the power of the internet, carry important documents and passwords that form a virtual identity for organizations, especially with BYOD policies becoming a trend. Therefore, it is essential organizations ensure that they have the best of internet security to guarantee that their identity is not compromised or important data lost.

The advent of the internet opened up yet another platform for fraudsters, who not only hack computers, steal private passwords, documents and files, but are also identity thieves. Despite this, some SMEs and big enterprises are still very complacent in terms of internet security and seem to believe that their computers are invisible. They have still not realized that the moment their job requires them to log on to the internet, they can easily fall prey to such online thugs.

In order to ensure this security, not only the CIOs, but the employees of a company should understand a few simple things about being on the internet and act accordingly. The foremost thing to know is where online data is stored, along with understanding the encryption of that data. With the growing popularity of big data and intellectual property amongst the corporates, these elements are constantly under the risk of loss, theft or exposure to unwanted entities. Similarly, personal data such as credit card information and corporate confidential data and information are under the same threat. There are many laws and regulations mandating data loss prevention with the objective of privacy protection and cross border data transfer. Today with BYOD policies, it is very difficult to control the flow and storage of the data, especially with the plethora of social media and other file sharing applications.

Read More: http://economictimes.indiatimes.com/small-biz/security-tech/security/as-byod-becomes-common-the-importance-of-internet-security/articleshow/50167658.cms






Managed Security Services Prove Their Worth

The world of cybersecurity changes every day. New threats enter the security landscape, and organizations leverage new and better tools to deal with these threats. At the same time, business users travel around the world, carrying notebooks, tablets and smartphones that contain sensitive information. How can enterprises continue to secure data in such a dynamic environment?

Cloud-based security solutions — known as Security as a Service, delivered by managed security service providers — fill this gap. Cloud-based security offerings provide organizations with the flexibility to respond to an increasingly diverse spectrum of attacks. Once considered fringe products, Security as a Service offerings now play a critical role in building strong defenses.

The Benefits of Security as a Service

Security as a Service providers offer several key benefits that simply aren’t found in traditional on-premises offerings. Cloud-based products are often scalable, affordable options that offer state-of-the-art security controls with only a fraction of the administrative burden needed to support on-premises systems.

Cloud providers design their service offerings with scalability in mind. The hundreds or thousands of customers they serve simultaneously demand highly scalable solutions that easily accommodate both predictable and unpredictable spikes in usage. If an organization’s website sees a sudden spike in demand — perhaps with the arrival of a seasonal peak or because of media coverage — an on-premises solution may not cope with that demand without a time-consuming and expensive hardware upgrade. Cloud security offerings can automatically scale to meet changing needs.

Read More: http://www.biztechmagazine.com/article/2015/11/managed-security-services-prove-their-worth

Hardware Encryption Market Expected to Reach $296.4bn by 2020

A new report by Allied Market Research forecasts that the world hardware encryption market is to show a CAGR of 54.6% from 2010- 2020 and be worth just over $296 billion.

The World Hardware Encryption—Market Opportunities and Forecasts, 2014–2020 report proposes that hardware encryption is considered as the most effective form of data protection against unauthorized access, aligning with the actions of various governments across the globe who are coming out with stringent regulations pertaining to data protection. This is seen as a key development that further supplements the demand of hardware encryption as a key data security technology.

The hard disk drives (HDD) segment was found to be the highest revenue generating segment, constituting 57% of the total market revenue in 2014 and is expected to maintain its dominance throughout the analysis period. The segment of encrypted USB flash drives is forecast to grow significantly and register highest CAGR of 58.8% during the forecast period. The increasing demands of robust memory storage devices that are highly compact, offer maximum storage and render better security of data are key factors, which would drive the growth of this segment.

Looking at regions and vertical industries, Asia-Pacific was revealed to be the largest revenue generating region for hardware encryption, followed by North America and Europe, as is set to be the highest revenue generating region, constituting nearly 33.5% of the total market revenue. The region is also likely to registering a CAGR of 56.9% during the forecast period, supplemented by factors such as strong economic growth, development in enterprise IT infrastructure and the large scale outsourcing of BPO operations to China, India and Malaysia.


Read More: http://www.infosecurity-magazine.com/news/hardware-encryption-2020/

Friday 11 December 2015

Disk Encryption: The Good and The Slow

Simple screen locks in the form of PINs and patterns have been around for a long time, but only recently, with the launch of Android Honeycomb, did full disk encryption make an appearance on Android. Encrypting and decrypting user data on the fly, i.e., during read and write operations, boosted device security considerably, based on a device master key.

Prior to Android Lollipop, the aforementioned master key was based on the user’s password only, opening it up to a host of vulnerabilities through external tools like ADB. However, Lollipop carries out full disk encryption at the kernel level, using a 128bit AES key generated at first boot, which works in tandem with hardware-backed authentication like TrustZone, ridding it of the ADB vulnerability.

Disk encryption can be done at two different levels, namely, at the software level or at the hardware level. Software encryption uses the CPU to encrypt and decrypt data, either using a random key unlocked by the user’s password, or by using the password itself to authenticate operations. On the other hand, hardware encryption uses a dedicated processing module to generate the encryption key, offloading the CPU load and keeping the critical keys and security parameters safer from brute force and cold boot attacks.

In spite of newer Qualcomm SoCs supporting hardware encryption, Google opted for CPU-based encryption on Android, which forces data encryption and decryption during disk I/O, occupying a number of CPU cycles, with device performance taking a serious hit as a result. With Lollipop’s mandating full disk encryption, the Nexus 6 was the first device to bear the brunt of this type of encryption.

Read More: http://www.xda-developers.com/disk-encryption-the-good-and-the-slow/

Docker Doubles Down on Security With Nautilus, Hardware Encryption

BARCELONA, Spain—As Docker container adoption grows, so too does the need for robust security. Today at the DockerCon EU conference here, Docker announced several new security-focused efforts, building on existing security that Docker has been pushing this year.
During the opening two-hour general keynote session, Docker founder Solomon Hykes emphasized that developers do care about security, but it's important that security is actually usable.

"You can give developers the most secure tools in the world, but if the tools get in the way, they won't use it and the result is unusable security, which is really not security at all," Hykes said. "By providing usable security tools, we can move the needle on improving security for everyone."
Docker's foray into security tools got its first big push in August, when Docker Content Trust debuted alongside the Docker 1.8.0 release. Docker Content Trust makes use of the open-source Notary project, which aims to enable secure updating by way of authenticated and signed application images.

Part of the Content Trust approach relies on encryption keys, which are now being hardened further. Hykes announced new experimental support for hardware encryption with Yubico USB keys. Going a step further, Hykes and Docker actually gave all attendees of the DockerCon EU keynote their own key.

In an interview with eWEEK, Nathan McCauley, director of security at Docker, explained that the Yubico technology is all about hardware encryption and not so much about two-factor authentication. Yubico builds USB keys that are compliant with the FIDO Alliance Universal Second Factor (U2F) specification. The Yubico key Docker uses is a hardware-encrypted token that never reveals the private root encryption key that is used to sign an application image.
The hardware encryption support is currently in the experimental branch of Docker, and it could land in the Docker 1.10 release later this year or early 2016, according to McCauley.

Read More: http://www.eweek.com/security/docker-doubles-down-on-security-with-nautilus-hardware-encryption.html

It's official: Australia can be a force in technology

What a dramatic week for Australia's long-ignored, suddenly centre-stage, technology sector.
It started with a high-profile and largely cheered policy announcement from the federal government on innovation. It ended with the triumphant IPO on the Nasdaq for Atlassian, the most significant technology company this country has produced to date.
Sandwiched between was one of the more riveting (and bizarre) stories we've encountered in a long time, when a previously unknown Sydneysider by the name of Craig Steven Wright emerged as a possible founder of crypto-currency bitcoin.

To add to the excitment, just a few hours after this revelation (looking less and less likely, but still not totally discredited) surfaced in the US technology press (led by the Conde Nast magazine Wired), a leased suburban residence in the North Shore of the city connected to Wright was raided by police and tax authorities. Keep watching.

At this point, it's safe to say that technology has crashed through into the economic consciousness of the nation. For a country where the corporate scene has long been dominated by gigantic miners and resources companies, big banks and domestic oligopolies, it's a big change in mindset, and it's only going to get bigger.
Australians have long been world beaters when it comes to consuming technology. And not bad at creating it. The old mantra goes we're just not good at commercialising it. Only evidence has been mounting the old mantra is wrong, and this week (fiendish hoax or not) the evidence became overwhelming.

Read More: http://www.smh.com.au/business/the-economy/australia-is-showing-the-world-it-can-be-a-force-in-technology-20151210-glk82w.html

Wednesday 9 December 2015

Self-Service Tech Market to Exceed $31B by 2020

The global self-service technology market will exceed $31 billion in five years, according to a report by Allied Market Research. The market will have an annual growth rate of 13.98% that will be largely driven by enterprises operating in sectors such as retail, banking, and healthcare.

According to the study, the self-service technology market is driven by the need to provide more convenience to customers while also saving on costs. With self-service kiosks, organizations can provide more convenient and efficient service while cutting down on manpower. The survey found that “North America accounted for the maximum adoption of self-service technologies with 44% share in the overall global revenue.”

Healthcare Facilities Using Self-Service Kiosks

Around the world, healthcare facilities are using self-service kiosks to give their patients a better experience. In Bolivia, Novant Health Brunswick Medical Center is now offering patients new self-service kiosks that let them check-in for preregistered appointments. The kiosk lets patients “update demographic information, review insurance information, scan ID and insurance cards, sign consent forms with an electronic signature, make credit card payments on previous account balances.”

Patients are encouraged to use the self-service kiosks in an effort to make healthcare simpler and more convenient. In Tennessee, Maury Regional Medical Center is letting patients use self-service kiosks to pay for their healthcare with any major credit card, checking account, or PayPal account.

Healthcare facilities are looking to self-service kiosks to provide quick, accurate, and efficient services. With self-service kiosks, patients can check-in quickly instead of waiting for a staff member to sign them in. In addition, instead of tediously entering the same information into multiple different forms, patients can use self-service kiosks to fill out forms electronically. The healthcare industry can benefit from the automation that self-service kiosks provide.

Read More: http://www.acuantcorp.com/Self-Service-Tech-Market

How data center vendors and operators can maximize their facilities’ performance

Power usage effectiveness has been an important metric in the data center world for some time now. Companies running data center facilities typically strive for the lowest PUE they can achieve in order to reduce their operating costs and promote their green environmental credentials.

In an earlier article, my colleague Srikanth Murugan demonstrated how to cut through the marketing hype of competing claims about PUE performance. I would now like to take the subject a little further and focus on the economics of PUE and how data center vendors and operators can maximize their facilities’ performance.

Selecting the ideal location

Stable power grids, low energy prices and year-round access to “free cooling” drove a number of large Internet companies to build data centers in the Nordics where conventional wisdom dictated they could most easily achieve extremely low PUE values. Google in Finland and Facebook at The Node Pole in Sweden are two such examples. However, increasingly relaxed data center temperature and humidity ranges – as defined by ASHRAE – have now made low PUE deployments possible for a much wider range of geographical locations.

Cooling developments

A key area of technical development here are evaporative indirect free air cooling systems, now available from an increasing number of cooling technology suppliers. Using an evaporative cooler, dry outside air of 32 degrees can still be used to cool down air in the data center to 22 degrees, thus delivering meaningful savings from reduced electricity needed for powered cooling.

Even more exiting from an economic perspective is that for some locations this enables the use of outside air for cooling all year round, resulting in a lower maximum PUE and bringing significant capital expenditure savings.


Read More: http://www.rcrwireless.com/20151208/opinion/reality-check-the-economics-of-data-center-power-usage-effectiveness-tag10

Texas Colo with Efficient Data Center Cooling System Launched

Aligned Data Centers, a data center provider formed earlier this year, has launched its first colocation facility in Plano, Texas, featuring a water-efficient data center cooling system designed by its sister company Inertech, whose systems are also deployed at eBay, Lenovo, and Telus data centers, among others.

In addition to using very little water, the design of the cooling system is the primary enabler for Aligned’s unusual colocation business model. Offering a compromise between physical data center capacity and elastic cloud infrastructure, the company offers what it calls on-demand colocation services, meaning customers only pay for the capacity they actually use, with the ability to scale their deployment up or down as they go along.

Aligned COO Thomas Doherty told us in an earlier interview that the cooling system’s modular design was what gave the provider the flexibility to change the amount of capacity provisioned for any single client on-demand.

In addition to the Plano facility, Aligned is building a larger data center in Phoenix and scouting for additional locations in California, Illinois, Virginia, and New Jersey, the company said in a statement.


Read More: http://www.datacenterknowledge.com/archives/2015/11/23/texas-colo-efficient-data-center-cooling-system-launched/

Tuesday 8 December 2015

5 mobile security flaws you should know

Windows Phone, Android, iOS — no operating system is completely bulletproof from security problems.

Mobile devices can be a scary thing to think about after major security vulnerability emerged in July in Android, called the Stagefright bug — which lets cyber criminals hack a smartphone simply by sending a text message.

A Stagefright 2.0, which allowed a hacker to gain control of a smartphone via an MP3 or MP4 video, sprang up in October before Samsung, Google, LG and other tech giants enforced monthly security smartphone security updates following the original bug, according to the Guardian.

Apple devices can also be susceptible to security problems.

A hacking team received $1 million from startup company Zerodium after the group discovered an unknown, or zero-day, vulnerability in iOS.

But such risks are not limited to just smartphones.

"I think they're in the spotlight right now because they can do so many things, and carry so much information and interfaces," said Jan Volzke, Vice President of Reputation Services at Whitepages, a contact information and identity verification company.

Here's a quick list of top mobile security flaws you should know:

Clicking on links or opening a suspicious email enables hackers to collect and access sensitive information, such as Social Security numbers and SMS messages.

They can even steal credit card numbers and online banking transactions directly and install spyware on a device to access personal data.

Experts at the Alcatel-Lucent's Motive Security Labs confirmed a rapid increase of mobile device infections, with a 25% spike in 2014, compared with 20% in 2013, according to the Motive Security Labs H2 2014 Malware Report.

Read More: http://www.nydailynews.com/news/national/5-mobile-security-flaws-article-1.2451562

Brain-Computer Interface Lets You Control IoT Devices

Researchers at Brown University joined forces with a Utah-based company, Blackrock Microsystems, to create a brain-computer interface that lets you send commands to the Internet of Things around you.

The company is awaiting clearance from the U.S. Food and Drug Administration. Once approved, the device begins testing on volunteers, and it will go on sale as one of the first digital health commercial devices that you’ll be able to buy from a digital health store.

WHAT IS BRAIN-COMPUTER INTERFACE?

A brain-computer interface can give paralysed people the power to control TVs, computers and wheelchairs with their thoughts. A device that let them run all IoT devices, home and at work. Allows them to control autonomous cars. Or even communicate with other people, across the world.

Inside the device is a wireless processor that costs about $15.000. Called the “Cereplex-W” CPU, it is not the first CPU for a brain-computer interface designed by BrainGate. A company that has as a primary goal the design of tech for physically challenged individuals.

But, this time the company went a step further with this device that lets them communicate and control connected devices through thought.

The wireless, 96-channel CerePlex W brain-computer interface is the first commercial device able to detect, digitise and convey a neural signal, via wireless to a receiver.

Read More: https://wtvox.com/cyborgs-and-implantables/brain-computer-interface-implantable/

Here’s why LTE networks are about to become much more useful

There’s more to LTE than just speeding up communications between mobile devices, and its increasingly faster speeds – now at 150 Mpbs and expected to hit 600 Mpbs by 2018 – is beginning to benefit enterprise networks.

In a recent webinar, 451 Research analyst Christian Renaud noted that many conference attendees are eschewing the free WiFi offered at event facilities in favor of tethering to an LTE network because it’s faster.

“It’s getting far faster and more ubiquitous,” he said. At this rate, the speed of wireless connections will begin to exceed the speed of wired connections in the next few years.

In addition, the worldwide footprint has grown to 422 LTE networks in 143 countries, and all but 12 countries globally have committed to LTE networks, said Renaud. This footprint is now poised to become a platform for innovation and growth in applications as cloud computing, mobility in the workforce, the Internet of Things (IoT) and security have an impact on networks, he said.

Industrial IoT is now becoming a reality, said Renaud, and it means operational technology that historically wasn’t connected to the network is going to be, and it’s going to add further complexity to enterprise networks. Data center and WAN congestion is increasing pressure to offload non-core applications to the cloud, he said, while existing MPLS and private WANs are too “brittle” and interfering with the ability to quickly respond to new applications and services.


Read More: http://www.itworldcanada.com/article/heres-why-lte-networks-are-about-to-become-much-more-useful/378966

Monday 7 December 2015

Mobile wallet for government services will be a reality soon

If you think that it was only banks that are going the app way, the latest being SBI, you might be in for a happy surprise. If reports are to be believed, Indian government would soon be launching a mobile wallet service for government services.

As of now, most government payments and receipts are done either through cash or cheque. However, using this app, one would be able to electronically pay for all kind of government services. This is a step in the direction of Modi government's plan of creating a cashless, or less cash, economy and making India a digitally savvy country.

"Our endeavour through this project is to ensure that at least 90%, if not more, of all government payments happen through some or the other electronic mode, be it through credit card, RTGS, DBT or mobile," a senior official aware of the project called 'epayment' told ET.

A report of a Task Force on Aadhaar-Enabled Unified Payment Infrastructure which was released in 2012 came out stating that the cost of cash transactions is equivalent to 5-7% of GDP, which can be reduced by one-third if payments are done electronically. The report also recommended electronic payments for a sum more than Rs 1,000 by the government and government institutions.


All you need to know about mobile wallets

Aiming towards a cashless society, mobile wallets are still a new but a rapidly growing concept. It will be a long time before traditional wallets reach the museums, since a major slice of our population still doesn't own credit cards, people who have turned to mobile wallets are increasingly happy with them. The reason for this is obvious: Mobile wallets have made payment process absolutely seamless.

If you are still new to the concept, here's what you need to know:

What is a mobile wallet?
To put it simply, a digital or a virtual wallet is to a traditional wallet what an email is to postcards. Most of these wallets work through apps that you can download on your smartphones, hence the term 'mobile wallet.'

Like Uber has made hailing a taxi just a few taps away, a mobile wallet makes payments as easy as few taps by the user on his smartphone. So even if you do not have cash and the thought of going to the ATM seems too time consuming, a mobile wallet will enable you to make transactions. Just make sure you have money in the wallet, which you can add through credit/debit card and netbanking.

Kinds of mobile wallets
There are four kinds of mobile wallets: Open, semi-open, semi-closed and closed.

With an open mobile wallet, you can pay for goods and services with your digital money, withdraw cash from ATMs and banks, and transfer money to other users of the wallet. These wallets also let you transfer money to mobile number bank accounts.

On the other hand, with a semi-open mobile wallet, you can pay for transactions with merchants who have a contract with the company. There is no option of withdrawing money.

ANZ launches Android mobile wallet across the Tasman

ANZ Bank NZ has released a contactless payments service for Android smartphones with a zero liability protection against fraudulent debit and credit transactions.

Called goMoney Wallet, the new application is integrated into the bank's existing Android app, which allows customers to check balances, transfer money and make payments. It will be available from tomorrow.

ANZ Australia also intends to launch a mobile wallet early next year, a bank spokesperson told iTnews.

The Australian version will take a different approach to the Kiwi mobile wallet, however, and will operate as a standalone application that is not integrated with goMoney.

ANZ Australia launched the ePOS iPhone-based solution for merchants to accept credit card payments in 2010.

Liz Maguire, the bank's NZ head of digital channels and transformation, said the driver for developing the mobile wallet came from customers.

"A mobile wallet was the number one request from ANZ goMoney customers when they were surveyed this year," Maguire said.

She said the mobile wallet uses host card emulation technology via NFC supported on newer devices running Google's Android operating system, and at merchants with contactless payments terminals.

Payments can only be performed within two centimetres of the terminal and with the phone active and providing confirmation, as a precaution against accidental transactions.

ANZ said the goMoney app uses "high-grade encryption and sophisticated fraud monitoring systems". Card details are sent encrypted via NFC to the terminal, and the system meets Visa's security certification requirements, the bank said.

Read More: http://www.itnews.com.au/news/anz-launches-android-mobile-wallet-across-the-tasman-412740



Tuesday 1 December 2015

The security risks of IoT devices

The Internet of Things (IoT) isn’t a new concept, but it has gained momentum especially within the last year, as more and more connected devices have come to market. While connecting everything brings added convenience to our everyday lives, it’s crucial to understand what we may be compromising from a security perspective, and importantly, which devices could pose a threat either now or in the future.

With so many connected devices we decided to take a look at those that have made the headlines so far this year. Cars, for instance, have only recently become connected, although they have long been computerized. However, with poor Internet security expertise some manufacturers are being caught out.

In April, Cyber security experts Charlie Miller and Chris Valasek revealed a software flaw that allowed them to take control of a Jeep Cherokee on the move -- all from a laptop computer at home. Hacking into the Jeep’s electronics through the entertainment system, they were able to change the vehicle’s speed, alter its braking capability, and manipulate the radio and windscreen wipers. The two described the hack as "fairly easy" and "a weekend project".

A few months later, news broke that researchers had hacked a Tesla Model S, once again via the car’s entertainment system. Although it took closer to a year to pull this hack off, the researchers were able to apply the hand brake, lock and unlock the car, and control the touch screen displays. Tesla quickly developed a fix, which has been sent to all of the affected vehicles.

Hacked vehicles are an obvious cause for concern, but the hazards presented by apparently innocuous devices such as the "smart fridge" or "connected toaster" also warrant equal consideration. The thought of a hacker gaining control of your refrigerator may be less daunting than them taking control of your steering wheel on the motorway, but these products can act as a gateway to much more sensitive information.

Read More: http://betanews.com/2015/11/30/the-security-risks-of-iot-devices/

Britain has declared war on Internet security

For the past two and a half years, many have hoped that the mass surveillance programs revealed by U.S. National Security Agency whistleblower Edward Snowden would inspire serious reform of Western intelligence agencies, nudging the post-9/11 national security pendulum back in the direction of privacy and civil liberties. Unfortunately, the opposite is occurring.

With few exceptions, the past year has seen governments around the world double down on intrusive mass surveillance. Unprecedented and draconian new laws crafted in the name of fighting crime and terrorism have emerged in France, Australia and many other countries. Last month the U.S. Senate passed the Cybersecurity Information Sharing Act, a deceptively named bill that has nothing to do with security and everything to do with having companies give more of their customers’ data to U.S. government agencies. And last week, U.K. Home Secretary Theresa May presented a long-awaited draft of the new Investigatory Powers Bill, a collection of sweeping reforms that would give more powers to British police and spy agencies, including the Government Communications Headquarters (GCHQ), the NSA’s close ally and longtime collaborator.

The U.K. draft law is a nightmarish cocktail of bad ideas from both sides of the pond — an authoritarian wish list that goes beyond even the NSA’s powers. Rather than roll back its most indefensible abuses, the text makes clear that the British government intends to retroactively legitimize the most invasive and legally dubious surveillance activities that Snowden exposed. As Snowden put it, the bill is an attempt “to fit the law around the spying, rather than making spying fit the law.” If successful, it will have dire consequences in the U.K., the U.S. and beyond.

Read More: http://america.aljazeera.com/opinions/2015/11/britain-has-declared-war-on-internet-security.html

The future of internet security

CYBER CRIME IS A MULTI MILLION POUND business. In the UK alone, the Cabinet Office estimates the cost of cyber crime to be in the region £27bn every year, and that number is only snowballing as we move towards a society where everything and everyone perpetually relies on information, and nothing is obscure.

We have become almost entirely dependent on the continued availability,
accuracy and confidentiality of information and communications technology. But as well as significant benefits, this has enabled old crimes to be committed in new and more subtle ways, meaning that as tech progresses, so do the criminals relying on it.

Cyber crime, hacks and data breaches are becoming more prevent, and within the last couple of years, they have hit some of the world's biggest service providers. It's now not a matter of if your company will get breached, but when, and what can be done to try and prevent the inevitable.

Security has now passed well beyond hacking for fun and is now often fuelled by the potential to obtain large quantities of money without physically robbing a bank. Major conglomerates are being targeted, and real people are having their personal information and finances put at risk every day.

So in five years' time, as technology becomes even more pervasive and cyber criminals find it even easier to take advantage of organisations that at the same time are taking more security precautions, how will the threat landscape look?

Read More: http://www.theinquirer.net/inquirer/feature/2433753/the-future-of-internet-security