Monday, 22 February 2016

Getting Serious About Mobile Security

Technologies like biometric authentication and DLP are making enterprise mobility more secure. Are mobile UC and mobile-first team collaboration apps keeping pace?

One of my longtime favorite observations about UC and mobility is that everyone in the UC space talks about mobility, but nobody in the mobile business talks about UC. The focus there instead is on security, which happens to be an area of ongoing concern among those of us watching activities around mobile UC and the rise of mobile-first team collaboration apps.

It might seem that the mobile security story broke onto the scene with the advent of BYOD and the trend of allowing personally owned devices to access corporate systems. This trend, however, only intensified what was already a serious information security concern. On top of traditional worries, an organization's attack surface increased exponentially as it rolled out BYOD and had corporate data residing on so many easy to lose or steal devices. Further, as BYOD took off, the only platform capable of delivering enterprise-grade security was BlackBerry, and no one was bringing his or her own BlackBerry.

Bringing better security to BYOD

For most of us, our mobile and personal devices have become extensions of our lives and even bodies. Most of us carry our smartphones with us all the time, and when we can’t find them, we feel lost.
We are essentially always on, always connected to the Internet. This notion of anytime, anywhere access has extended not only to our personal lives but also our professional.

SEE ALSO: How to run a WQHD monitor at 2,560 x 1,440 via HDMI on an Intel HD3000, HD4000

In the name of employee productivity, Bring Your Own Device (BYOD) policies have become widespread and blurred the lines between our personal and corporate lives. Employees bringing their personal devices into work-related activities and communications both inside and outside of regular working hours have become the norm practice.

How data analytics could reshape NSW

Establishing New South Wales’ Data Analytics Centre and creating a regime where government entities are compelled to hand over data to it could rank as Victor Dominello’s single biggest achievement in public life, the NSW minister for innovation and better regulation told a conference today.
Addressing the Gartner Business Intelligence, Analytics & Information Management Summit in Sydney, the minister said that the DAC, established last year, had the potential to deliver better outcomes for NSW communities in areas ranging from fighting childhood obesity to efficient use of public safety resources.

“Governments that don’t have data, governments that don’t have information, make decisions in the dark – and that’s not good for any of us,” Dominello said.


Wednesday, 17 February 2016

Intelligent Virtual Assistant Market to Reach $3.6 Billion by 2020

Allied Market Research forecasts the global intelligent virtual assistant (IVA) market to earn revenue of $3.6 billion by 2020, at a compounded annual growth rate of of 35.2 percent.

Among the technologies involved, speech recognition and text-to-speech are the most dominant, the firm stated in its "World Intelligent Virtual Assistant (IVA) - Market Opportunities and Forecasts, 2014-2020" report.

The financial services industry was the highest revenue-generating segment, accounting for 39.9 percent share in 2014. IVA solutions are widely used in the BFSI sector, owing to faster response time, improved customer handling, and high customer satisfaction. However, the automotive segment is expected to witness the fastest growth during the forecast period, driven by a huge surge in in-car infotainment systems that enable drivers and passengers to surf the Internet, navigate, and make calls through speech recognition technology.

Monday, 15 February 2016

Call to improve Internet security

SHANGHAI needs to improve information security in an increasingly digitized world by establishing a comprehensive online identification recognition and protection system, a lawmaker said yesterday during the annual session of the Shanghai People’s Congress.


“It will be much safer and convenient,” said Hu Chuanping, chief of the Third Research Institute of the Ministry of Public Security, which is responsible for online security.

Ranger 3D Camera



The Ranger is an advanced camera for 3D vision integrators and scanner manufacturers. It features high flexibility, unsurpassed 3D measurement speed, and MultiScan functionality.

Thursday, 11 February 2016

Data analytics is at the juncture of man and machine

The network, in my mind’s eye, feels like a complex labyrinth with winding passages leading to opened and closed ports and firewalls exploding. Interestingly, when I did a little Google search to make sure I had my Greek mythology correct, I stumbled across this nugget of wisdom.

Password entry
Sample password protection policy
The password protection policy of a large financial services institution with more than 5,000 employees.
READ NOW
In reference to Ovid’s Metamorphoses, and the labyrinth built by Daedalus, Wikipedia warns, “This story thus encourages others to consider the long-term consequences of their own inventions with great care, lest those inventions do more harm than good.”