Archive

Category Archives for "Networking"

Salesforce Einstein aims to democratize AI

Along with virtual reality, artificial intelligence (AI) is perhaps the hottest buzzword in technology these days. AI is turning up everywhere, from chatbots and smart speakers to driverless cars and autonomous everything. And now it’s coming to CRM, courtesy of Salesforce Einstein, which the company says brings machine learning, predictive analytics and natural language processing to the entire Salesforce platform.At the giant Dreamforce conference in San Francisco this week, Salesforce execs from CEO Marc Benioff on down were predictably enthusiastic about the new features. In a 150-minute keynote address accompanied by Will.i.am and an impressive variety of non-profit and other Salesforce customers, Benioff warned attendees that “you know the world has been changing” and noted that the cloud gives you access to the new world of AI technology.To read this article in full or to leave a comment, please click here

EU privacy watchdogs have questions about Yahoo’s secret email scanning

European Union privacy watchdogs are concerned by reports that Yahoo has been secretly scanning its users' email at the request of U.S. intelligence services."It goes far beyond what is acceptable," said Johannes Caspar, Commissioner for Data Protection and Freedom of Information in Hamburg, Germany.Reuters reported on Tuesday that Yahoo had built a system for U.S. government agencies to search all of its users' incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.To read this article in full or to leave a comment, please click here

EU privacy watchdogs have questions about Yahoo’s secret email scanning

European Union privacy watchdogs are concerned by reports that Yahoo has been secretly scanning its users' email at the request of U.S. intelligence services."It goes far beyond what is acceptable," said Johannes Caspar, Commissioner for Data Protection and Freedom of Information in Hamburg, Germany.Reuters reported on Tuesday that Yahoo had built a system for U.S. government agencies to search all of its users' incoming emails. Other tech companies were quick to distance themselves, saying they would have challenged any such request in court.To read this article in full or to leave a comment, please click here

Taking down the internet: possible but how probable?

The hack of the Democratic National Committee this past summer, allegedly by Russia, prompted a political firestorm, but didn’t cause even a ripple in the US economy.But imagine the economic firestorm that would result if online attackers brought the entire internet down, even temporarily.You may not have to imagine it, according to Bruce Schneier, CTO of Resilient Systems, cryptography guru, blogger and international authority on internet security. In a recent post titled, "Someone is Learning How to Take Down the Internet," he wrote that he had been told by multiple sources that, ““someone has been probing the defenses of … some of the major companies that provide the basic infrastructure that makes the Internet work.”To read this article in full or to leave a comment, please click here

Not so startling revelations of how a hacker broke in

Trust no oneImage by PexelsAt the heart of every exploit, the vulnerability always lies in the target’s trust for attacker supplied input. This is true whether the attack is network-based or a hacker is trying to gain physical access to a specific location. To effectively mitigate risk, companies and individuals need to take the necessary precautions to keep data secure. The saying in the cybersecurity consulting industry is “trust, but verify.”To read this article in full or to leave a comment, please click here

5 steps to avoid burning out your on-call IT staff

Everyone is susceptible to burnout on the job, but if you're an on-call IT worker you are in a unique position. You can't just clock out at the end of the day. When you go home, you are required to be on alert for any emergency incidents, which can make it hard to truly unwind and relax after a long day."This affects work-life balance the most; 'always-on' readiness, not able to relax, an inability to have a downtime, a requirement to provide support during non-business hours and eating into one's private time -- added to the fact that calls can come at any time -- keeps one living on the edge," says Sharon Andrew, PhD, happiness evangelist at Happiest Minds Technologies, an Indian IT firm that focuses on mindfulness at work.To read this article in full or to leave a comment, please click here

Security vs. privacy: The endless fiery debate continues

The intractable nature of the “privacy vs. security” debate, in a world where the internet is a tool for criminals, spies and terrorists as well as for billions of law-abiding citizens, was on full display during Wednesday’s Cambridge Cyber Summit at MIT.Not surprisingly, it didn’t get resolved.The event, hosted by The Aspen Institute, CNBC and MIT, featured top-level government officials, private-sector experts and activists, who all agreed that there needs to be a “conversation” about how to “balance” the two, and that to achieve it will require more effective cooperation between the public and private sectors.But there was no agreement about where that balance lies. About the best they could do, after some conversation that got chaotic at times, was agree that they should continue the conversation.To read this article in full or to leave a comment, please click here

Security vs. privacy: The endless fiery debate continues

The intractable nature of the “privacy vs. security” debate, in a world where the internet is a tool for criminals, spies and terrorists as well as for billions of law-abiding citizens, was on full display during Wednesday’s Cambridge Cyber Summit at MIT.Not surprisingly, it didn’t get resolved.The event, hosted by The Aspen Institute, CNBC and MIT, featured top-level government officials, private-sector experts and activists, who all agreed that there needs to be a “conversation” about how to “balance” the two, and that to achieve it will require more effective cooperation between the public and private sectors.But there was no agreement about where that balance lies. About the best they could do, after some conversation that got chaotic at times, was agree that they should continue the conversation.To read this article in full or to leave a comment, please click here

Why being a data scientist ‘feels like being a magician’

The data scientist role was thrust into the limelight early this year when it was named 2016's "hottest job," and there's been considerable interest in the position ever since. Just recently, the White House singled data scientists out with a special appeal for help. Those in the job can expect to earn a median base salary of roughly $116,840 -- if they have what it takes. But what is it like to be a data scientist? Read on to hear what three people currently on the front lines had to say.To read this article in full or to leave a comment, please click here

Samsung to buy Viv Labs to challenge Google Assistant

Samsung Electronics has agreed to buy Viv Labs, an artificial intelligence startup created by Dag Kittlaus, Adam Cheyer and Chris Brigham.You may not have heard of Kittlaus, Cheyer or Brigham, but if you own an iPhone you've probably spoken with one of their creations, Siri. Apple bought their first startup, a spinoff from SRI International, in 2010. A couple of years later, they left to create Viv.Samsung's move into AI could be seen as a reaction to Google's launch of a new AI assistant on its Pixel and Pixel XL smartphones on Tuesday.Like Google Assistant, Viv is designed to answer natural language queries by integrating with a variety of web services. But where Google already has a range of in-house services -- Maps, Gmail, search -- from which to gather context, Viv aims to build an open ecosystem. Many of the useful functions will be delivered by third party developers, a model similar to the one Amazon.com is pursuing for its Echo devices.To read this article in full or to leave a comment, please click here

4chan finally feels the weight of economic reality

4chan, the wretched hive of scum and villainy that has caused more disruptions on the internet and in real life than any other single website, is in financial trouble and facing the harsh reality that success and traffic are useless without income.The site went live in 2003 when then-15-year-old Christopher "moot" Poole set it up as a copy of a Japanese board called 2chan. The site is the ultimate in bare bones. No login or account is required; everyone is anonymous. Poole, a fan of Japanese pop culture, wanted to create an American equivalent of 2chan, where people shared images of anime and manga.It rapidly grew beyond that, with the /b/ board, Random, becoming a hive of all sorts of insanity. For a while, it was the home base of the hacktivist group Anonymous. 4chan users became notorious for both good deeds and bad, both online and in the real world, resulting in profiles of the site by the Washington Post, New York Times and the Wall Street Journal. A book has been written about Anonymous and its 4chan connection, and the site was even the subject of an MIT research paper (PDF). To read Continue reading

Fujitsu considers selling its PC business to Lenovo

Lenovo may be about to grow its share of the shrinking PC business again: Japanese IT conglomerate Fujitsu is considering selling its PC manufacturing business, and Lenovo may be the buyer, Fujitsu said Thursday.As part of a strategy to focus on core activities, in February Fujitsu spun out its PC business as an independent operating unit. Such spin-outs are usually a prelude to a sale.On Wednesday, Japanese media reported that the company was in talks to sell the PC business to Lenovo."These reports are not based on any official announcement made by Fujitsu," the company said Thursday, adding that it "is currently considering various possibilities, including what is being reported, but a decision has not yet been made."To read this article in full or to leave a comment, please click here

Yahoo’s secret email scans helped the FBI probe terrorists

What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. The company was searching for a digital "signature" of a communication method used by a state-sponsored terrorist group, according to a new report from The New York Times that provided more details on Yahoo's email scanning.  The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.To read this article in full or to leave a comment, please click here

Yahoo’s secret email scans helped the FBI probe terrorists

What Yahoo was looking for with its alleged email scanning program may have been signs of code used by a foreign terrorist group. The company was searching for a digital "signature" of a communication method used by a state-sponsored terrorist group, according to a new report from The New York Times that provided more details on Yahoo's email scanning.  The report on Wednesday report didn't identify the signature or say if it involved any cryptographic computer code. But the article said it was the U.S. Department of Justice, and not the National Security Agency, that had obtained a court order forcing Yahoo to comply. A Reuters report on Tuesday wasn't clear about what agencies were involved in the probe.To read this article in full or to leave a comment, please click here