Menu

Blog

Archive for the ‘security’ category: Page 132

Feb 15, 2016

Where Artificial Intelligence Is Now and What’s Just Around the Corner

Posted by in categories: bioengineering, biological, cybercrime/malcode, internet, robotics/AI, security, virtual reality

I believe that AI holds a lot of promise and many great things; however, we have to correct some very critical issues 1st before compound a huge issue that we have today. And, that is Cyber Security and re-establish trust with our consumers and customers. Without these 2 being fully addressed; you will compound these two challenges with AI plus run the risk of having an IoT that most people will not wish to use due to hackers, bad data, etc. Not to mention lawsuits for Wi-Fi connected robotics that were hacked and injured or worse some innocent person.

I believe need to ensure priorities are in order before we make things worse.


Unexpected convergent consequences…this is what happens when eight different exponential technologies all explode onto the scene at once.

Continue reading “Where Artificial Intelligence Is Now and What’s Just Around the Corner” »

Feb 15, 2016

Hackers Demand $3.6 Million from Hollywood Hospital Following Cyber-Attack

Posted by in categories: biotech/medical, business, robotics/AI, security

Lack of good Cyber Security across the net, will continue to be a key reason why AI in general will not deliver the return on new AI tech products and robots / devices. $3+ million in ranson may not be that large to mid size and large tech companies; however, it is everything to small businesses and small businesses and consumers is what keeps tech in business.


Hospital staff severely impeded in their day-to-day work.

Read more

Feb 14, 2016

Bringing Innovation into Cyberdefense Technologies

Posted by in categories: cybercrime/malcode, internet, security

Nice article; something that I agree very much with is the perspective that both Cyber Security is intertwined with technology innovation and adoption. Tech and other companies creating products or even services that leverages the net, can easily see their revenue potentials impacted due to poor Cyber Security. Example, Hello (Wi-Fi) Barbie by Mattel; when it was announced that the doll was indeed hackable; many buying consumers buying for their children left her on the shelf.


Hackers use innovative thinking when breaching systems, why can’t government?

by Larry Karisny

Continue reading “Bringing Innovation into Cyberdefense Technologies” »

Feb 14, 2016

Top CEOs Focusing on Cognitive Computing

Posted by in categories: business, cybercrime/malcode, internet, neuroscience, robotics/AI, security

I believe it is wonderful to think about cognitive computing. However, as a fellow CIO & CTO, I would suggest a key priority has to be focused on Cyber Security until it is resolved; or in a better position to proactively blocker would be intruders. Without a solid Cyber Security plan and model in place and operational; your cognitive computing capabilities will be worth nothing in the end once hackers are helping themselves to your IP and other information as well as your AI machines.


The news comes from the recent IBM Institute for Business Value study, “Redefining Competition: Insights from the Global C-suite Study — The CEO perspective.” Researchers interviewed more than 5,000 C-level executives worldwide about their perspectives on a variety of technology issues, including the importance of mobile solutions, cloud Relevant Products/Services computing, and the Internet of Things.

Torchbearers and Market Followers.

Continue reading “Top CEOs Focusing on Cognitive Computing” »

Feb 14, 2016

Chinese cyber strategy-building deterrence

Posted by in categories: cybercrime/malcode, military, security, space

China’s public report on their own Cyber Security Strategy — don’t get too excited; it is a “public” version of their plan (mean nothing in depth).


New cyber warfare unit

While China was assessed to have cyber warfare capabilities for quite some time, the declaration by its Central Military Council of the formation of a new military branch focussed on digital battleground technically called Strategic Support Force on 1st Jan. 2016 confirmed this. This new force is mainly aimed at providing resources capable of protecting China’s cyber and space security. On this occasion Xi pointed out that this force is central to achieving the “Chinese Dream” suggesting its importance.

Continue reading “Chinese cyber strategy-building deterrence” »

Feb 14, 2016

Clueless In Cyber-Security Land

Posted by in categories: cybercrime/malcode, neuroscience, robotics/AI, security

Very good read; and hints at something that I have been highlighting for a while around AI, NextGen transformation and adoption, etc. One very large brick wall that I highlighted in my latest posts around 5 areas that need to be address for AI to be adopted more broadly is Cyber Security.

If we do not get Cyber Security address soon around hackers, cloud, etc. AI (including robotics), brain interfaces, etc. will be either rejected or very limited in its adoption. It is just that simple.


What are CISO’s (Chief Information Security Officers) worrying about in 2016?

Continue reading “Clueless In Cyber-Security Land” »

Feb 14, 2016

North Korea Aims For Submarine-Launched Nuclear Missiles

Posted by in categories: military, security, space

This story crosses into the realm of satellite launchers and commercial space, but has troubling implications for international security. I personally am a bit more worried about North Korea’s ability to secure ballistic sub-launched weapons of mass destruction since I think that they offer more stealth than an ICBM silo, which we can fairly easily detect.


North Korea’s potential intercontinental ballistic missile (ICBM) threat may be stealing headlines, but the rogue state’s interest in submarine-launched nuclear weapons is arguably even more worrisome.

Read more

Feb 14, 2016

History: I know that we often write about the future, etc

Posted by in categories: education, food, habitats, security, sustainability

However, one also must look at the past for insights and guidance on things that were done wrong to ensure bad history is not repeated.

Therefore, let me share with you a part of history that we need to be aware of and protect our future from ever repeating again.

Many folks have never heard of Poor Farms in the South and Poor Houses in some parts of the Midwest. Before soc. Security and Welfare we had poor farms/ houses. They date from the late 1800s until 1930s.

Poor farms/ houses were often filled with the elderly and others that had no money or anyone to take care them. People often worked the land for 16+ hours days, dressed in rags, and had very little to eat. Once you were there you could not leave ever until you died.

Continue reading “History: I know that we often write about the future, etc” »

Feb 13, 2016

IoT Could Be Used by Spies, U.S. Intelligence Chief Says

Posted by in categories: business, electronics, habitats, internet, security

More Intel Concerns


James Clapper tells senators the vulnerabilities in connected devices that hackers exploit can also be used for surveillance by foreign countries.

As the Internet of things has grown, so has the debate about security around it.

Continue reading “IoT Could Be Used by Spies, U.S. Intelligence Chief Says” »

Feb 12, 2016

Yes, robots will steal our jobs — but don’t worry, we’ll get new ones

Posted by in categories: biotech/medical, business, economics, employment, ethics, neuroscience, robotics/AI, security

Again, I see too many gaps that will need to be address before AI can eliminate 70% of today’s jobs. Below, are the top 5 gaps that I have seen so far with AI in taking over many government, business, and corporate positions.

1) Emotion/ Empathy Gap — AI has not been designed with the sophistication to provide personable care such as you see with caregivers, medical specialists, etc.
2) Demographic Gap — until we have a more broader mix of the population engaged in AI’s design & development; AI will not meet the needs for critical mass adoption; only a subset of the population will find will connection in serving most of their needs.
3) Ehtics & Morale Code Gap — AI still cannot understand at a full cognitive level ethics & empathy to a degree that is required.
4) Trust and Compliance Gap — companies need to feel that their IP & privacy is protected; until this is corrected, AI will not be able to replace an entire back office and front office set of operations.
5) Security & Safety Gap — More safeguards are needed around AI to deal with hackers to ensure that information managed by AI is safe as well as ensure public saftey from any AI that becomes disruptive or hijacked to cause injury or worse to the public

Until these gaps are addressed; it will be very hard to eliminate many of today’s government, office/ business positions. The greater job loss will be in the lower skill areas like standard landscaping, some housekeeping, some less personable store clerk, some help desk/ call center operations, and some lite admin admin roles.

Continue reading “Yes, robots will steal our jobs — but don’t worry, we’ll get new ones” »