Menu

Blog

Archive for the ‘business’ category: Page 281

Feb 18, 2016

Welcome to Major Mouse Testing Project

Posted by in categories: biotech/medical, business, life extension

The MMTP needs your support!

Have you ever considered your destiny may depend upon, you personally? And beyond that, have you considered the destiny of many others may depend upon your actions? People who have changed the world, didn’t have any doubts that the future depended on their actions. Scientists, businessmen and famous public figures didn’t wait until someone did something important for the world. They took responsibility for what was happening around and acted, despite all the difficulties. Are you ready to become such a person? Maybe you too have always wanted to make a significant difference, but didn’t know where to begin? So spend a moment to read the information below.

Today there is a unique project being prepared by a group of scientists, activists and other like minded people from many countries. A project which will give us the opportunity to rescue millions of people from future suffering. The project brings the fight against aging to a global level. Each day people suffer and die from the many diseases associated with aging. Researchers worldwide are engaged in a valiant effort to save countless lives in the near future.

Continue reading “Welcome to Major Mouse Testing Project” »

Feb 17, 2016

Virtual extortion a big business for cyber criminals

Posted by in categories: business, cybercrime/malcode, robotics/AI, transportation

And, this is only going to get worse with the newer AI technology until we can get a handle on hacking and tracking of AI such as bots and cars.


Virtual extortion is causing havoc as cyber criminals target companies of all sizes for ransom, according to the FBI. Here’s what needs to be done.

Read more

Feb 17, 2016

Cyber extortionists zap computers at Hollywood hospital

Posted by in categories: biotech/medical, bitcoin, business, computing, law

Criminal’s favorite new tool for extortion.


Hollywood Presbyterian Medical Center was the target of a ransomware extortion plot in which hackers seized control of the hospital’s computer systems and then demanded that directors pay in bitcoin to regain access, according to law enforcement sources.

Ransomware attacks on business data systems are becoming an increasingly common form of cyber crime. The assault on Hollywood Presbyterian computers occurred Feb. 5, when hackers prevented hospital staff from accessing patient information, according to law enforcement sources, who were not authorized to discuss the details of the investigation. The hackers then demanded an unspecified sum of computer currency.

Read more

Feb 17, 2016

Apple CEO Tim Cook’s Dangerous Game

Posted by in categories: business, computing, mobile phones, robotics/AI, security, transportation

Government and tech + telecom & ISPs need to come to an agreement in how to ensure innocent people’s privacy are respected. When a person murders, stalk, threaten, kidnap, and/ or assault a person then we have a responsibility first to protect the innocent public. And, with the resistance being displayed by Apple, are we running the risk of further alienating the consumers and business customers more when it comes to releasing AI like robots, self driving cars, etc. onto the public where criminals can buy AI technology and use it to hurt others?

We really need to be addressing these issues soon.


Tim Cook is playing a dangerous game of brinkmanship with the U.S. government. In the process, he may set in motion political and judicial processes that will endanger the security of all our mobile devices.

Continue reading “Apple CEO Tim Cook’s Dangerous Game” »

Feb 17, 2016

Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising

Posted by in categories: business, cybercrime/malcode, ethics, robotics/AI, security

The bottom line is robots are machines; and like any other machine, a robot system can be (with the right expertise) reprogram. And, a connected robot to the net, etc. poses a risk as long as hackers poses a risk in the current Cyber environment. Again, I encourage government, tech companies, and businesses work collectively together in addressing the immediate challenge around Cyber Security.

And, there will need to be some way to also track robots & deactivate them remotely especially when the public are allowed to buy them (including criminals).


“We believe story comprehension in robots can eliminate psychotic-appearing behavior and reinforce choices that won’t harm humans and still achieve the intended goal”.

Continue reading “Researchers are Using Fairy Tales to Prevent a ‘Psychotic’ Robot Uprising” »

Feb 17, 2016

The Good News From Google: A Conversation With Ruth Porat | Foreign Affairs

Posted by in categories: business, innovation, internet

rtx23c5n

“Ruth Porat has taken an unusual path to the tech world. Before becoming the chief financial officer at Google in May 2015 (and then at Alphabet, Google’s new parent company, a few months later), she held the same post at Morgan Stanley, where among other roles she worked closely with the U.S. government to sort out the troubles at the insurance corporation AIG and the mortgage-financing agencies Fannie Mae and Freddie Mac during the 2008 financial crisis.”

Read more

Feb 16, 2016

EU managers need to up cyber security collaboration, study finds

Posted by in categories: business, cybercrime/malcode, security

The lack of collaboration on cyber security between the senior levels of business is leaving UK firms exposed to fines and reputational damage, a study has revealed.

One in 10 C-level respondents to a survey by Palo Alto Networks said they “kind of” understand what defines an online security risk, but admitted they “still have to use Google to help explain it”.

This finding suggests that the lack of consensus on where the responsibility for cyber security lies could stem from some lack of cyber security understanding at the leadership level.

Read more

Feb 16, 2016

How Drones Are Reshaping The World

Posted by in categories: business, drones

The real question waiting to be address is how do we manage the technology to keep people safe without restricting businesses and technology progress efforts to make people’s lives better.


We look at how drones are revolutionizing the skies, and how this technology has so quickly moved from science fiction to ubiquitous reality. Airs in place of Insight on Monday, Feb 15 at 9 a.m. and 7 p.m.

Read more

Feb 16, 2016

Online security? Just let me Google that, say puzzled bosses

Posted by in categories: business, cybercrime/malcode, economics, robotics/AI, security

Although this article highlights the lack of awareness by some CEOs and board members on all things around Cyber Security; I do see a larger gap and risk. I do believe if a fully funded and dedicated joint task force effort among Silicon Valley, US Government, and Wall Street are not in place tackling this jointly to help the country and economy to diffuse this situation within the next 14 to 18 months that AI could fail in its delivery due to public’s concerns around trust and security.

Therefore, tech spent millions if not billions on new AI technology that businesses and consumers see no value in due to risks.


Some board executives still need help from a search engine to explain cyber security issues, warns report.

Read more

Feb 15, 2016

New HIPAA Guidance For Mobile Apps, Health Info Exchange

Posted by in categories: biotech/medical, business, health, mobile phones, robotics/AI, security

I was waiting for this HIPAA’s new guidelines for mobile apps (focuses a lot on IAM); this is only the first wave. We will see more when more AI is launched.


Federal regulators have issued new guidance, including material to clarify for healthcare entities and software developers various scenarios where HIPAA regulations might apply to mobile health applications, including situations when patients use smartphones to collect or transmit personal health data.

See Also: 2015 Breach Preparedness and Response Study: The Results

Continue reading “New HIPAA Guidance For Mobile Apps, Health Info Exchange” »