Welcome Guest | Sign In
TechNewsWorld.com
UK Home Secretary: Apps Shouldn't Serve as Terrorist Hiding Places
March 27, 2017
UK Home Secretary Amber Rudd on Sunday called for greater government access to encrypted content on mobile apps. Apps with end-to-end encryption, like Facebook's WhatsApp, should not be allowed to conceal terrorists' communications from law enforcement, Rudd said in a television interview. "There should be no place for terrorists to hide," she said.
Competition and Regulation Threaten Sharing Economy Markets
March 27, 2017
Eighty-three percent of U.S. broadband households, or more than 250 million consumers, own and use a smartphone. A recent beneficiary to this mass adoption has been the sharing economy phenomenon, which includes sharing apps such as Uber, Lyft and Airbnb. These business models are augmented by real-time data including location, instant gratification, on-demand pricing, and easy payment options.
Don't Let the Next Catastrophic Phishing Scandal End Your Career
March 27, 2017
What I think is amazing about all of the massive data breaches we hear about is that we know most are not reported. For every email, customer record, or financial theft in the news, there likely are hundreds that remain in the shadows. Yet another incident came to light last week. A clever Lithuanian individual was able to pull a whopping $100 million from a bunch of unnamed Internet companies.
Consumer Advocates Bemoan Senate Vote to Lift ISP Privacy Restrictions
March 25, 2017
Privacy advocates and consumer groups are fighting back against the U.S. Senate's Thursday vote to undo privacy restrictions on Internet service providers. In a 50-48 party line vote, the Senate approved the Congressional Review Act, S.J. Res. 34. If the House of Representatives gives it the green light, it then will go to the president to be signed into law.
Trust: Why Financial Services Should Embrace DoL's Fiduciary Rule
March 24, 2017
When the Department of Labor issued its fiduciary rule last year, it set financial advisers, insurers and agents into a mad scramble to meet an implementation deadline. The rule elevates all financial professionals who work with retirement plans or provide retirement planning advice to the level of a fiduciary, or someone bound legally and ethically to meet the standards of that status.
Advertisers Flee YouTube Over Offensive Ad Placements
March 23, 2017
Several top U.S. advertisers -- including AT&T, Verizon and Johnson & Johnson -- this week pulled out of their agreements with YouTube due to their ads appearing with videos advocating extremism, or with other offensive content. Such placements represent violations of their agreements with Google. "We are deeply concerned that our ads may have appeared alongside YouTube content promoting terrorism and hate," AT&T said.
WikiLeaks Exposes CIA's Device Surveillance Tricks
March 23, 2017
WikiLeaks has released more Vault 7 documentation online, including details about several CIA projects to infect Apple's Mac computer firmware and operating system. The site unloaded its first batch of stolen Vault 7 data earlier this month. The CIA's Embedded Development Branch developed malware that could persist even if the targeted computer were reformatted and its OS were reinstalled.
Blockchain: CRM's Next Frontier
March 22, 2017
We've seen a parade of technologies coming into the front office since 2000, including browser-based cloud computing, social media, mobile technology, workflow, journey mapping, and big data and analytics. It's typical that at first there's only a tenuous relationship between the technology and CRM's original mission, but over a short time innovators adopt and commercialize the innovation.
Intelligence-Driven Supply Chain Resilience
March 20, 2017
Information security practices are undergoing a transformation. For at least a decade, environments have been becoming less perimeter-centric: Gone are the good old days when in-line controls protected the trusted, safe interior from the "wild west" of the outside. As environments become more complex and externalized, the traditional "perimeter" loses meaning.
Verizon Wakes Up to Join Mobile TV Race
March 17, 2017
Following decades of slow movement due to cable companies facing no competition, the television world is changing rapidly. Lots of challengers have arisen in the pay-TV space in recent years. One of the latest comes from Verizon, which has improved its FiOS mobile app to offer data-free streaming. AT&T's DirecTV started this ball rolling with its wireless TV, or mobile TV, offering.
Pro-Turkey Hackers Hit Prominent Twitter Accounts
March 16, 2017
Hundreds, if not thousands, of Twitter users, many of them high-profile, were hacked Tuesday by someone who appeared to support Turkey in its diplomatic row with the Netherlands. Their accounts displayed a Swastika -- reversed to face to the right -- as well as the Turkish flag and hashtags to the Nazialmanya and Nazihollanda accounts, which displayed comments on the attack.
US Charges 2 Russian Intel Agents, 2 Hackers in Yahoo Case
March 16, 2017
The Justice Department has announced charges against four individuals, including two officers of Russia's FSB, for carrying out a massive cyberbreach that affected about 500 million Yahoo account holders. A federal grand jury in Northern California charged the defendants -- the FSB officials and two Russian cybercriminals -- with using stolen data to gain illegal access to numerous accounts.
Analytics and Workflow
March 15, 2017
There's a big difference between B2C and B2B analytics that no vendors seem to be addressing, and it involves the consumption model. I recently spoke with K.V. Rao, founder and chief strategy officer of Aviso, an analytics company focused on sales, and his unabashed opinion is that "if you're trying to expose insights and make things consumable, you have to address workflow."
Gadget Ogling: Note-Taker Triumphs, Classic Nokia Returns, and Audio Thrills
March 14, 2017
Transcribing speech is tedious, but until voice recognition truly can handle all manner of accents and verbal tics, it's a necessary evil. Hands up, everyone who thinks I wouldn't want a machine to take care of that for me. No one? Good. Titan Note records and transcribes audio, with a particular trick up its sleeve: It can discern different speakers when it's transcribing.
Donald Trump Should Channel Steve Jobs on Security
March 13, 2017
We saw yet another government breach last week, and more secrets went out to WikiLeaks. I'm of a mixed mind on this one, because the CIA tools disclosed likely were emulated by others, and WikiLeaks is helping consumer technology companies ensure they no longer work. I don't know about you, but I really don't want any organization spying on me -- not even my own government.
Tech Companies Weigh Responses to WikiLeaks Exposure
March 11, 2017
Following WikiLeaks' publication earlier this week of classified documents stolen from the CIA, major technology companies, including Apple, Samsung, Microsoft and Cisco, have been scrambling to assess the risks posed to their customers by the revelations. The so-called "Vault 7" leak includes information about methods and tools the CIA crafted to hack into products produced by those companies.
Despite Intense Scrutiny, Uber Lays Another Egg
March 10, 2017
Already under the microscope for claims of sexual harassment and questionable labor practices, Uber this week said it would ban the use of a controversial technology to block regulatory authorities from monitoring its operations. The company's "greyballing" technology is designed to hide the standard city app view in specific cases -- for example, from former riders blocked for being abusive.
What Do the Academy Awards, AWS and AI Have in Common?
March 10, 2017
As the tug of war between humans and machines escalates, we've become witnesses on nearly a daily basis to events that suggest there won't be an ultimate winner or loser in this existential battle for survival and supremacy. Just take two little human mistakes that recently received worldwide attention because of the power of today's technology to magnify their impacts on a global scale.
Salesforce FY18 Kickoff
March 9, 2017
Salesforce CEO Marc Benioff invited a select group of press, analysts and customers to a fiscal year kickoff presentation overlooking San Francisco and environs. It was held on the 23rd floor of one building that the company monopolizes, just across Mission Street from another that it is building and the bay beyond. It's a nice view. Salesforce starts its year in March.
Online Trust Alliance Launches IoT Security Campaign
March 8, 2017
The Online Trust Alliance is calling on businesses, consumers and government to share responsibility for ensuring that Internet of Things devices are not weaponized, outlining actions that businesses, consumers and government can take to ensure the security and privacy of IoT devices. It calls for a campaign to have retailers and consumers reject IoT products that pose a security threat.
WikiLeaks Dumps CIA Hacking Docs Online
March 8, 2017
WikiLeaks on Tuesday dumped thousands of classified documents onto the Internet, exposing hacking programs used by the CIA. The torrent of data is just the first in a series of dumps WikLeaks is calling "Vault 7." This first installment includes 8,761 documents and files stolen from an isolated high-security network within the CIA's Center for Cyber Intelligence in Langley, Virginia.
IBM's Quantum Leap Could Redefine 'Magic'
March 6, 2017
No, I'm not talking about that Quantum Leap. IBM just made a really interesting announcement in that it is enhancing its online quantum computer systems with a new API and improving its simulator so it can handle 20 qubits. Listening to the prebriefing was a bit like pretending I was Penny trying to understand Sheldon Cooper on Big Bang Theory.
GIT CEO Adriana Gascoigne: More Women in Tech Means More Problems Solved
March 3, 2017
Prior to founding Girls in Tech, Adriana Gascoigne was one of very few women working at a startup. "I'd look around the room every day and see that there was a huge problem of representation. I knew we needed to change the culture of the company to recruit more women and benefit more women, but we also needed diversity in product development ... to make a better product," she recalled.
FCC Reverses Course on Internet Privacy Rules
March 2, 2017
The Federal Communications Commission and the Federal Trade Commission on Tuesday issued a joint statement following the FCC's temporary stay of data security regulations. FCC Chairman Ajit Pai and FTC Acting Chairman Maureen K. Ohlhausen issued the statement to address the FCC's decision, in essence, to overturn rules designed to bolster broadband consumer privacy.
Time to Get Serious About IoT Cybersecurity
March 2, 2017
Both companies and individuals will have incredible opportunities ahead with the Internet of Things. IoT is starting to combine with AI, cloud-based services, and many other new segments, creating a very fertile growing field. However, it also poses a growing threat for security. A secure IoT framework does not yet exist. That's where the new IoT Cybersecurity Alliance comes into play.
Twitter Adds Heft to Anti-Harassment Toolbox
March 2, 2017
Twitter on Wednesday announced that over the next few months it will roll out changes designed to increase the safety of users, including the following: Its algorithms will help identify accounts as they engage in abusive behavior, so the burden no longer will be on victims to report it; and users will be able to restrict their tweets to followers for a set amount of time.
New Rules
March 1, 2017
One of the foundational ideas of business is the Pareto analysis, which tries to identify the small portion of factors that are responsible for the majority of business results. You know -- 80 percent of profits come from 20 percent of the customer base, and similar observations. Vilfredo Pareto formulated a business classic that we now refer to simply as "the 80/20 rule."
USB-C Port, Curved Display Top Latest iPhone Rumor List
March 1, 2017
Apple poked a hornet's nest when it removed the standard headphone jack from the iPhone 7. It may do it again by replacing the Lightning port with USB-C in the next iPhone. The Lightning port, introduced in 2012, is used to charge and connect accessories to the iPhone, but Apple reportedly plans to swap it for USB-C, which the company has been introducing into its computer lines.
How Deeply Could Bribery Scandal Wound Samsung?
February 28, 2017
South Korean prosecutors on Tuesday indicted Samsung head Lee Jae-yong and four other executives on bribery and embezzlement charges, following a lengthy investigation into Lee's ties with impeached president Park Geun-hye and her confidant, Choi Soon-sil. Charges against Lee, vice chairman of Samsung Group, include pledging bribes to organizations tied to Choi.
Google's Jigsaw Launches Troll-Thwarting API
February 27, 2017
A new tool is available to check the persistent harassment of online trolls. Google's Jigsaw think tank last week launched Perspective, an early stage technology that uses machine learning to help neutralize trolls. Perspective reviews comments and scores them based on their similarity to comments people have labeled as toxic, or that are likely to result in someone leaving a conversation.
See More Articles in Trends Section >>
Facebook Twitter LinkedIn Google+ RSS
What's most likely to cost a company your customer loyalty?
a major product fail
major unethical corporate behavior
public advocacy of social or political views I oppose
a really bad customer service experience
stagnation -- I'm attracted to innovation
none of the above -- I'll stick through thick and thin