education security

Education is top target for cyberattacks

The education sector has become one of the most sought after targets for cybercriminals, according to the latest report from Malwarebytes Labs. In the first half of 2019, the top three largest categories of threats identified among education institutions' devices are adware (43 percent), Trojans
/
Wired

Facebook’s Voice Transcripts Were More Invasive Than Amazon’s – WIRED

The tail end of the Defcon hacking conference this week saw a remote car-start dongle and app that could have been hacked to steal cars, along with a drone hacking a smart TV. Oh, also, researchers have found a way to decrypt ubiquitous GSM calls.
/

World is not an iPhone, iPad, iWatch…

World is not an iPhone, iPad, iWatch…

The world changed its direction a dozen years ago when Steve Jobs introduced a revolutionary new product to the world: the first Apple iPhone. And, today, the plummeting sales, plateauing of innovation and saturation of the market is perhaps a signal for us to re-evaluate or even course correct our direction.

The quest to bring computers to people,’ rather than people to computers” resulted in the invention of Personal Computer. The mainframe was the wrong direction. But shortly after the ‘user interface’ of Personal Computer was seen as a problem. Steve Job’s obsession with ‘perfect’ design led to some of the most significant innovations providing spectacular designs. iPod, the iPhone, the iPad, the iWatch. All of them beautifully designed, easy-to-use, and certainly a great user experience — the usage spread.

“We started out to get a computer in the hands of everyday people, and we succeeded beyond our wildest dreams.”-Steve Jobs

The smartphones give us increased control of the material environment.  They illuminate the interactions of our physiological and psychological functions. We are more productive and communicative than we have ever been, giving the promise of an improved life and here we are… enslaved by our phones. Constantly reacting to every push, prompt, notification and message that comes our way.  We are dealing with an onslaught of messaging apps, work emails that reach us after hours and media than we can ever consume. We are experiencing higher levels of anxiety than we have ever seen before.

“Of what lasting benefit has been man’s use of science and of the new instruments which his research brought into existence?” wrote Vannevar Bush in 1945 (” As We May Think“)

The question asked in 1945 becomes meaningful again. Is this what we want? It would be a brave man who could predict that we will always be enslaved to such mobile devices. I think not.

The idea of a “personal,” “smartphone” or “tablet” is a misplaced idea. I think technology has to blend in the background completely like the way Mark Weiser envisioned. His paper ‘The Computer for the 21st Century” from 1991 is a must read.

There should be no need to have “Alexa, do this.” In fact, if there is an “Alexa,” it should do it for me. This is the promise of the internet of things, seamless connectivity, the computing power and the artificial intelligence that can be blended in the environment — all things talking to all things. Exchange of data or shall I say useful conversations and then ‘intelligence’ creating anticipatory systems— systems that can anticipate the users’ desires without conscious mediation.

I want to be in a world where I do not have to do conscious interaction with any device and yet it all works for me.

To refer to Mark Weiser’s example:

Sal awakens; she smells coffee. 

A few minutes ago her alarm clock, alerted by her restless rolling before waking, had decided to start brewing “Coffee?” and ring alarm as Sal has to drop her kid to school early today. Sal had forgotten even to set up the alarm.

“We need to be in a world where the computers should not be owned by people, but rather should vanish into the background framework. Mark Weiser wrote in 1991

The future is not the StarTrek ubiquitous voice computer, the smallest or smartest phone that I can use, or fancy UI on the wall.  All of these concepts share a basic flaw: the computer is the center of attention.  I do not want Alexa, Google Home or iPhone to act when I ask. I do think that research on phones, chatbots, speech recognition, and so on is important; but perhaps, now is the time to look at the detour we took in the form of the smartphone. A world where the computers should not be owned by people, but instead should disappear into the environment.

I believe we could use a lot more attention to building a new relationship between the man and information technology.  Not so much good UX, but no UX at all.

By Ajay Malak

Ajay Malik

Ex-Google, Ajay Malik is CTO of Lunera and building a fog cloud by embedding a compute platform within end cap of bulbs and tube lights. With over 25 years of executive engineering leadership and entrepreneurial experience in delivering award-winning innovative products, Ajay joined Lunera from Google, where he was head of architecture and engineering for the worldwide corporate networking business. Prior to Google, Ajay was senior vice president of engineering and products at Meru Networks where he led the transformation of the company's technology resulting in its acquisition by Fortinet. Ajay has also held executive leadership positions at Hewlett-Packard, Cisco, and Motorola. Ajay has 80+ patents pending/approved. Ajay is the author of "RTLS for Dummies" and "Artificial Intelligence for Wireless Networking."

View Website
Do Not Rely On Passwords To Protect Your Online Information

Do Not Rely On Passwords To Protect Your Online Information

Protect Your Online Information Simple passwords are no longer safe to use online. John Barco, vice president of Global Product Marketing at ForgeRock, explains why ...
Cloud Pricing Models Article

The Economics, Concepts and Fundamentals of Cloud Computing

Fundamentals of Cloud Computing Addressing security concerns of the Public Cloud Enthusiasm for cloud computing has as much to do with economics as technology. Growth ...
Survey results reveal the biggest Artificial Intelligence challenges

Survey results reveal the biggest Artificial Intelligence challenges

Biggest Artificial Intelligence Challenges We’ve been told countless times over the past few years what an impact Artificial Intelligence (AI) is going to have on ...
On-Premise VoIP vs PBX Services

On-Premise VoIP vs PBX Services

VoIP vs PBX Services The jargon in the business phone system industry is enough to make even the most tech-savvy entrepreneur’s head spin. However, if ...
ZDnet

700,000 Choice Hotels records leaked in data breach, ransom demanded

/
Researchers found the unsecured database, but hackers got there first 700,000 records belonging to Choice Hotels have reportedly been stolen with hackers demanding payment for their return. Comparitech, in collaboration ...
MIT tech review

MIT – Facebook paid people to listen to voice recordings, too

/
It’s the fifth big tech company forced to admit to the practice this year. The news: Facebook paid contractors to listen to, and transcribe, audio clips generated by people using its ...
Breached Data

New Data Breach Has Exposed Millions Of Fingerprint And Facial Recognition Records: Report

/
It has been coming for some time, but now the major breach of a biometric database has actually been reported—facial recognition records, fingerprints, log data and personal information has all ...