The growing popularity of IoT has spawned the debate on privacy once again.
Last year, Samsung stoked controversy by warning customers that their Smart
TV Voice Recognition system was capable of “listening” to personal and
sensitive information spoken by customers. Not only this, all of this
intercepted information is transmitted over a non-encrypted connection to be
stored in a third party server.
Although the company was quick to change its policy wordings and issue
clarification, Samsung is hardly the only one. ‘Hello Barbie’, a WiFi
connected doll from Mattel intercepts children’s conversations which is
then processed over a third party server to analyze the child’s likes and
dislikes. Nest Cam, a security camera made by Google-owned Nest Labs, comes
with a feature to track “unusual noise” such as those of an intruder -
this is made possible by intercepting and... (more)
In the business world, it's hard to throw a rock without hitting a compliance
requirement. All must be obeyed, but some call for a high level of control
and auditability. Governing bodies are exerting their authority like never
before, increasing the number of auditors and handing out heavy fines -
sometimes as much as $1 million.
This has become the new norm, and it isn't likely to turn around any time
soon. It's important, then, to be aware of the primary threats that could
undermine compliance efforts. The top three such issues are discussed below.
The Challenges of SOX
2020 seems to be an important milestone for the Internet of Things. That’s
the year that Cisco says there will be 50 billion connected devices and also
the year Gartner notes that over 50% of major new business processes and
systems will incorporate some element of the Internet of Things.
That’s the good news.
A recent Symantec Internet Security Threat Report says there are 25 connected
devices per 100 inhabitants in the US. Minimum 25 entry points to your
personal information, not counting your front door, personal computers,
compromised ATMs and other data sources. As your con... (more)
A few years ago, those little iHome alarm clocks started to appear in hotel
rooms. Cool gadgets that you could mount your mobile phone to battery charge
or play the music on the device. We also had a few in our home. They worked
perfectly for the iPhone 4 since the connector was that 1 inch protruding
plug. When I got the iPhone6, those clocks instantly became useless.
Obsolete. At least the phone connector part lost its value.
I’ve been thinking about this for a while.
The rate of obsolescence. The state when an object, technology, service or
practice is no longer needed or wan... (more)
SYS-CON Events announced today that StarNet Communications will exhibit at
the 19th International Cloud Expo, which will take place on November 1-3,
2016, at the Santa Clara Convention Center in Santa Clara, CA.
StarNet Communications' FastX is the industry first cloud-based remote X
Windows emulator. Using standard Web browsers (FireFox, Chrome, Safari, etc.)
users from around the world gain highly secure access to applications and
data hosted on Linux-based servers in a central data center.
Now your company's field offices and customers can access data and graphics
Secure Media Access on the Cloud Using Shared Access Signatures
Enterprises have forever faced challenges surrounding the sharing of their
intellectual property. Emerging cloud adoption has made it more compelling
for enterprises to digitize their content, making them available over a wide
variety of devices across the Internet.
In his session at 19th Cloud Expo, Santosh Ahuja, Director of Architecture at
Impiger Technologies, will introduce various mechanisms provided by cloud
service providers today to manage and share digital content in a secure
Santosh A... (more)