Page 4,315«..1020..4,3144,3154,3164,317..4,3204,330..»

Amazon Web Services (AWS) Bank On AI to Add New Servers Everyday – Dazeinfo

The advent of Machine Learning (ML) and Artificial Intelligence (AI) technology has helped companies to push the boundaries of their apps to a great extent. While most of the tech giants are leveraging on AI to make path-breaking solutions, Amazon Web Services (AWS) has employed AI technology to make their internal procurement process much more robust and effective.

In a recent interaction at Pacific Science Centers 14th Annual Foundation of Science Breakfast, Amazon Web Services (AWS) CEO Andy Jassay told that AWS is relying on AI to add the number of new servers required to meet the growing demand of cloud servers. He explained that artificial intelligence is playing a crucial role in anticipating the demand for its services. Not only it is helping AWS to meet the demand but also cutting down the cost of operations.

One of the least understood aspects of AWS is that its a giant logistics challenge, its a really hard business to operate, said Andy.

Considering the fact that adding servers is a time-consuming affair, by anticipating the accurate demand and keeping it deployed AWS is able to cater to direct consumers, partners and resellers.

Andy also told that, on daily basis, AWS is adding new servers to the network. This is clearly indicating at the scale AWS is growing.

The advancement in computing and exploded adoption of the Internet has spiked the demand for cloud servers. Companies are willing to keep their business on 24/7. Besides, their unprecedented interest in crunching accumulated data has created a demand for process specialised servers. Cloud-based Analytics Servers, Cache Servers etc. are high in demand.

The geographical demand for AWS is spreading across the world. The company is leaving no stone unturned to make the procurementprocess as easy as possible. Both, offline and onlinesales partners are selling AWS services, be it dedicated cloud server migration, reseller hosting, specialised cloud hosting or migrating & managing infrastructure on the cloud, round the clock. The AI-powered process help AWS to pick up signals its sales arm follow. Unlike consumer facing products, enterprise sales cycles are notoriously long and could end up straining the delivery mechanism.

Besides, tracking consumer behaviour on AWS has also helped the company understand the growing demand to a certain level.

Most of the customers start slow with AWS, and then accelerate their usage as they see more benefits, which could lead tospikes in demand if they move faster than anticipated, said Andy.

Therefore, Amazon uses a forecasting model powered with Machine Learning and artificial Intelligence that helps AWS to take capacity related decisions.

AWS is not only replying in AI for anticipating demand, its also leveraging on the technology to improve their support services. AI powered system is helping AWS to understand the maintain the capacity of components for its data centres,which are crucial during the time of any downtime.

More:
Amazon Web Services (AWS) Bank On AI to Add New Servers Everyday - Dazeinfo

Read More..

CrowdStrike Extends Falcon Platform with Enhanced Cloud and Data Center Coverage – CSO Australia

Company offers maximum protection and best-in-class performance for servers in all data centre deployment models

June 1, 2017 - CrowdStrike Inc., the leader in cloud-delivered endpoint protection, today announced, as part of its Spring release, new features of the CrowdStrike Falcon platform custom-built for cloud providers and modern data centres, providing best-in-class prevention, detection and response for Windows, Linux or macOS servers, powered by artificial intelligence/machine learning.

The servers used in the modern-day data centre are faced with commodity, as well as advanced stealthy attacks. CrowdStrike Falcon leverages its industry-leading artificial intelligence/machine learning as well as industry-leading Indicator-of-Attack (IoA) behavioral analysis to bring real-time protection to servers whether on-premise, virtualised or in the cloud. As data centre or cloud deployments grow or evolve, with CrowdStrike Falcon, customers are freed from having to add additional management servers or controllers for endpoint protection.

With Falcons lightweight agent, customers can quickly and easily add end-to-end protection with instant zero reboot deployments, no performance impact or signature updates - all of which improve the performance of business-critical servers. CrowdStrike Falcon enables management of all systems, irrespective of their location, from a single console providing a consolidated view into all assets for the enterprise.

CrowdStrike Falcon supports all major platforms including Amazon AWS, Google Cloud Platform and Microsoft Azure. It also provides protection for guest OS hosted on all popular hypervisors and protects Windows, Linux and macOS guests with a kernel-mode agent. CrowdStrike Falcon allows for complete protection policy control, with full flexibility around policy deployment at the individual server, group or cloud platform/data centre levels. Irrespective of how a server is deployed, the security team retains complete visibility and the control required to prevent or contain the attack.

New and Enhanced Capabilities

CrowdStrike Falcon provides features critical to securing data centres, focused on control, visibility and complete protection:

Linux Kernel-mode Agent Falcon Linux agent is now a full kernel-mode module, providing comprehensive real-time visibility from its high position in the kernel into key OS events. Amazon Linux Support Falcon Linux agent now fully supports Amazon Linux distribution, a popular platform on Amazon Web Services (AWS).

Falcon Discover Falcon Discovers asset, application and user account visibility features help to optimise workloads, manage costs and audit/remove unauthorised accounts of systems deployed in the cloud, data centres and on-premise.

Falcon Data Replicator Falcon Data Replicator provides real-time access to the raw event data stream, which customers can ingest into their local data lakes for correlation against event data collected from other systems. This opens up the full comprehensive dataset of more than 270 OS-level event types that Falcon Insight customers can now integrate into their own data analytics solutions.

AV-Comparatives has certified CrowdStrike Falcon for anti-malware and exploit protection and noted that Falcon can help organisations efforts with respect to PCI, HIPAA, NIST and FFIEC compliance.

For a while now, within our highly complex environment, managing high-value systems required a choice between maximum protection and maximum performance CrowdStrike has removed that dilemma, said Anton Reynaldo Bonifacio, chief information security officer, Globe Telecom. Adding best-in-class prevention, detection and response without increasing complexity has long been atop every CISOs wish list. CrowdStrike Falcon is lightning fast to deploy and manage, and doesnt slow down a single machine on-premise, in the cloud, or anything in between.

With this Spring release, we continue to advance the Falcon platform to ensure customers can protect all of their systems, whether physical, virtual or cloud-based, with reduced complexity and improved performance, said Dmitri Alperovitch, CrowdStrikes co-founder and chief technology officer. Many legacy AV solutions dont provide sufficient visibility to enable threat hunting and forensic use cases, they poorly protect non-Windows environments, and are cumbersome and sometimes risky to deploy to cloud or hybrid cloud-based data centres. CrowdStrike Falcon addresses all of these pain points and adds scalability, efficacy, and speed.

Recently named a Visionary in the 2017 Gartner Magic Quadrant for Endpoint Protection Platforms, CrowdStrike has set the new standard for endpoint security providing organisations with the only solution that can prevent, detect, respond and hunt for attacks via a single lightweight agent. The platform has achieved impressive success in the market replacing not only legacy AV solutions, but also a variety of next-generation AV point products. CrowdStrike Falcon has been independently tested and proven as an effective AV replacement, including verification from testing with AV-Comparatives and SE Labs.

View original post here:
CrowdStrike Extends Falcon Platform with Enhanced Cloud and Data Center Coverage - CSO Australia

Read More..

Defense contractor stored intelligence data in Amazon cloud unprotected – Ars Technica

Enlarge / NGA headquarters. A trove of top secret data processed by NGA contractor Booz Allen Hamilton was left exposed on a public Amazon cloud instance.

On May 24, Chris Vickery, a cyber risk analyst with the security firm UpGuard, discovered a publicly accessible data cache on Amazon Web Services' S3 storage service that contained highly classified intelligence data. The cache wasposted to an account linked to defense and intelligence contractorBooz Allen Hamilton. And the files within were connected to the US National Geospatial-Intelligence Agency (NGA), the US military's provider of battlefield satellite and drone surveillance imagery.

Based on domain-registration data tied to the servers linked to the S3 "bucket," the data was apparently tied to Booz Allen and another contractor, Metronome. Also present in the data cache wasa Booz Allen Hamilton engineer's remote login (SSH) keys andlogin credentials forat least one system in the company's data center.

[Update, 5:10 PM] UpGuard's post suggested the data may have been classified at up to the Top Secret level. A Booz-Allen spokesperson told Ars that the data was not connected to classified systems. However, the credentials included in the store could have provided access to more sensitive data, including code repositories.

In a statement, an NGA spokesperson said that no classified data had been disclosed by the security oversight and that the storage was "not directly connected to classified networks."

Upon finding the cache, Vickery immediately sent an e-mail to Booz Allen Hamilton's chief information security officer but received no response. The next morning, he contacted the NGA. Within nine minutes, access to the storage bucket was cut off.

"NGA takes the potential disclosure of sensitive but unclassified information seriously and immediately revoked the affected credentials," the NGA's spokesperson said in the official statement.

At 8pm ET on May 25, Booz Allen Hamilton's security team finally responded to Vickery and confirmed the breach.

Booz Allen Hamilton has suffered a number of stunning security lapses over the past few years. Most infamous, Edward Snowden was a Booz Allen contractor at the National Security Agency. But another Booz Allen Hamilton employee at the NSA, Hal Martin, was recently arrested for theft of sensitive data. Martin's cache even eclipsed Snowden's leaks in size.

NGA has used Amazon's cloud for a number of unclassified tasks. In 2015, NGA contracted Esri and Lockheed Martin to create a portal to unclassified geospatial intelligence based on Esri's ArcGIS geospatial information system using Amazon's commercial cloud. Amazon Web Services also offersGovCloud, an isolated "region" in AWS for handling sensitive government applications.

Go here to read the rest:
Defense contractor stored intelligence data in Amazon cloud unprotected - Ars Technica

Read More..

Seven reasons parents should care about kids and online privacy – Salon

If you dont want to have the bejesus scared out of you, dont talk to an expert on kids online privacy. If you knew what was really out there online predators, identity thieves, data miners youd lock up the internet and throw away the key.

The truth is, an ounce of prevention is worth a pound of cure. The internet is so woven into our lives, we need to be aware of the worst-case scenarios that can strike when were unprepared. Below are a few of those scary things that can and do happen. But with some eyes and ears to the ground, they are totally preventable.

Your kid could be spied on. Smart toys including My Friend Cayla, Hello Barbie, and CloudPets are designed to learn and grow with your kid. Cool, right? Unfortunately, many of these toys have privacy problems. As the 2015 data breach of Vtechs InnoTab Max uncovered, hackers specifically target kids because they offer clean credit histories and unused Social Security numbers that they can use for identity theft. These toys also collect a lot of information about your kid, and they arent always clear about when they do it and how they use it.

Your kid could get accused of a crime. Everyone has the right to privacy, especially in their own home. But home assistants such as Amazon Alexa, Google Home, and Mattel Aristotle are designed to butt their noses into conversations. These devices collect and store untold amounts of data. Its unclear what the companies do with the extraneous noise they pick up. And if its subpoenaed, they might have to hand it over. Say your kid jokes about terrorism or something else illegal; if theres an investigation into those activities, the companies might have to cough up the transcripts. In Arkansas, a prosecutor asked for a murder suspects Echo smart speaker in case its information could shed light on the crime. The suspect agreed to hand over the recordings, and Amazon was compelled to make them available.

Your kid could get hurt. With location-aware social media such as Twitter, Kik, and Facebook, kids can reveal their actual, physical locations to all their contacts plenty of whom they dont know personally. Imagine a selfie thats location-tagged and says, Bored, by myself, just hanging out looking for something fun to do.

Your kid could lose out on opportunities. Posting wild and crazy pics from prom 17 paints a picture for potential admissions counselors, hiring managers, and others whom teens want to impress. They may not care that your kid partied only that he showed poor judgment in posting compromising images.

Your kid could be sold short. Schools are increasingly using software from third-party providers to teach, diagnose potential learning issues, and interact with students. This software includes online learning lessons, standardized tests, and 1:1 device programs. And the companies that administer the programs are typically allowed to collect, store, and sell your kids performance records. Wondering about all those offers for supplemental reading classes youre receiving in the mail? Maybe your kid stumbled on her reading assessments and marketers are trying to sell you solutions. Curious why Harvard isnt trying to recruit your kid? Maybe they already decided shes not Ivy League material based on her middle school grades. (Learn about our Student Privacy Initiative.)

Your kid could be limited. As schools automate procedures, they create student records with sensitive and potentially damaging information. Under the Family Educational Rights and Privacy Act (FERPA), schools are allowed to share certain information without getting parents consents. That means that an individual education plan (IEP), attendance records, a disciplinary record, prescribed medication, or even a high body mass index could be disclosed and used to unfairly disqualify your kid from opportunities, such as advanced classes, government services, or special schools.

Your kid could be humiliated. Sharing fun stuff from your life with friends is fine. But oversharing is never a good idea. When kids post inappropriate material whether its a sexy selfie, an explicit photo session with a friend, an overly revealing rant, or cruel comments about others the results can be humiliating if those posts become public or shared widely.

Read more:
Seven reasons parents should care about kids and online privacy - Salon

Read More..

Will Commodification Hurt Amazon’s Cloud Computing Business? – Forbes


Forbes
Will Commodification Hurt Amazon's Cloud Computing Business?
Forbes
Will the profitability of AWS (Amazon Web Services) decrease over time (to near zero) because the service is basically a commodity? originally appeared on ...
AWS Expands VPS Service Amazon Lightsail to More RegionsWeb Host Industry Review
Amazon Web Services (AWS) Bank On AI to Add New Servers EverydayDazeinfo

all 5 news articles »

Original post:
Will Commodification Hurt Amazon's Cloud Computing Business? - Forbes

Read More..

In addressing internet security issues, make sure to provide solutions – Minneapolis Star Tribune


Minneapolis Star Tribune
In addressing internet security issues, make sure to provide solutions
Minneapolis Star Tribune
That said, I'm not convinced that apathy is the problem. In a 2015 survey, researchers at the National Telecommunications and Information Administration found that 84 percent of online households reported at least one internet security concern (the ...

Read the original post:
In addressing internet security issues, make sure to provide solutions - Minneapolis Star Tribune

Read More..

Internet infrastructure security guidelines for Africa unveiled – Premium Times

The Internet Society and the African Union Commission unveiled a new set of Internet Infrastructure Security Guidelines for Africa during the African Internet Summit, taking place in Nairobi 30 May-2 June. The guidelines will help Africa create a more secure Internet infrastructure and are set to change the way African Union States approach cyber security preparedness.

The guidelines the first of their kind in Africa were developed by a multi-stakeholder group of African and global internet infrastructure security experts, and are the first step towards building a more secure Internet in Africa. They will help AU member states strengthen the security of their local Internet infrastructure through actions at a regional, national, ISP/operator and organizational level.

Africas cyber security environment faces a unique combination of challenges, including a lack of awareness of the risks involved in using technology. Kenya was ranked the 69th most vulnerable country (out of 127) in the 2015 Deloitte Global Threat Index. Some of the main reasons are: low awareness, underinvestment, talent shortage and overload of data. Deloitte further estimates that Kenya lost $171 million to cybercrime in 2016.

Africa has achieved major strides in developing its Internet Infrastructure in the past decade. However, the Internet wont provide the aspired benefits unless we can trust it. We have seen from recent experiences that Africa is not immune from cyber-attacks and other security threats. These guidelines, developed in collaboration with the African Union Commission, will help African countries put in place the necessary measures to increase the security of their Internet infrastructure, explained Dawit Bekele, Africa Regional Bureau Director for the Internet Society.

This document is launched at a time when the world feels the real and urgent need to build and reinforce structures aimed at tackling the growing cyber threat to the global digital economy. Governments, companies, network operators, universities and organisations across African Union member states are encouraged to take action to implement the Internet Infrastructure Security Guidelines.

This is another timely milestone achievement given the new security challenges in cyberspace, said Moctar Yeday, Head, Information Society Division, African Union. The Commission of the African Union will continue its partnership with the Internet Society on a second set of guidelines addressing personal data protection in Africa, he added.

According to ITU ICT Facts and Figures 2016, it is estimated that 25.1 per cent of Africans are now online and despite lower Internet access rates vs. other regions in the world, there has been a sustained double-digit growth in Internet penetration over the past 10 years. This is due in large part to an increase of mobile Internet and in more affordable smart phones in the market and Africas young, technology-savvy population. However, to continue to improve access and connect the unconnected, people need to trust the Internet.

Symantec, a global leader in cyber security, observed 24 million malware incidents targeting Africa in 2016. As some malware incidents probably go unobserved, the real number of incidents may be much higher. In a 2013 report from Symantec, cybercrime was increasing at a faster rate in Africa than any other region.

As Internet penetration grows in Africa and more business takes place online, implementing security measures against malware incidents to protect Internet users becomes increasingly important.

Offering actions that are tailored to the African cyber security environment and solutions for an ever changing online landscape, the recommendations in the document launched today can play a key role in helping Africa respond to the kind of Internet attacks that recently paralyzed critical public and government services.

A copy of the Africa Internet Infrastructure Security Guidelines can be found at: http://www.InternetSociety.org/doc/aiisg.

View post:
Internet infrastructure security guidelines for Africa unveiled - Premium Times

Read More..

Security Best Practices for the Internet of Things – Web Host Industry Review

I recently spoke at the latest InteropITX conference on the topic of IoT and cloud security. At the beginning of the session I asked a fun and simple question: How many people in the room have two or more devices, right there with them, which can connect to the cloud? I then asked the same question, but for people who had three devices; and then four, and even five devices.

I was impressed by the number of people who still had their hands up with three devices in that room. The winner had five devices with them, including two phones, a laptop, an iPad, and an Apple Watch.

Are you really surprised? If you look around your own home and even workplace how many devices do you have right now which can connect to the Internet? I bet its quite a few.

As this all sinks in remember that we are living in a vastly connected world. The latest Cloud Index Report from Cisco said that cloud services are accelerated in part by the unprecedented amounts of data being generated by not only people but also machines and things. Cisco estimates that 600 ZB will be generated by all people, machines, and things by 2020, up from 145 ZB generated in 2015.

In the very near future well see almost everything become a connected entity where entire cities become smart hubs creating vast amounts of data.

During my session, I discussed, from a very simple perspective, that IoT consists of six key components. That is Compute, Connectivity, Security, Data and Analytics, Ecosystem, and Services.

Read more:TheFour Internet of Things Connectivity Types Explained

Almost every connected thing has these six components in one aspect or another. Think of an Apple Watch for example. It has a compute engine, it connects via Bluetooth, security is accomplished via a unique connection, it produces a vast amount of data which is then analyzed, your ecosystem is built on the Apple platform, and finally the watch delivers an array of services revolving around notifications, health, and more.

With this in mind lets look at each of these components and understand where security fits in.

In the near future well see an even larger influx of connected devices and the data they all produce. For your own use-cases, make sure to plan out the design, deployment, and utilization of your connected systems. Make sure youre clear on the components being used, where data is being transmitted/stored, and how these devices interact with your overall IT infrastructure.

Careful planning not only helps mitigate risk, it also helps you better utilize all of these connected things. And, in return, help you create even more value from the solution.

Originally posted here:
Security Best Practices for the Internet of Things - Web Host Industry Review

Read More..

New uses for RFID and security for the internet of things – Phys.Org

May 31, 2017 by Bernadette Esposito Sanjay Sarma. Credit: David Sella

On the 25th anniversary of the universal barcode in 1999, the barcode community gathered around Sanjay Sarma and his colleagues and said, "Let's do this."

"Our idea," says Sarma, vice president for open learning and the Fred Fort Flowers (1941) and Daniel Fort Flowers (1941) Professor of Mechanical Engineering at MIT, "was to track everything in the supply chain." Some companies knew they had too much inventory. Others didn't know where their inventory was. Consumers couldn't find the right sized shirt while that shirt was sitting in the back room. Food was going bad and shelves went un-stocked. Things got lost in the supply chain. So, Sarma, along with research scientist David Brock of MIT and Kevin Ashton, a visiting researcher from Proctor and Gamble, came up with a low-cost radio frequency identification (RFID) tag. "At the time, it was a crazy idea," says Sarma. "But it stuck."

RFID tags, which had been around for several decades, were clunky and expensivepartly because of the amount of data placed on the tags. "We used to say, 'Someday the internet will be everywhere'this was late 90sand we didn't have the word 'cloud' yet. So, we used to say, 'Someday, you can write the data in the sky,'" says Sarma, who developed new standards for RFID, new manufacturing processes, and innovative ways to use them in the supply chain. The supply chain industry adopted the protocol, and standards-making efforts shifted. Auto ID Labs laid the groundwork for the standardization of RFID technology. It took sensing of identitythe job of RFID and barcodesand made it universal. Auto ID Labs, where Sarma remains active today, emerged from the MIT Auto ID Center. "In many ways that effort also laid the groundwork for what is now called the internet of things," Sarma says.

Internet of things

"If you look at the world today, you may have a Nest Thermostat in your home; you may have an Amazon Echo in your home; if you're lucky enough to own a Tesla car, you can actually track your Tesla car over the internet. More appliances are becoming fundamentally internet-connected and intelligent in ways that make our lives safer, the world safer, help with climate change, help with saving costs, help with better health care," says Sarma. All of this comes from a network of objects embedded in intelligence that interact with the environment. That is called the internet of things.

"When we start connecting things," says Sarma, "we enable a level of resource management, a level of marshalling of the planet, of what the planet offers us. When we have little or no information on something, we over-compensate. We burn more electricity, more energy and we're doing more damage to the planet." He asserts that hundreds of rooms are consuming electricity they should not, that are heating when no one is there. If you knew that a person was still driving and that there's no need to turn the heat on, just imagine how much energy one could save and what impact this technology would have on the planet. "To me, saving the planet is sort of an existential question and we have an enormous amount of work to do to do that," Sarma explains.

Risks, norms, and rules

With any new technology, there are risks. The first and most fundamental one for the internet of things is privacy. "If I have a Nest Thermostat in my house, I can turn the heating off when I'm not at home. If I forget to turn off the heat when I go on vacation, it can detect that I'm away and turn itself off." The flipside is that it can tell the wrong person you're not there, thereby increasing the risk of theft and burglary. A sort of extreme version of that, he explains, is a malicious party claiming control of a nuclear power plant. This is the great fear of the internet of things: Many people are adopting it and they're moving fast, but they're not thinking about security, and that is a recipe for disaster. "My research deals with balancing the two," Sarma says.

In any system with an agreed-upon architecture and with easy-to-understand methods, safeguards and security can be built into the system. "Imagine if you were concerned about safety on the roadsand we did have those worries a hundred years ago," says Sarma. Over time, certain standards are implemented. "In the U.S. we drive on the right side of the road; we have traffic lights; we have stop signs; we have behavioral norms. If a parent and a child want to cross the street at a crosswalk, traffic stops. If a school bus in front of you flashes its lights, you stop. These behavioral normsthese standardshelp recognize when something goes awry." Sarma explains that if one of these behavioral norms is broken, one can deduce that the driver's eyesight isn't good, or that they weren't paying attention, or maybe they were texting, or maybe that person is malicious.

The problem with the internet of things is that within this newly established world, there are few norms. When different people implement it in their own way, it's very hard to detect malice, he says. It's also hard to put together a protection. Unlike the road systems, in which there are police cars and cameras, "we don't have any of those. The internet of things is the wild west. My own research is directed toward establishing those norms and rules, so that at least you have some orderliness, so the remnant disorderliness stands out and can be detected."

Avatar

One protection Sarma and his team are promoting is something called the avatar, a cloud-things concept. "The basic idea we're saying is don't have Object A talk to Object B, have Object A talk to its cloud avatar of itself. Have Object B talk to its Cloud Avatar of itself. Then, have the Avatars talk to each other." The reason it works is because physical connections between A and B are many. "If you just say, the real object only talks to its avatar and the avatars talk to each other, we can bring to bear all the stuff we know from the WorldWideWeb, etc. That's a clean way to look at the future of the internet of things and, strangely enough, that's what Tesla does, that's what Nest does, but unfortunately implementations are a little bit all over the place," he says.

"The internet of things will go through its ups and downs, but when we look back on our lives in 10 years, pretty much anything you do you'll back on a day when it wasn't connected and you'll sort of wonder how life was then."

Explore further: Envisioning a future quantum internet

This story is republished courtesy of MIT News (web.mit.edu/newsoffice/), a popular site that covers news about MIT research, innovation and teaching.

The quantum internet, which connects particles linked together by the principle of quantum entanglement, is like the early days of the classical internet no one can yet imagine what uses it could have, according to Professor ...

In 2007, Google unleashed a fleet of cars with roof-mounted cameras to provide street-level images of roads around the world. Now MIT spinout Essess is bringing similar "drive-by" innovations to energy efficiency in homes ...

In 2000, five MIT Media Lab alumni co-founded ThingMagic to help bring radio-frequency identification (RFID) technologywireless readers and data-transmitting tagsto the supply chain. This meant companies would be able ...

Epilepsy affects 50 million people worldwide, but in a third of these cases, medication cannot keep seizures from occurring. One solution is to shoot a short pulse of electricity to the brain to stamp out the seizure just ...

The Internet of Things may be in its early stages but it's evolving rapidly - and experiencing some difficult growing pains.

The world should consider ways to limit data growth on the internet to prevent run-away energy consumption and help limit carbon emissions, say leading computer scientists.

Nest Labs is adding Google's facial recognition technology to a high-resolution home-security camera, offering a glimpse of a future in which increasingly intelligent, internet-connected computers can see and understand what's ...

A creator of the Android software powering most of the world's smartphones stepped into the competitive hardware market on Tuesday with a new handset called Essential.

Delivering packages with drones can reduce carbon dioxide emissions in certain circumstances as compared to truck deliveries, a new study from University of Washington transportation engineers finds.

A new interactive design tool developed by Carnegie Mellon University's Robotics Institute enables both novices and experts to build customized legged or wheeled robots using 3D-printed components and off-the-shelf actuators.

Apple is reportedly working on a chip called the Apple Neural Engine, which would be dedicated to carrying out artificial intelligence (AI) processing on its mobile devices.

A chess-playing robot stole the show as Asia's largest tech fair kicked off in Taiwan Tuesday with artificial intelligence centre stage.

Please sign in to add a comment. Registration is free, and takes less than a minute. Read more

Read more:
New uses for RFID and security for the internet of things - Phys.Org

Read More..

Windows 10 tip: Use BitLocker to encrypt your system drive – ZDNet

BitLocker requires a TPM version 1.2 or later for a standard configuration.

Most modern business-class PCs that were designed for Windows 10 support BitLocker Drive Encryption. With BitLocker encryption turned on for the system drive, an attacker who steals your device but doesn't have your sign-in credentials is completely locked out of your data.

The requirements for BitLocker Drive Encryption are fairly simple. Your hardware must include a Trusted Platform Module (TPM) chip, version 1.2 or later, and you must be running a business edition of Windows 10: Pro, Enterprise, or Education. (It's possible to enable BitLocker without a TPM, using a USB flash drive to store the encryption key, but I don't recommend it.)

To see whether your PC has a TPM chip (and, if so, which version), follow these steps:

If that seems like too much work, just run the BitLocker Encryption Wizard, which includes its own compatibility checker.

Open File Explorer, click This PC, right-click the icon for your system drive (usually drive C), and then click Turn on BitLocker. If your system doesn't meet the specifications, you'll get an error message. If everything's clear, you can follow the wizard's prompts to save your recovery key and begin the encryption process.

Previous tip: Create direct shortcuts to shared network folders

Next week: Another Windows 10 tip from Ed Bott

Read the original here:
Windows 10 tip: Use BitLocker to encrypt your system drive - ZDNet

Read More..