Skip to main content

Home/ CSIA 459/ Group items tagged Emerging

Rss Feed Group items tagged

Gilbert Rivera

Emerging Technologies are Changing the IT Job Market - 0 views

  •  
    This article is pretty interesting. It is about how emerging technologies are changing the IT job market. With the emergence of technologies such as: the world of SDN, Converged Infrastructure, BYOD, Virtualization, ITaaS, SDS, and PAaaS, and of course, "The Cloud," changing the industry pace, many employers are seeking highly competitive personnel to fill these positions. It also provides information on these new IT technologies and the importance to U.S. vendors and employers on these functions.
  •  
    As a member of the general IT crowd at the moment I know exactly what this article is talking about. Many companies, including my own, are moving toward virtualization and cloud everything. Soon enough, I think just about everything will be "as a service", as it is far more cost effective to operate on the client end, and more cost effective to support on the provider end.
  •  
    I find the BYOD moment interesting; personally I would be weary of people connecting their own devices to my network. I know right now it is about providing life style perks to prospective employees, but at some point a mistake will be made and the internal networks could be compromised.
Funsho Aiyedogbon

5 Emerging Technologies Every Office Will Have In 2020 - 1 views

  •  
    This article explores five emerging technologies that will be commonly used in business offices in the next seven years.
  • ...1 more comment...
  •  
    Now this is scary and yet so amazing. The fact that they are already predicting that typing a password into a device is something that is going to be in the past, is unreal. A device is going to recognize your face and allow you to have access to it. The scary part is the phone aspect in how the devices will pick up your phone conversation and automatically send a calendar invite to your device. New technologies are definitely amazing but still, there is little to no talk on how they are going to secure the environments that they are creating.
  •  
    Very interesting article. Basically, all human existence will be completely gone by 2020. I can't believe these technologies even exist and are currently in the prototype stage. You never know, this technology can take over sooner that what this article expect. The most interesting technology to me the use of sensors. If things come out to be in full effect, with the use of these sensors can provide very accurate data and help avoid the use of any fraudulent it identity threats. Thanks!
  •  
    I read this article and loved it. After reading it a while back I became very interested in Gesture Control. This is the emerging technology that I chose for this class. I know that this article talks about the use of this technology in the office but we have already seen it in Smartphones (the new Galaxy) who knows where it will pop up next!
Alvin Thomas

Cybersecurity -- Emerging Technologies in Cybersecurity « WHS WHS - 10 views

  •  
    This is a cool and insightful article regarding emerging cyber security technologies. 
  •  
    I think the part about centralizing a "single federal enterprise network" is a great idea. The federal government has started doing this with things such as the FDCC (Federal Desktop Core Configuration), as well as SCAP (Security Content Automation Protocol), but I think there still needs to be much more. Allowing each federal agency to have their own cyber security within the U.S. seems a little crazy. I think setting one agency to protect the national infastructure, ie the borders of the U.S., down to each agencies front door needs to be standard. Agencies like DOD who have their own Cyber operations centers need to be properly trained and educated if they are going to defend infrastructure. Formalized training needs to be done at the federal level as well as the Civilian level. If you are going to be a security practioner, you must have the credentials, and I am not talking just a Sec+. I think it is time we up the standards on who we call a CyberSecurity professional.
  •  
    Interesting article and objective given. Connecting government cyber operations centers, I think that this will be a hugh, and important step toward achieving a higher level of security. Good read!
Amy Harding

Security Requirements for Cryptographic Modules - 4 views

  •  
    This standards publication (FIPS 140-2) is a key standard's document. Skim through it and see if you can find some ideas for emerging threats against the standard(s).
  • ...1 more comment...
  •  
    FIPS 140-3 is on its way and is needed as 140-2 is quite old now. Interestingly however, crypto is one of the slower moving changes in information security. Many of our algorithms have been around for many years; we have moved forward by increasing key size rather than changing the algorithms. AES and 3DES are still FIPS approved, whereas RC4 is not (which is used by many internet giants such as google and facebook).
  •  
    Any time you are allowed to introduce code into a program, you have a chance for error. By allowing cryptographic software and firmware to be updated, I think you will always have the chance for emerging threats to be introduced in the form of malware. Recently, the U.S. has stopped allowing the use of Chinese built hardware for certain DOD/ Federal agencies. if we allow the enemy to build the devices we use to form our security foundations, we have already lost the war.
  •  
    I believe the frequency of review of this policy is untimely to the speed technology advances in. If they could move the review from 5 years to 2 years will suffice. At times, once the policy is published folks are already working on the revision to keep up with technology growth. "Since a standard of this nature must be flexible enough to adapt to advancements and innovations in science and technology, this standard will be reviewed every five years in order to consider new or revised requirements that may be needed to meet technological and economic changes."
Joseph Walbert

DISA: Emerging Services - 0 views

  •  
    For the first week I've decided to share the Defense Information Systems Agency (DISA) Emerging Services webpage. This offers a non-DOD individual a chance to explore some of the technologies that are being looked at or currently used by our national assets (Federal and Military).
  •  
    I'm more of a fan to the PKI restricted content, stuff the public can get to seems to be a bulletin board for NG or GD to post their latest brochures.
Jennifer Otto

Emerging Technology in Evaluation of Nanomedicine - Molecular Pharmaceutics (ACS Public... - 0 views

  •  
    Article on emerging technology
samuelrios

Court Says C.I.A. Must Yield Some Data on Drones - NYTimes.com - 3 views

  •  
    Article supports drones as being an emerging technology. ASSignment1, Part1 Support
  •  
    Interesting article, It seems to me that this is just another one of those cases about flexing the "muscle" of the Freedom of Information Act. In my opinion it is pretty common knowledge that targeted drone strikes are being used to eliminate enemies; so why is it so important here that the C.I.A. has to acknowledge these attacks? What would that accomplish? The media outlets already report on successful drone strikes and now there are even military medals to recognize drone pilots. http://www.fsunews.com/article/20130318/FSVIEW0303/130317001/New-military-medal-stirs-controversy-?odyssey=mod|newswell|text|frontpage|s
  •  
    I just wonder how long it's going to take before something comes out of these attacks. Using these drones to fly into other countries like Pakistan, and "take out" suspected enemies is pretty borderline in my opinion. If this were to happen in America, we would certainly not stand for it, and would declare war on the country that carried out the action. Pushing the button from California on a drone missle is alot like conducting cyber warfare from one country to another. The damage that can be done is becoming greater and greater every day as technology is starting to tie together national infrastructures. In my opinion, drones are the some of the first of the cyber warfare machines.
James Thomas

Global Agenda Council on Emerging Technologies 2012 - 1 views

  •  
    The World Economic Forum (WEF) is a Geneva-based non-profit organization best known for its Annual Meeting in Davos, Switzerland, the Annual Meeting of New Champions in China (Summer Davos) and the Summit on the Global Agenda in Dubai. It also releases research reports such as the Competitiveness Reports and Risk Reports and engages with its members in sector-specific initiatives.
Amy Harding

U.S. business groups worried by cybersecurity law aimed at China | Reuters - 0 views

  •  
    This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Michael Madrzykowski

2013 Emerging Cyber Threats Report - 2 views

  •  
    Georgia Tech's security summit report
  • ...1 more comment...
  •  
    Nice find and I'm glad you posted this. On the topic of mobile malware, the report states that more smartphones were purchased in 2012 than PC's, and the Internet was accessed more on smartphones than any other device. The article mentions this, and I agree that the mobile malware threat will increase as the android and iOS ecosystems stretch wider and wider. It was also interesting to read about cloud storage, and how authorization will be one of it's major vulnerabilities as it becomes more widely used for business.
  •  
    Great article. Thing like this are very interesting to me. The section on Cloud Computing was by far my favorite. This type of technology is emerging and at the same time it has turned into a challenge for attackers to try to break. Security is going to be very vital for this service to work and more likely will be the subject of any topic related to cloud technology. Cloud service providers need to make a stronger statement and provide some type of assurance to the customer. Thanks!
  •  
    I had actually read this article before, but it was good to read it again. While they are many elements that are concerning I find the "filter bubbles" troubling. A user has the right to know that their search results have been filtered. You think you're conducting an open search, only to read this and find out your results may be limited.
Marie Arrington

UW Experimental Computer Engineering Lab - Securing Emerging Technologies - 0 views

  •  
    Unexpected security risks can arise with new, emerging computer technologies. We seek to stay one step ahead of the "bad guys" and identify, measure, and learn from their risks before actual threats manifest. We co-led the first experimental study of the computer security properties of wireless implantable medical devices.
sarahterry

Emerging Technologies such asBig Data and Cloud Bring New Opportunities for Innovations... - 1 views

  •  
    Very interesting how these companies are merging their companies together to build a better solution. I found the Cray company (last blurb) interesting in that their storage solution for Linux x86.
Amy Harding

Computer Visionary Who Invented the Mouse - NYTimes.com - 2 views

  •  
    Most of us would not consider the mouse emerging technology - but back in 1968 when the mouse was first introduced that technology was bleeding edge!
greg mack

Emerging Tech - 0 views

  •  
    The most important technology news, developments and trends with insightful analysis and commentary. Coverage includes hardware, software, networking, wireless computing, personal technology, security and cutting-edge technology from the business world to the consumer world.
Amy Harding

National Webcast: Cyber Security Emerging Trends and Threats for 2013 - 40 views

  •  
    This webcast is part of your Week 4 required reading/watching. Click on Archived Recording Now Available link and the video will open. On the right side of the screen you will see segments and you can click through the video and/or have to break the video down into smaller chunks.
Amy Harding

Emerging Threats and Security Planning: How Should We Decide What Hypothetical Threats ... - 22 views

  •  
    When you access this web resource you can select to download the full PDF file or you can click to read online.
Shondre Fort

Researchers Share Useful Lessons Learned in Evaluating Emerging Technologies - 0 views

  • Schlenoff and his colleagues used their SCORE approach to evaluate technologies as they progressed under two DARPA programs: ASSIST and TRANSTAC. In ASSIST, DARPA is funding efforts to instrument soldiers with wearable sensors—video cameras, microphones, global positioning devices and more—to continuously record activities while they are on a mission. TRANSTAC is driving the development of two-way speech-translation systems that enable speakers of different languages to communicate with each other in real-world situations, without an interpreter. By providing constructive feedback on system capabilities, the SCORE evaluative framework helps to drive innovation and performance improvements.
  •  
    SCORE (System, Component and Operationally Relevant Evaluations) is a unified set of criteria and software tools for defining a performance evaluation approach for complex intelligent systems. It provides a comprehensive evaluation blueprint that assesses the technical performance of a system and its components through isolating and changing variables as well as capturing end-user utility of the system in realistic use-case environments. The SCORE framework has proven to be widely-applicable in nature and equally relevant to technologies ranging from manufacturing to military systems. It has been applied to the evaluation of technologies in DARPA programs that range from soldier-worn sensor on patrol to speech-to-speech translation systems. It is also currently being applied to the assessing the control of autonomous vehicles on a shop floor.
  •  
    From NIST Tech Beat: June 21, 2011 Most industry executives, military planners, research managers or venture capitalists charged with assessing the potential of an R&D project probably are familiar with the wry twist on Arthur C. Clarke's third law*: "Any sufficiently advanced technology is indistinguishable from a rigged demo."
Kareem Branch

Samsung's Bendy, Twisty Screen May Be Leaving Prototype Limbo | Emerging Tech | TechNew... - 0 views

  •  
    Samsung this week displayed prototypes of its Youm line of flexible, virtually unbreakable organic light-emitting diode displays at the 2013 CES being held in Las Vegas. At CES, Samsung showed off a small tablet-like device with a wraparound flexible screen.
Seth Molin

Why Telemedicine Is Finally Ready to Take Off - 1 views

  •  
    This is an interesting article regarding my emerging technology topic Telemedicine. With the constant concern of the cost of healthcare telemedicine represents a possible solution to mitigate these costs. It seems that law makers would be increasingly interested in the topic to curb the ever expanding costs of Medicare
Amy Harding

Stop Fake Antivirus - 2 views

  •  
    This paper provides insight into where fake antivirus comes from and how it is distributed, what happens when a system is infected with fake antivirus, and how to stop this persistent threat from infecting your network and your users.
1 - 20 of 32 Next ›
Showing 20 items per page