This article talks about buying technology products from China and whether the US should. The supply chain is an important part of emerging technologies. As you worked on your bibliography - did you question where the technology comes from?
Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
Scott, this technology appears not to far away especially when it comes to biometrics/fingerprinting the last car dealership I worked at 4 years ago employed this for retrieving keys to test drive cars and the salespeople liked this a lot because we did not have to worry about keeping up with a key to unlock the key box before signing a car out to test drive. I mean you always got your finger with you and key log kept track of last known person with key so salespeople would not be charged for lost keys. Thanks.
Identification Technology Division, EER Systems Inc. McLean, VA 22102; and†National Laboratory of Pattern Recognition (NLPR), Institute of Automation, Chinese Academy of Sciences, Beijing 100080, China Why Use Biometrics-Based Personal Identification? Biometrics-based personal identification attempts to answer the questions "Who are you?" and "Are you who you claim to be?"
Researcher uncovers hundreds of different custom malware families used by cyberspies -- and discovers an Asian security company conducting cyberespionage
This article raises some serious questions in my opinion. As we move more into an environment where cyber warfare is to be used against different countries, where are the lines drawn between declaring war. As this article discusses, it is not as easy to see who actually was behind the attack, and an attack coming from Chinese, or some other countries IP space, is not neccessarily a state sponsored attack, nor is it neccessarily coming from someone inside the country. In a hack back scenario, it could be determined after the fact that whatever country was thought to initiate the first move, was actually a victim of a "zombie/bot" type of controlled attack that was actually initiated in another country. Can you say, Wargames? Edited 3222013: as I spoke yesterday, today guess what? http://news.yahoo.com/skorea-misidentifies-china-cyberattack-origin-071350510.html
Dan, thanks for posting. This was a good article, not that I wasn't aware of the information in it, but it was just a good reminder, and something I can use to send around for some people to read who may be using some of the obvious techniques to secure thair passwords, such as "what was your first car", lol Facebook destroyed these types of questions/answer security forms.
This video gives an example of technologies of the future and a different way to pose questions for how technology can improve daily life but also where technology can take us.
I really like the way they talked about complete integration in the video, as that definitely seems to be the direction that everything is going. Forget about dedicated devices, everything from your couch to your car, to your refrigerator will have intense computing power, and will be able to communicate with you and everything else around you to better your life. The only downfall I see of this is it seems like people would forget how to not use technology, and would be completely helpless if it was lost.
Complete integration is really important. It is a focus of many technological advancements. This is due to the fact that people want technology that makes life as whole easier not just individual tasks. I am eager to see what technologies the future will actually hold!
Interesting assessments by the individuals in that provided video Percy. I personally keyed into the statement that technology will operate in a more conversational (social) manner that's similar to how humans interact. The further technological-based assessments are interesting especially with regard to gene mapping and what diseases somebody may face within their lifetime.
Most organizations already have started to use virtualization technology or cloud computing. Yet some still may be reluctant to move their mission-critical-tier-1 - applications to these relatively new environments. While the flexibility and cost benefits of virtualization are widely accepted, questions linger on how to adapt to new and different risks.
Call it the cyber-attack that never happened. A false alarm that sent the Economic Development Agency scrambling. When the dust settled, the EDA had spent half of its information technology budget - or nearly $3 million - destroying hundreds of thousands of dollars worth of perfectly functioning computer equipment. Talk about using up your resources...literally.
Great artical. There must have been enough positive indicators for the EDA to take action. In a case like this it's better to be safe than sorry, but that doesn't make it easier to explain to tax payers!
What stood out to me was that they did not follow the incident handling procedure. Those documents are put together for a reason. I also question why there was not a manager to oversee the incident response for something of this size. I blame management for this one.
I agree with a better safe than sorry approach most of the time, but I have to agree with Bob that procedures weren't followed and equipment was unnecessarily destroyed.
Do your job, talk-shop with IT pros and vendors...and get the scoop on everything from products and services to zombies and bacon (yup, seriously). All in one place. All for free! Download Free App Join Free Community Tech vendor? We can help you too! Learn how "