From ITworld: Wanted: A world where virtual assistants help (without being asked)

Instead of fearing that artificial intelligence (A.I.) will replace us, we should be excited about how A.I. will help us.

In a perfect future, our A.I. virtual assistant will know what we’re doing, where we’re going and — most importantly — what we’re saying. They’ll know lots of other things, too. And when they sense we need help, they’ll whisper suggestions, ideas or facts into our ears, essentially giving us real-time knowledge as we go about our day.

As you’re walking from a parking garage to your meeting, your virtual assistant should give you turn-by-turn walking directions without you having to ask. As you shake hands before the meeting, your virtual assistant should remind you (without anyone else hearing), that you met the person four years ago at a conference. During the meeting, it should listen for potential questions and supply the answer.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: Wanted: A world where virtual assistants help (without being asked)

Instead of fearing that artificial intelligence (A.I.) will replace us, we should be excited about how A.I. will help us.

In a perfect future, our A.I. virtual assistant will know what we’re doing, where we’re going and — most importantly — what we’re saying. They’ll know lots of other things, too. And when they sense we need help, they’ll whisper suggestions, ideas or facts into our ears, essentially giving us real-time knowledge as we go about our day.

As you’re walking from a parking garage to your meeting, your virtual assistant should give you turn-by-turn walking directions without you having to ask. As you shake hands before the meeting, your virtual assistant should remind you (without anyone else hearing), that you met the person four years ago at a conference. During the meeting, it should listen for potential questions and supply the answer.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: 63% off Anker SoundCore 2 Bluetooth Speaker with 24-Hour Playtime – Deal Alert

SoundCore 2 From Anker produces outstanding audio from an astonishingly compact speaker. Upgraded 2x 6W drivers blast out rich, clear sound. IPX5 water-resistant rating and dustproof engineering mean you can bring your beats anywhere – from the garden, to the beach. Upgraded materials provide smooth touch, and better grip. Listen for up to 66ft with latest Bluetooth 4.2 technology, while an in-built microphone makes hands-free calling a breeze. If you find yourself without BlueTooth, an aux port allows you to plug in and play. And a 24-hour / 500-song playtime means you can listen all day. The SoundCore 2 from Anker’s typical list price has been reduced 63% to just $33.59. See this deal on Amazon.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: Xerox CISO: How business should prepare for the future security threat landscape

The pace of change for the security threat landscape is accelerating. To cope with the change and ensure success against adversaries, Xerox Chief Information Security Officer (CISO) Dr. Alissa Johnson believes the security community needs to rethink the way it anticipates and responds to threats. It also needs to be more open and effective in the way it shares information.

Johnson’s background has given her a unique perspective on the security landscape from the perspective of both private industry and the public sector. An NSA-certified cryptologic engineer, she spent three years with the Obama administration as deputy CIO where she was resonsible for White House technology and some of the technology at Camp David and in Air Force One. Johnson has also worked at Lockheed Martin as a deputy CTO and at Northrop Grumman as a senior network security engineer.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: Xerox CISO: How business should prepare for the future security threat landscape

The pace of change for the security threat landscape is accelerating. To cope with the change and ensure success against adversaries, Xerox Chief Information Security Officer (CISO) Dr. Alissa Johnson believes the security community needs to rethink the way it anticipates and responds to threats. It also needs to be more open and effective in the way it shares information.

Johnson’s background has given her a unique perspective on the security landscape from the perspective of both private industry and the public sector. An NSA-certified cryptologic engineer, she spent three years with the Obama administration as deputy CIO where she was resonsible for White House technology and some of the technology at Camp David and in Air Force One. Johnson has also worked at Lockheed Martin as a deputy CTO and at Northrop Grumman as a senior network security engineer.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: What is a data scientist? A key data analytics role and a lucrative career

What is a data scientist?

Data scientists are responsible for discovering insights from massive amounts of structured and unstructured data to help shape or meet specific business needs and goals. The data scientist role in data analysis is becoming increasingly important as businesses rely more heavily on big data and data analytics to drive decision-making and as more businesses lean on cloud technology, automation and machine learning as core components of their IT strategies.

A data scientist’s main objective is to organize and analyze large amounts of data, often using software specifically designed for the task. The final results of a data scientist’s data analysis needs to be easy enough for all invested stakeholders to understand — especially those working outside of IT.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: Mobile device security for the road warrior

Employees who use their smartphones and other mobile devices while traveling face greater risk that their devices will be compromised, posing a threat to corporate systems. Travelers can minimize the risk by taking a few simple and inexpensive precautions.

CSO Senior Writers Steve Ragan and Fahmida Rashid outline how they prepared for their recent trip to the Black Hat event in Las Vegas. Black Hat is one of the biggest hacker conventions and notorious for having attendees’ phones breached. If you can survive Black Hat without your mobile device compromised, you can trust it to be reasonably secure anywhere. Here’s how Ragan and Rashid stayed safe at Black Hat.

To read this article in full or to leave a comment, please click here

Read more

From ITworld: Mobile device security for the road warrior

Employees who use their smartphones and other mobile devices while traveling face greater risk that their devices will be compromised, posing a threat to corporate systems. Travelers can minimize the risk by taking a few simple and inexpensive precautions.

CSO Senior Writers Steve Ragan and Fahmida Rashid outline how they prepared for their recent trip to the Black Hat event in Las Vegas. Black Hat is one of the biggest hacker conventions and notorious for having attendees’ phones breached. If you can survive Black Hat without your mobile device compromised, you can trust it to be reasonably secure anywhere. Here’s how Ragan and Rashid stayed safe at Black Hat.

To read this article in full or to leave a comment, please click here

Read more