Search This Blog

Tuesday, January 19, 2016

Tech Forecast for 2016

 Sarah Lahav, CEO of SysAid Technologies gives her take on what we can expect to see this year. .in 

2016: 6 New IP Predictions


For one of the predictions, I was really tempted to put in a reference to The IT Crowd. You should be able to guess which one.

Tuesday, January 5, 2016

Algorithm predicts which couples will stay together

“He loves me. He loves me not.” Flower petals predictions have a 50 percent accuracy rate. Marriage
photo from https://en.wikipedia.org/wiki/Wedding_ring
therapists have a somewhat better rate of accuracy, but a computer algorithm beats most of them with nearly 79 percent accuracy. What puts the odds in its favor is measuring the tone of voice in couple interaction.

Read more in 

Algorithm Predicts Relationship Success


Monday, January 4, 2016

Security through sharing

On December 18, 2015, President Obama signed off on the 2,000 plus page omnibus budget bill, that amounted to spending $1.8 trillion in a combination of government allocation and tax breaks. Among the items packed into this gargantuan package is the Cybersecurity Act of 2015, also known as the Cybersecurity Information Sharing Act (CISA). Set to stay in effect until September 30, 2025, it's a bill that will keep on giving for a decade. But not all regard it as a gift.

The bill had some vociferous opposition, most notably from the group called Fight for the Future. As late as December 16, the organization appealed for a veto on the law. Its campaign director, Evan Greer, declared that the bill is "a disingenuous attempt to quietly expand the U.S. government's surveillance programs, and it will inevitably lead to law enforcement agencies using the data they collect from companies through this program to investigate, prosecute, and incarcerate more people, deepening injustices in our society while failing to improve security."

The part that critics of the bill are most uncomfortable with is the permission granted to monitor networks. That makes up the first of three components of the bill's effects that comes under the heading "Authorizations for Preventing, Detecting, Analyzing, and Mitigating Cybersecurity Threats," presented in the analysis of the bill by Orin Kerr, Research Professor at The George Washington University Law School. He sums it up as: "First, network operators can monitor; second, they can operate defensive measures; and third, they can share information with others."

The third part of the mitigation formula is the equation of forewarned is forearmed. The idea is that putting out updates about the latest cyber threats in real (or very near real) time would give a heads up to other organizations that can take preventative action to avert attacks. The same assumption underlies IBM X-Force Exchange (XFE), a cloud-based platform for accessing information about cyber threats.

Read more in: 
Not everyone believes the new cyver security law passed on December 18 as part of the omnibus bill will prove effective. What do you think?