Toggle light / dark theme

I am still not convinced that everyone fully understands how bot technology is about to change IoT and its impact to online business industry. Let me share a few ideas: Financial Auditing and accounting. Bots will be able to do a more thorough job in managing, tracking, reporting financials that many finance back office controls can be performed by bots and requiring a sign off by CFO/ Lead Controller. And, Accounting & Audit firms can easily leverage the technology to perform audits on companies remotely without having to send teams of auditors to a client’s site.

Here’s another one; I decide to set up a few 3D printers to make some unique seals for aircraft manufactures for their jets/ planes; and I need a call center plus online sales teams taking and processing orders. With bot technology my whole operation is automated and no need for sales people, call center folks, or operators. All I need is myself and couple of techies to manage the bot operations; and more profit for me and my team.

However, we still have to keep a tight oversight on hacking which is still a risk; however, we should see more micro-size companies spin up as a result of online bots and 3D printers in our immediate future.


Don’t even TRY to get Intersect Bot to talk about Trump or the Holocaust.

One thing about Quntum; nothing ever stays consistent. Why it’s loved & hated by Cyber Security enthusiasts as well as AI engineers.


When water in a pot is slowly heated to the boil, an exciting duel of energies takes place inside the liquid. On the one hand there is the interaction energy that wants to keep the water molecules together because of their mutual attraction. On the other hand, however, the motional energy, which increases due to heating, tries to separate the molecules. Below the boiling point the interaction energy prevails, but as soon as the motional energy wins the water boils and turns into water vapour. This process is also known as a phase transition. In this scenario the interaction only involves water molecules that are in immediate proximity to one another.

An artificial quantum world of atoms and light

An artificial quantum world of atoms and light: Atoms (red) spontaneously arrange themselves in a checkerboard pattern as a result of the complex interplay between short- and long-range interactions. (Visualizations: ETH Zurich / Tobias Donner)

They need to be especially as we assess AI with SOX, HIPAA, and Cyber security. It will be interesting how auditors will approach this space as well since not many folks outside of tech are considered AI experts. This should be interesting.


Scott & Scott, LLP attorney, Christopher Barnett, expresses concern whether KPMG’s recent announcement that they will be deploying IBM’s Watson cognitive computing technology points to changes in software audits in the future.

Download PDF [259KB]

Read more

Interesting: China wants more cross sharing of Cyber Security information with US. This will only get more interesting with the advancement of Quantum tech.

Article’s headline “Obama warned by China against undermining ‘national security’ interests”.


He made the remarks while addressing the Korean Peninsula situation in separate meetings here with U.S. President Barack Obama and South Korean President Park Geun-hye on the sidelines of the fourth Nuclear Security Summit (NSS).

How To Remove 'Crepey Skin' & Saggy Wrinkles In Minutes

How To Remove ‘Crepey Skin’ & Saggy Wrinkles In Minutes

Read more

Three months after a Department of Homeland Security intelligence report downplayed the threat of a cyber attack against the U.S. electrical grid, DHS and the FBI began a nationwide program warning of the dangers faced by U.S. utilities from damaging cyber attacks like the recent hacking against Ukraine’s power grid.

The nationwide campaign by DHS and the FBI began March 31 and includes 12 briefings and online webinars for electrical power infrastructure companies and others involved in security, with sessions in eight U.S. cities, including a session next week in Washington.

The unclassified briefings are titled “Ukraine Cyber Attack: Implications for U.S. Stakeholders,” and are based on work with the Ukrainian government in the aftermath of the Dec. 23 cyber attack against the Ukrainian power infrastructure.

Read more

As our cars become increasingly connected to the internet, and eventually drive themselves, we’re going to want them to be rock-solid secure. The recent Chrysler exploit and FBI warning both highlighted just how vulnerable our vehicles can be to malicious hackers.

The idea of anti-virus software for cars has been around for several years, and this year there’s even an entire conference about in-car cybersecurity. Karamba Security is a new company in the space that is offering what amounts to a firewall for your ride.

Don’t miss our biggest TNW Conference yet! Join us May 26 & 27 in Amsterdam.

Read more

Nice


The U.S. Marine Corps has launched a cyberspace warfare group to help man, equip and train the military branch’s cyber mission teams to conduct defensive and offensive operations.

The service branch said March 25 the Marine Corps Cyberspace Warfare Group was officially activated during a ceremony held March 25 at Fort Meade in Maryland.

MCCYWG will support Marine Forces Cyberspace Command and U.S. Cyber Command.

Read more

Hmmmm;


Liberty International Underwriters (LIU), part of Liberty Mutual Insurance, has launched a cyber extortion endorsement to its Product Recall and Contamination insurance policy for food and beverage companies.

This endorsement offers coverage to food and beverage policyholders for cyber extortion monies and consultant costs up to the policy sub-limit for acts against production and day-to-day operations.

“With operations being mostly automated now and an increasing reliance on technology, the food and beverage industry faces a very real risk of having its systems hijacked by cyber criminals and held for ransom,” said LIU Senior Vice President of Global Crisis Management, Jane McCarthy. “But what many companies don’t realize is that cyber extortion is not always covered under a typical cyber policy or by a general liability policy. We developed this to address the risks associated with new technology and –‘ransomware’–, malicious software designed to block access to a computer system until a sum of money is paid.”

Read more

Israel must remain on the cutting edge of cyber-defense, –security and –technology in order to maintain the safety and security of the state, Prime Minister Benjamin Netanyahu wrote in Globes on Sunday.

In the article, Netanyahu outlined his vision, policies and initiatives aimed at arming the Jewish state with the latest in “cybernetic innovation.” According to the Israeli leader, “Cyber defense is an essential condition for national security and economic growth in the 21st century,” and Israel’s strength in the fields of science and technology is leading the country to be one of the world’s greatest “cyber security power.”

“Five years ago, I set the goal of making Israel one of the five leading global cyber powers. We are already placed very high, and the world regards us as a rising power. Enhancing our capabilities in the cyber field requires continuous effort,” Netanyahu wrote.

Read more