Menu

Blog

Page 11648

Feb 19, 2016

Envelop VR Software Provides Enterprise Customers with a Platform to Extend Their Existing Applications into Virtual Reality

Posted by in categories: business, computing, engineering, virtual reality

VR experience with SCM, CRM, etc. Imagine the improved connected customer experiences with VR.


Envelop VR, a software company that is leading businesses to immersive computing, announced today that it has hired Jeff Hansen as Vice President of Business Development. Jeff’s primary role will be to engage with enterprise customers wanting to solve for real business challenges by utilizing a virtual reality environment, including improving their work flow processes and efficiencies, visualizing data, or collaborating on engineering or product development. Envelop VR solutions enable enterprise customers to unlock the tremendous benefits and advantages of working and collaborating in a three-dimensional virtual environment.

This Smart News Release features multimedia. View the full release here: http://www.businesswire.com/news/home/20160218005289/en/

Read more

Feb 19, 2016

How smaller VR players can compete with big tech

Posted by in categories: augmented reality, business, virtual reality

I will admit; AR is more practical than VR in areas of SCM, etc. However, it is interesting to see how both play and evolve in the enterprise/ corporate models and connected customer experience areas of business. Also, overtime some of the small AR shops could be buying opportunities for mid-tier enterprise software companies.


Here’s where small tech companies can challenge the big guys in the world of virtual and augmented reality.

Read more

Feb 19, 2016

Tactics to Protect Against Most Common Cyber Attacks

Posted by in categories: business, cybercrime/malcode, energy, mobile phones, quantum physics, robotics/AI

This is a good baseline around common known issues — the real problem is cyber terrorists (as I call them) learns from each attack they instigate and like an artist, they constantly are fine tuning their own skill. So, the attacker’s approach and execution may be done one way, and by the next attack they can easily have changed their whole attack model completely which makes it very cumbersome for experts to trace at times. If we believe this is bad now; wait until AI is more widely available and adopted. Or, Quantum ends up in the hands of these guys.


Cybercrimes in today’s technologically advanced society have become much more sophisticated and progressive. We can thank mobility for the ease of extended access to our personal data, as with every use of our mobile phones, laptops or tablets in public areas we further increase our risk and vulnerability. As business owners, online shoppers, students, employees and even house wives, we remain at high risk for intrusion of our virtual systems. In this digital day in age, our personal data is used everywhere from when we make an online banking transaction to buying a new shirt at the mall, and even working on a project at the local coffee shop. It is hardly responsible to think that your information is safe anywhere.

Continue reading “Tactics to Protect Against Most Common Cyber Attacks” »

Feb 19, 2016

Medical Facilities Are Inviting Targets for Cyber Attacks

Posted by in categories: biotech/medical, computing

Really a sad fact.


Los Angeles hospital pays $17,000 ransom to get its computer system unlocked. Expert says hackers find medical institutions as easy, profitable targets.

Read more

Feb 19, 2016

Could hacking your pacemaker and holding it ransom be a 2016 cyber trend?

Posted by in categories: biotech/medical, computing, security

So, we’re now adding possible murder to the charges of hackers?.


The Hollywood Presbyterian Medical Center in Los Angeles paid a ransom of 17,000 U.S. dollars to hackers after two weeks of being shut out of their computer network. We talk to cyber security expert Jay Radcliffe about medical cyber vulnerabilities.

Read more

Feb 19, 2016

Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016

Posted by in categories: privacy, security, transportation

Northrup Grumman’s new Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases being showcase at the WEST 2016 navel conference on February 17.


Northrop Grumman Corporation (NYSE: NOC) has announced that it will be showcasing key naval capabilities at the WEST 2016 navel conference on February 17, 2016. The corporation will unveil its full-spectrum cyber solutions, biometric defense solutions, unmanned aircraft and much more at the event. WEST 2016 is co-sponsored by AFCEA and the US Naval institute in San Diego. Northrop Grumman is a platinum sponsor of the conference, which is themed “how we make the strategy work.”

The defense contractor will be showcasing its sea serving operations and capabilities that will help the US armed forces combat challenges and difficulties more efficiently. It is also expected to display how it integrates cyber-technology into all of its defense segments. The key highlight of its cyber-suite is its Cyber Situational Awareness (CSA), which is a set of web-based tools designed to visualize, understand, and share cyber databases.

Continue reading “Northrop Grumman Corporation to Unveil Naval Capabilities at WEST 2016” »

Feb 19, 2016

Don’t Miss Out on This Cyber Security Stock

Posted by in categories: cybercrime/malcode, security

Unless you haven’t been in touch with the real world lately; it truly would be hard not to recognize that real investment opportunities exist in cyber security technology space.


Don’t Miss Out on This Cyber Security Stock, Stocks: CYBR, FEYE, PANW, CSCO, release date: Feb 19, 2016.

Read more

Feb 19, 2016

Russia steps up Syria cyber assault

Posted by in categories: cybercrime/malcode, military

Russia’s cyber war in Syria.


Russia is mounting a far-reaching cyber espionage campaign against Syrian opposition groups and NGOs, as Moscow seeks to influence the flow of information on the country’s humanitarian crisis and obscure the full extent of its military operations.

Read more

Feb 19, 2016

Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks

Posted by in categories: cybercrime/malcode, internet, military, transportation

US Navy fighting the real war that is ramping up by unpluging from certain networks. Well, that is an option; but also very limiting to “sneaker net” information file transfers. Definitely not uncommon across other areas of government.


SAN DIEGO — For the Navy, the best defense against a high-tech enemy may be a low-tech strategy.

After decades of building equipment, aircraft and ships designed to communicate with each other and back to shore, the Navy is now looking to “selectively disconnect” its systems to minimize vulnerability to cyberattacks, said Rear Adm. Lorin Selby, commander of the Naval Surface Warfare Center.

Continue reading “Navy Wants to Unplug From Some Networks to Stay Ahead of Cyberattacks” »

Feb 19, 2016

Silly Putty-like substance is helping researchers make shape-shifting robots

Posted by in category: robotics/AI

One of the largest drawbacks in robotics is the rigid parts and movements of the robots. Well, soon that maybe changing due to non-Newtonian fluids.


(Inside Science) — By using fluids similar to Silly Putty that can behave as both liquids and solids, researchers say they have created fluid robots that might one day perform tasks that conventional machines cannot.

Conventional robots are made of rigid parts that are vulnerable to bumps, scrapes, twists and falls. In contrast, researchers worldwide are increasingly developing robots made from soft, elastic plastic and rubber that are inspired by worms, starfish and octopuses. These soft robots can resist many of the kinds of damage, and can squirm past many of the obstacles, that can impede hard robots.

Continue reading “Silly Putty-like substance is helping researchers make shape-shifting robots” »